%PDF- %PDF-
Mini Shell

Mini Shell

Direktori : /proc/self/root/var/log/
Upload File :
Create Path :
Current File : //proc/self/root/var/log/secure-20230108

Jan  1 03:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  1 03:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 03:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 03:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  1 03:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 03:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 03:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  1 03:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 03:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 03:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  1 03:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 03:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 03:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  1 03:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 03:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 03:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  1 03:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 03:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 03:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  1 03:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 03:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 03:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  1 03:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 03:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 03:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  1 03:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 03:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 03:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  1 03:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 03:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 03:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  1 03:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 03:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 03:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  1 03:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 03:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 03:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  1 03:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 03:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 03:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=travelboniface user-2=keralaholi user-3=wwwresourcehunte user-4=wwwrmswll user-5=ugotscom user-6=wwwpmcresource user-7=a2zgroup user-8=dartsimp user-9=laundryboniface user-10=cochintaxi user-11=wwwkaretakers user-12=palco123 user-13=gifterman user-14=phmetals user-15=kottayamcalldriv user-16=mrsclean user-17=wwwnexidigital user-18=bonifacegroup user-19=wwwevmhonda user-20=wwwletsstalkfood user-21=straightcurve user-22=vfmassets user-23=shalinijames user-24=wwwtestugo user-25=pmcresources user-26=disposeat user-27=wwwkmaorg user-28=remysagr user-29=woodpeck user-30=wwwkapin feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  1 03:21:50 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  1 03:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 03:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 03:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  1 03:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 03:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 03:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-9ztXhsyC4BZV7y1i.~
Jan  1 03:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 03:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 03:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-9ztXhsyC4BZV7y1i.~'
Jan  1 03:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 03:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 03:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-9ztXhsyC4BZV7y1i.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  1 03:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 03:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 03:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  1 03:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 03:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 03:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  1 03:21:51 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  1 03:21:51 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  1 03:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  1 03:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 03:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 03:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  1 03:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 03:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 03:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  1 03:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 03:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 03:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  1 03:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 03:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 03:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  1 03:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 03:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 03:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  1 03:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  1 03:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  1 03:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  1 03:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  1 03:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  1 03:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  1 03:21:56 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  1 03:21:58 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  1 03:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  1 03:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  1 03:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  1 03:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  1 03:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  1 03:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  1 03:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  1 03:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  1 03:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  1 03:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  1 03:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  1 03:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  1 03:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  1 03:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  1 03:22:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  1 03:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  1 03:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  1 03:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  1 03:23:20 host sshd[20194]: Invalid user admin from 194.169.175.102 port 57030
Jan  1 03:23:20 host sshd[20194]: input_userauth_request: invalid user admin [preauth]
Jan  1 03:23:20 host sshd[20194]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 03:23:20 host sshd[20194]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.169.175.102
Jan  1 03:23:22 host sshd[20194]: Failed password for invalid user admin from 194.169.175.102 port 57030 ssh2
Jan  1 03:23:23 host sshd[20194]: Received disconnect from 194.169.175.102 port 57030:11: Client disconnecting normally [preauth]
Jan  1 03:23:23 host sshd[20194]: Disconnected from 194.169.175.102 port 57030 [preauth]
Jan  1 03:39:38 host sshd[22566]: Invalid user storm from 106.10.122.53 port 35868
Jan  1 03:39:38 host sshd[22566]: input_userauth_request: invalid user storm [preauth]
Jan  1 03:39:38 host sshd[22566]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 03:39:38 host sshd[22566]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53
Jan  1 03:39:40 host sshd[22566]: Failed password for invalid user storm from 106.10.122.53 port 35868 ssh2
Jan  1 03:39:40 host sshd[22566]: Connection closed by 106.10.122.53 port 35868 [preauth]
Jan  1 03:40:01 host sshd[22609]: Invalid user eric from 107.189.30.59 port 57068
Jan  1 03:40:01 host sshd[22609]: input_userauth_request: invalid user eric [preauth]
Jan  1 03:40:01 host sshd[22609]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 03:40:01 host sshd[22609]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59
Jan  1 03:40:03 host sshd[22609]: Failed password for invalid user eric from 107.189.30.59 port 57068 ssh2
Jan  1 03:40:05 host sshd[22609]: Connection closed by 107.189.30.59 port 57068 [preauth]
Jan  1 03:51:34 host sshd[24397]: Invalid user admin from 59.26.145.206 port 45691
Jan  1 03:51:34 host sshd[24397]: input_userauth_request: invalid user admin [preauth]
Jan  1 03:51:34 host sshd[24397]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 03:51:34 host sshd[24397]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.26.145.206
Jan  1 03:51:35 host sshd[24397]: Failed password for invalid user admin from 59.26.145.206 port 45691 ssh2
Jan  1 03:51:36 host sshd[24397]: Connection closed by 59.26.145.206 port 45691 [preauth]
Jan  1 03:52:39 host sshd[24503]: Invalid user user1 from 162.218.126.136 port 36714
Jan  1 03:52:39 host sshd[24503]: input_userauth_request: invalid user user1 [preauth]
Jan  1 03:52:39 host sshd[24503]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 03:52:39 host sshd[24503]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136
Jan  1 03:52:42 host sshd[24503]: Failed password for invalid user user1 from 162.218.126.136 port 36714 ssh2
Jan  1 03:52:42 host sshd[24503]: Connection closed by 162.218.126.136 port 36714 [preauth]
Jan  1 03:56:41 host sshd[25040]: User root from 41.197.31.178 not allowed because not listed in AllowUsers
Jan  1 03:56:41 host sshd[25040]: input_userauth_request: invalid user root [preauth]
Jan  1 03:56:42 host unix_chkpwd[25044]: password check failed for user (root)
Jan  1 03:56:42 host sshd[25040]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178  user=root
Jan  1 03:56:42 host sshd[25040]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 03:56:43 host sshd[25040]: Failed password for invalid user root from 41.197.31.178 port 32816 ssh2
Jan  1 03:56:44 host sshd[25040]: Connection closed by 41.197.31.178 port 32816 [preauth]
Jan  1 04:01:00 host sshd[25502]: User root from 84.255.249.179 not allowed because not listed in AllowUsers
Jan  1 04:01:00 host sshd[25502]: input_userauth_request: invalid user root [preauth]
Jan  1 04:01:00 host unix_chkpwd[25505]: password check failed for user (root)
Jan  1 04:01:00 host sshd[25502]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.255.249.179  user=root
Jan  1 04:01:00 host sshd[25502]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 04:01:02 host sshd[25502]: Failed password for invalid user root from 84.255.249.179 port 42422 ssh2
Jan  1 04:01:02 host sshd[25502]: Received disconnect from 84.255.249.179 port 42422:11: Bye Bye [preauth]
Jan  1 04:01:02 host sshd[25502]: Disconnected from 84.255.249.179 port 42422 [preauth]
Jan  1 04:01:26 host sshd[25595]: Invalid user user1 from 103.13.40.2 port 34988
Jan  1 04:01:26 host sshd[25595]: input_userauth_request: invalid user user1 [preauth]
Jan  1 04:01:26 host sshd[25595]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 04:01:26 host sshd[25595]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2
Jan  1 04:01:28 host sshd[25595]: Failed password for invalid user user1 from 103.13.40.2 port 34988 ssh2
Jan  1 04:01:28 host sshd[25595]: Connection closed by 103.13.40.2 port 34988 [preauth]
Jan  1 04:01:33 host sshd[25608]: Invalid user ot from 213.141.143.70 port 57911
Jan  1 04:01:33 host sshd[25608]: input_userauth_request: invalid user ot [preauth]
Jan  1 04:01:33 host sshd[25608]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 04:01:33 host sshd[25608]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.141.143.70
Jan  1 04:01:35 host sshd[25608]: Failed password for invalid user ot from 213.141.143.70 port 57911 ssh2
Jan  1 04:01:36 host sshd[25608]: Received disconnect from 213.141.143.70 port 57911:11: Bye Bye [preauth]
Jan  1 04:01:36 host sshd[25608]: Disconnected from 213.141.143.70 port 57911 [preauth]
Jan  1 04:02:47 host sshd[25749]: Invalid user guest from 20.57.113.125 port 59664
Jan  1 04:02:47 host sshd[25749]: input_userauth_request: invalid user guest [preauth]
Jan  1 04:02:47 host sshd[25749]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 04:02:47 host sshd[25749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.57.113.125
Jan  1 04:02:49 host sshd[25749]: Failed password for invalid user guest from 20.57.113.125 port 59664 ssh2
Jan  1 04:02:49 host sshd[25749]: Received disconnect from 20.57.113.125 port 59664:11: Bye Bye [preauth]
Jan  1 04:02:49 host sshd[25749]: Disconnected from 20.57.113.125 port 59664 [preauth]
Jan  1 04:04:37 host sshd[25935]: User root from 78.135.89.144 not allowed because not listed in AllowUsers
Jan  1 04:04:37 host sshd[25935]: input_userauth_request: invalid user root [preauth]
Jan  1 04:04:37 host unix_chkpwd[25938]: password check failed for user (root)
Jan  1 04:04:37 host sshd[25935]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.135.89.144  user=root
Jan  1 04:04:37 host sshd[25935]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 04:04:39 host sshd[25935]: Failed password for invalid user root from 78.135.89.144 port 60432 ssh2
Jan  1 04:04:40 host sshd[25935]: Received disconnect from 78.135.89.144 port 60432:11: Bye Bye [preauth]
Jan  1 04:04:40 host sshd[25935]: Disconnected from 78.135.89.144 port 60432 [preauth]
Jan  1 04:05:06 host sshd[26008]: User root from 203.172.56.202 not allowed because not listed in AllowUsers
Jan  1 04:05:06 host sshd[26008]: input_userauth_request: invalid user root [preauth]
Jan  1 04:05:07 host unix_chkpwd[26012]: password check failed for user (root)
Jan  1 04:05:07 host sshd[26008]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.172.56.202  user=root
Jan  1 04:05:07 host sshd[26008]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 04:05:08 host sshd[26008]: Failed password for invalid user root from 203.172.56.202 port 52938 ssh2
Jan  1 04:05:08 host sshd[26008]: Received disconnect from 203.172.56.202 port 52938:11: Bye Bye [preauth]
Jan  1 04:05:08 host sshd[26008]: Disconnected from 203.172.56.202 port 52938 [preauth]
Jan  1 04:06:10 host sshd[26250]: Invalid user admin from 190.210.135.78 port 45490
Jan  1 04:06:10 host sshd[26250]: input_userauth_request: invalid user admin [preauth]
Jan  1 04:06:10 host sshd[26250]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 04:06:10 host sshd[26250]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.210.135.78
Jan  1 04:06:12 host sshd[26250]: Failed password for invalid user admin from 190.210.135.78 port 45490 ssh2
Jan  1 04:06:12 host sshd[26250]: Received disconnect from 190.210.135.78 port 45490:11: Bye Bye [preauth]
Jan  1 04:06:12 host sshd[26250]: Disconnected from 190.210.135.78 port 45490 [preauth]
Jan  1 04:06:41 host sshd[26319]: User root from 213.141.143.70 not allowed because not listed in AllowUsers
Jan  1 04:06:41 host sshd[26319]: input_userauth_request: invalid user root [preauth]
Jan  1 04:06:41 host unix_chkpwd[26322]: password check failed for user (root)
Jan  1 04:06:41 host sshd[26319]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.141.143.70  user=root
Jan  1 04:06:41 host sshd[26319]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 04:06:43 host sshd[26319]: Failed password for invalid user root from 213.141.143.70 port 57147 ssh2
Jan  1 04:06:43 host sshd[26319]: Received disconnect from 213.141.143.70 port 57147:11: Bye Bye [preauth]
Jan  1 04:06:43 host sshd[26319]: Disconnected from 213.141.143.70 port 57147 [preauth]
Jan  1 04:06:44 host sshd[26326]: Invalid user splunk from 20.57.113.125 port 59828
Jan  1 04:06:44 host sshd[26326]: input_userauth_request: invalid user splunk [preauth]
Jan  1 04:06:44 host sshd[26326]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 04:06:44 host sshd[26326]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.57.113.125
Jan  1 04:06:46 host sshd[26326]: Failed password for invalid user splunk from 20.57.113.125 port 59828 ssh2
Jan  1 04:06:46 host sshd[26326]: Received disconnect from 20.57.113.125 port 59828:11: Bye Bye [preauth]
Jan  1 04:06:46 host sshd[26326]: Disconnected from 20.57.113.125 port 59828 [preauth]
Jan  1 04:07:11 host sshd[26393]: Invalid user ubuntu from 84.255.249.179 port 47680
Jan  1 04:07:11 host sshd[26393]: input_userauth_request: invalid user ubuntu [preauth]
Jan  1 04:07:11 host sshd[26393]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 04:07:11 host sshd[26393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.255.249.179
Jan  1 04:07:12 host sshd[26393]: Failed password for invalid user ubuntu from 84.255.249.179 port 47680 ssh2
Jan  1 04:07:13 host sshd[26393]: Received disconnect from 84.255.249.179 port 47680:11: Bye Bye [preauth]
Jan  1 04:07:13 host sshd[26393]: Disconnected from 84.255.249.179 port 47680 [preauth]
Jan  1 04:07:22 host sshd[26439]: Invalid user dst from 203.172.56.202 port 50088
Jan  1 04:07:22 host sshd[26439]: input_userauth_request: invalid user dst [preauth]
Jan  1 04:07:22 host sshd[26439]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 04:07:22 host sshd[26439]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.172.56.202
Jan  1 04:07:24 host sshd[26439]: Failed password for invalid user dst from 203.172.56.202 port 50088 ssh2
Jan  1 04:07:24 host sshd[26439]: Received disconnect from 203.172.56.202 port 50088:11: Bye Bye [preauth]
Jan  1 04:07:24 host sshd[26439]: Disconnected from 203.172.56.202 port 50088 [preauth]
Jan  1 04:07:34 host sshd[26514]: Did not receive identification string from 91.218.112.91 port 55288
Jan  1 04:07:39 host sshd[26525]: Invalid user miko from 78.135.89.144 port 39164
Jan  1 04:07:39 host sshd[26525]: input_userauth_request: invalid user miko [preauth]
Jan  1 04:07:39 host sshd[26525]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 04:07:39 host sshd[26525]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.135.89.144
Jan  1 04:07:41 host sshd[26525]: Failed password for invalid user miko from 78.135.89.144 port 39164 ssh2
Jan  1 04:07:41 host sshd[26525]: Received disconnect from 78.135.89.144 port 39164:11: Bye Bye [preauth]
Jan  1 04:07:41 host sshd[26525]: Disconnected from 78.135.89.144 port 39164 [preauth]
Jan  1 04:07:55 host sshd[26614]: User root from 20.57.113.125 not allowed because not listed in AllowUsers
Jan  1 04:07:55 host sshd[26614]: input_userauth_request: invalid user root [preauth]
Jan  1 04:07:55 host unix_chkpwd[26621]: password check failed for user (root)
Jan  1 04:07:55 host sshd[26614]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.57.113.125  user=root
Jan  1 04:07:55 host sshd[26614]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 04:07:57 host sshd[26614]: Failed password for invalid user root from 20.57.113.125 port 59936 ssh2
Jan  1 04:08:23 host sshd[26765]: Invalid user vita from 190.210.135.78 port 50454
Jan  1 04:08:23 host sshd[26765]: input_userauth_request: invalid user vita [preauth]
Jan  1 04:08:23 host sshd[26765]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 04:08:23 host sshd[26765]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.210.135.78
Jan  1 04:08:25 host sshd[26765]: Failed password for invalid user vita from 190.210.135.78 port 50454 ssh2
Jan  1 04:08:25 host sshd[26765]: Received disconnect from 190.210.135.78 port 50454:11: Bye Bye [preauth]
Jan  1 04:08:25 host sshd[26765]: Disconnected from 190.210.135.78 port 50454 [preauth]
Jan  1 04:09:01 host sshd[26921]: Connection closed by 91.218.112.91 port 37772 [preauth]
Jan  1 04:09:02 host sshd[26884]: Connection closed by 94.102.61.20 port 46432 [preauth]
Jan  1 04:09:56 host sshd[27067]: User root from 190.210.135.78 not allowed because not listed in AllowUsers
Jan  1 04:09:56 host sshd[27067]: input_userauth_request: invalid user root [preauth]
Jan  1 04:09:56 host unix_chkpwd[27071]: password check failed for user (root)
Jan  1 04:09:56 host sshd[27067]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.210.135.78  user=root
Jan  1 04:09:56 host sshd[27067]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 04:09:58 host sshd[27067]: Failed password for invalid user root from 190.210.135.78 port 50958 ssh2
Jan  1 04:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  1 04:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 04:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 04:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  1 04:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 04:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 04:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  1 04:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 04:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 04:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  1 04:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 04:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 04:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  1 04:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 04:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 04:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  1 04:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 04:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 04:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  1 04:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 04:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 04:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  1 04:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 04:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 04:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  1 04:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 04:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 04:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  1 04:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 04:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 04:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  1 04:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 04:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 04:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  1 04:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 04:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 04:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  1 04:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 04:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 04:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=bonifacegroup user-2=wwwevmhonda user-3=wwwletsstalkfood user-4=straightcurve user-5=palco123 user-6=gifterman user-7=phmetals user-8=kottayamcalldriv user-9=mrsclean user-10=wwwnexidigital user-11=wwwkmaorg user-12=disposeat user-13=remysagr user-14=woodpeck user-15=wwwkapin user-16=vfmassets user-17=shalinijames user-18=wwwtestugo user-19=pmcresources user-20=wwwpmcresource user-21=travelboniface user-22=wwwresourcehunte user-23=keralaholi user-24=wwwrmswll user-25=ugotscom user-26=cochintaxi user-27=wwwkaretakers user-28=a2zgroup user-29=dartsimp user-30=laundryboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  1 04:21:51 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  1 04:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 04:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 04:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  1 04:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 04:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 04:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ht8dvJ0fJkPnvYvb.~
Jan  1 04:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 04:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 04:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ht8dvJ0fJkPnvYvb.~'
Jan  1 04:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 04:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 04:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ht8dvJ0fJkPnvYvb.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  1 04:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 04:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 04:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  1 04:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 04:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 04:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  1 04:21:52 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  1 04:21:52 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  1 04:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  1 04:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 04:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 04:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  1 04:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 04:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 04:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  1 04:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 04:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 04:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  1 04:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 04:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 04:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  1 04:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 04:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 04:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  1 04:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  1 04:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  1 04:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  1 04:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  1 04:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  1 04:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  1 04:21:56 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  1 04:21:58 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  1 04:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  1 04:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  1 04:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  1 04:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  1 04:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  1 04:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  1 04:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  1 04:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  1 04:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  1 04:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  1 04:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  1 04:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  1 04:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  1 04:22:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  1 04:22:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  1 04:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  1 04:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  1 04:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  1 04:40:54 host sshd[31848]: Invalid user shun from 165.227.176.35 port 40026
Jan  1 04:40:54 host sshd[31848]: input_userauth_request: invalid user shun [preauth]
Jan  1 04:40:54 host sshd[31848]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 04:40:54 host sshd[31848]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.176.35
Jan  1 04:40:56 host sshd[31848]: Failed password for invalid user shun from 165.227.176.35 port 40026 ssh2
Jan  1 04:40:56 host sshd[31848]: Received disconnect from 165.227.176.35 port 40026:11: Bye Bye [preauth]
Jan  1 04:40:56 host sshd[31848]: Disconnected from 165.227.176.35 port 40026 [preauth]
Jan  1 04:40:57 host sshd[31853]: Invalid user vhpadmin from 207.178.145.171 port 46142
Jan  1 04:40:57 host sshd[31853]: input_userauth_request: invalid user vhpadmin [preauth]
Jan  1 04:40:57 host sshd[31853]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 04:40:57 host sshd[31853]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.178.145.171
Jan  1 04:40:59 host sshd[31853]: Failed password for invalid user vhpadmin from 207.178.145.171 port 46142 ssh2
Jan  1 04:40:59 host sshd[31856]: Invalid user wangyp from 92.46.108.20 port 46702
Jan  1 04:40:59 host sshd[31856]: input_userauth_request: invalid user wangyp [preauth]
Jan  1 04:41:00 host sshd[31853]: Received disconnect from 207.178.145.171 port 46142:11: Bye Bye [preauth]
Jan  1 04:41:00 host sshd[31853]: Disconnected from 207.178.145.171 port 46142 [preauth]
Jan  1 04:41:00 host sshd[31856]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 04:41:00 host sshd[31856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20
Jan  1 04:41:02 host sshd[31856]: Failed password for invalid user wangyp from 92.46.108.20 port 46702 ssh2
Jan  1 04:41:03 host sshd[31856]: Connection closed by 92.46.108.20 port 46702 [preauth]
Jan  1 04:44:18 host sshd[32235]: Invalid user visitante from 164.92.206.140 port 59054
Jan  1 04:44:18 host sshd[32235]: input_userauth_request: invalid user visitante [preauth]
Jan  1 04:44:18 host sshd[32235]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 04:44:18 host sshd[32235]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.206.140
Jan  1 04:44:19 host sshd[32235]: Failed password for invalid user visitante from 164.92.206.140 port 59054 ssh2
Jan  1 04:44:20 host sshd[32235]: Received disconnect from 164.92.206.140 port 59054:11: Bye Bye [preauth]
Jan  1 04:44:20 host sshd[32235]: Disconnected from 164.92.206.140 port 59054 [preauth]
Jan  1 04:45:20 host sshd[32362]: Invalid user huang from 27.1.253.142 port 59007
Jan  1 04:45:20 host sshd[32362]: input_userauth_request: invalid user huang [preauth]
Jan  1 04:45:20 host sshd[32362]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 04:45:20 host sshd[32362]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.1.253.142
Jan  1 04:45:22 host sshd[32362]: Failed password for invalid user huang from 27.1.253.142 port 59007 ssh2
Jan  1 04:45:22 host sshd[32362]: Received disconnect from 27.1.253.142 port 59007:11: Bye Bye [preauth]
Jan  1 04:45:22 host sshd[32362]: Disconnected from 27.1.253.142 port 59007 [preauth]
Jan  1 04:45:28 host sshd[32392]: Invalid user amandabackup from 194.152.214.252 port 57577
Jan  1 04:45:28 host sshd[32392]: input_userauth_request: invalid user amandabackup [preauth]
Jan  1 04:45:28 host sshd[32392]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 04:45:28 host sshd[32392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.152.214.252
Jan  1 04:45:30 host sshd[32392]: Failed password for invalid user amandabackup from 194.152.214.252 port 57577 ssh2
Jan  1 04:45:31 host sshd[32392]: Received disconnect from 194.152.214.252 port 57577:11: Bye Bye [preauth]
Jan  1 04:45:31 host sshd[32392]: Disconnected from 194.152.214.252 port 57577 [preauth]
Jan  1 04:46:04 host sshd[32449]: Invalid user monitora from 165.227.176.35 port 47612
Jan  1 04:46:04 host sshd[32449]: input_userauth_request: invalid user monitora [preauth]
Jan  1 04:46:04 host sshd[32449]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 04:46:04 host sshd[32449]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.176.35
Jan  1 04:46:06 host sshd[32449]: Failed password for invalid user monitora from 165.227.176.35 port 47612 ssh2
Jan  1 04:46:06 host sshd[32449]: Received disconnect from 165.227.176.35 port 47612:11: Bye Bye [preauth]
Jan  1 04:46:06 host sshd[32449]: Disconnected from 165.227.176.35 port 47612 [preauth]
Jan  1 04:46:11 host sshd[32456]: Invalid user xx from 164.92.206.140 port 44620
Jan  1 04:46:11 host sshd[32456]: input_userauth_request: invalid user xx [preauth]
Jan  1 04:46:11 host sshd[32456]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 04:46:11 host sshd[32456]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.206.140
Jan  1 04:46:13 host sshd[32456]: Failed password for invalid user xx from 164.92.206.140 port 44620 ssh2
Jan  1 04:46:13 host sshd[32456]: Received disconnect from 164.92.206.140 port 44620:11: Bye Bye [preauth]
Jan  1 04:46:13 host sshd[32456]: Disconnected from 164.92.206.140 port 44620 [preauth]
Jan  1 04:47:28 host sshd[32603]: Invalid user ubuntu from 164.92.206.140 port 42240
Jan  1 04:47:28 host sshd[32603]: input_userauth_request: invalid user ubuntu [preauth]
Jan  1 04:47:28 host sshd[32603]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 04:47:28 host sshd[32603]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.206.140
Jan  1 04:47:30 host sshd[32603]: Failed password for invalid user ubuntu from 164.92.206.140 port 42240 ssh2
Jan  1 04:47:30 host sshd[32603]: Received disconnect from 164.92.206.140 port 42240:11: Bye Bye [preauth]
Jan  1 04:47:30 host sshd[32603]: Disconnected from 164.92.206.140 port 42240 [preauth]
Jan  1 04:48:09 host sshd[349]: Invalid user ha from 165.227.176.35 port 59986
Jan  1 04:48:09 host sshd[349]: input_userauth_request: invalid user ha [preauth]
Jan  1 04:48:09 host sshd[349]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 04:48:09 host sshd[349]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.176.35
Jan  1 04:48:12 host sshd[349]: Failed password for invalid user ha from 165.227.176.35 port 59986 ssh2
Jan  1 04:48:12 host sshd[349]: Received disconnect from 165.227.176.35 port 59986:11: Bye Bye [preauth]
Jan  1 04:48:12 host sshd[349]: Disconnected from 165.227.176.35 port 59986 [preauth]
Jan  1 04:48:36 host sshd[441]: User root from 69.4.135.243 not allowed because not listed in AllowUsers
Jan  1 04:48:36 host sshd[441]: input_userauth_request: invalid user root [preauth]
Jan  1 04:48:37 host unix_chkpwd[452]: password check failed for user (root)
Jan  1 04:48:37 host sshd[441]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.4.135.243  user=root
Jan  1 04:48:37 host sshd[441]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 04:48:38 host sshd[441]: Failed password for invalid user root from 69.4.135.243 port 48832 ssh2
Jan  1 04:48:39 host sshd[441]: Received disconnect from 69.4.135.243 port 48832:11: Bye Bye [preauth]
Jan  1 04:48:39 host sshd[441]: Disconnected from 69.4.135.243 port 48832 [preauth]
Jan  1 04:49:07 host sshd[481]: Invalid user wdd from 194.152.214.252 port 54474
Jan  1 04:49:07 host sshd[481]: input_userauth_request: invalid user wdd [preauth]
Jan  1 04:49:07 host sshd[481]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 04:49:07 host sshd[481]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.152.214.252
Jan  1 04:49:09 host sshd[481]: Failed password for invalid user wdd from 194.152.214.252 port 54474 ssh2
Jan  1 04:49:10 host sshd[481]: Received disconnect from 194.152.214.252 port 54474:11: Bye Bye [preauth]
Jan  1 04:49:10 host sshd[481]: Disconnected from 194.152.214.252 port 54474 [preauth]
Jan  1 04:50:20 host sshd[648]: Connection closed by 162.142.125.219 port 42602 [preauth]
Jan  1 04:51:58 host sshd[864]: Invalid user mukesh from 194.152.214.252 port 53412
Jan  1 04:51:58 host sshd[864]: input_userauth_request: invalid user mukesh [preauth]
Jan  1 04:51:58 host sshd[864]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 04:51:58 host sshd[864]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.152.214.252
Jan  1 04:52:00 host sshd[864]: Failed password for invalid user mukesh from 194.152.214.252 port 53412 ssh2
Jan  1 04:52:02 host sshd[864]: Received disconnect from 194.152.214.252 port 53412:11: Bye Bye [preauth]
Jan  1 04:52:02 host sshd[864]: Disconnected from 194.152.214.252 port 53412 [preauth]
Jan  1 04:53:33 host sshd[1212]: User root from 27.1.253.142 not allowed because not listed in AllowUsers
Jan  1 04:53:33 host sshd[1212]: input_userauth_request: invalid user root [preauth]
Jan  1 04:53:33 host unix_chkpwd[1217]: password check failed for user (root)
Jan  1 04:53:34 host sshd[1212]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.1.253.142  user=root
Jan  1 04:53:34 host sshd[1212]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 04:53:36 host sshd[1212]: Failed password for invalid user root from 27.1.253.142 port 36357 ssh2
Jan  1 04:53:36 host sshd[1212]: Received disconnect from 27.1.253.142 port 36357:11: Bye Bye [preauth]
Jan  1 04:53:36 host sshd[1212]: Disconnected from 27.1.253.142 port 36357 [preauth]
Jan  1 04:57:32 host sshd[1827]: Invalid user user from 162.218.126.136 port 57406
Jan  1 04:57:32 host sshd[1827]: input_userauth_request: invalid user user [preauth]
Jan  1 04:57:33 host sshd[1827]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 04:57:33 host sshd[1827]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136
Jan  1 04:57:34 host sshd[1827]: Failed password for invalid user user from 162.218.126.136 port 57406 ssh2
Jan  1 04:57:34 host sshd[1827]: Connection closed by 162.218.126.136 port 57406 [preauth]
Jan  1 04:58:10 host sshd[1900]: Connection closed by 69.4.135.243 port 35339 [preauth]
Jan  1 05:03:30 host sshd[2647]: User root from 106.10.122.53 not allowed because not listed in AllowUsers
Jan  1 05:03:30 host sshd[2647]: input_userauth_request: invalid user root [preauth]
Jan  1 05:03:30 host unix_chkpwd[2650]: password check failed for user (root)
Jan  1 05:03:30 host sshd[2647]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53  user=root
Jan  1 05:03:30 host sshd[2647]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 05:03:32 host sshd[2647]: Failed password for invalid user root from 106.10.122.53 port 57540 ssh2
Jan  1 05:03:32 host sshd[2647]: Connection closed by 106.10.122.53 port 57540 [preauth]
Jan  1 05:04:45 host sshd[2674]: Connection closed by 69.4.135.243 port 37686 [preauth]
Jan  1 05:06:56 host sshd[3131]: Connection closed by 69.4.135.243 port 52929 [preauth]
Jan  1 05:09:46 host sshd[3465]: Invalid user guest from 69.4.135.243 port 39876
Jan  1 05:09:46 host sshd[3465]: input_userauth_request: invalid user guest [preauth]
Jan  1 05:09:46 host sshd[3465]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 05:09:46 host sshd[3465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.4.135.243
Jan  1 05:09:47 host sshd[3465]: Failed password for invalid user guest from 69.4.135.243 port 39876 ssh2
Jan  1 05:14:53 host sshd[4192]: Invalid user user01 from 59.152.237.118 port 44764
Jan  1 05:14:53 host sshd[4192]: input_userauth_request: invalid user user01 [preauth]
Jan  1 05:14:53 host sshd[4192]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 05:14:53 host sshd[4192]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.152.237.118
Jan  1 05:14:54 host sshd[4192]: Failed password for invalid user user01 from 59.152.237.118 port 44764 ssh2
Jan  1 05:14:54 host sshd[4192]: Received disconnect from 59.152.237.118 port 44764:11: Bye Bye [preauth]
Jan  1 05:14:54 host sshd[4192]: Disconnected from 59.152.237.118 port 44764 [preauth]
Jan  1 05:15:20 host sshd[4364]: Invalid user fb from 52.140.206.1 port 1024
Jan  1 05:15:20 host sshd[4364]: input_userauth_request: invalid user fb [preauth]
Jan  1 05:15:20 host sshd[4364]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 05:15:20 host sshd[4364]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.140.206.1
Jan  1 05:15:23 host sshd[4364]: Failed password for invalid user fb from 52.140.206.1 port 1024 ssh2
Jan  1 05:15:23 host sshd[4364]: Received disconnect from 52.140.206.1 port 1024:11: Bye Bye [preauth]
Jan  1 05:15:23 host sshd[4364]: Disconnected from 52.140.206.1 port 1024 [preauth]
Jan  1 05:16:45 host sshd[4552]: User root from 59.152.237.118 not allowed because not listed in AllowUsers
Jan  1 05:16:45 host sshd[4552]: input_userauth_request: invalid user root [preauth]
Jan  1 05:16:45 host unix_chkpwd[4556]: password check failed for user (root)
Jan  1 05:16:45 host sshd[4552]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.152.237.118  user=root
Jan  1 05:16:45 host sshd[4552]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 05:16:46 host sshd[4550]: User root from 80.94.92.241 not allowed because not listed in AllowUsers
Jan  1 05:16:46 host sshd[4550]: input_userauth_request: invalid user root [preauth]
Jan  1 05:16:46 host sshd[4554]: User root from 80.94.92.241 not allowed because not listed in AllowUsers
Jan  1 05:16:46 host sshd[4554]: input_userauth_request: invalid user root [preauth]
Jan  1 05:16:46 host unix_chkpwd[4558]: password check failed for user (root)
Jan  1 05:16:46 host sshd[4550]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.94.92.241  user=root
Jan  1 05:16:46 host sshd[4550]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 05:16:47 host unix_chkpwd[4559]: password check failed for user (root)
Jan  1 05:16:47 host sshd[4554]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.94.92.241  user=root
Jan  1 05:16:47 host sshd[4554]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 05:16:47 host sshd[4552]: Failed password for invalid user root from 59.152.237.118 port 44018 ssh2
Jan  1 05:16:47 host sshd[4552]: Received disconnect from 59.152.237.118 port 44018:11: Bye Bye [preauth]
Jan  1 05:16:47 host sshd[4552]: Disconnected from 59.152.237.118 port 44018 [preauth]
Jan  1 05:16:48 host sshd[4550]: Failed password for invalid user root from 80.94.92.241 port 60190 ssh2
Jan  1 05:16:48 host sshd[4550]: Connection closed by 80.94.92.241 port 60190 [preauth]
Jan  1 05:16:49 host sshd[4554]: Failed password for invalid user root from 80.94.92.241 port 60218 ssh2
Jan  1 05:16:49 host sshd[4554]: Connection closed by 80.94.92.241 port 60218 [preauth]
Jan  1 05:18:53 host sshd[4834]: Invalid user xj from 157.245.101.171 port 37968
Jan  1 05:18:53 host sshd[4834]: input_userauth_request: invalid user xj [preauth]
Jan  1 05:18:53 host sshd[4834]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 05:18:53 host sshd[4834]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.101.171
Jan  1 05:18:54 host sshd[4834]: Failed password for invalid user xj from 157.245.101.171 port 37968 ssh2
Jan  1 05:18:54 host sshd[4834]: Received disconnect from 157.245.101.171 port 37968:11: Bye Bye [preauth]
Jan  1 05:18:54 host sshd[4834]: Disconnected from 157.245.101.171 port 37968 [preauth]
Jan  1 05:19:30 host sshd[4927]: User root from 52.140.206.1 not allowed because not listed in AllowUsers
Jan  1 05:19:30 host sshd[4927]: input_userauth_request: invalid user root [preauth]
Jan  1 05:19:30 host unix_chkpwd[4930]: password check failed for user (root)
Jan  1 05:19:30 host sshd[4927]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.140.206.1  user=root
Jan  1 05:19:30 host sshd[4927]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 05:19:32 host sshd[4927]: Failed password for invalid user root from 52.140.206.1 port 1024 ssh2
Jan  1 05:19:32 host sshd[4927]: Received disconnect from 52.140.206.1 port 1024:11: Bye Bye [preauth]
Jan  1 05:19:32 host sshd[4927]: Disconnected from 52.140.206.1 port 1024 [preauth]
Jan  1 05:21:08 host sshd[5278]: Invalid user mayer from 34.68.149.134 port 35738
Jan  1 05:21:08 host sshd[5278]: input_userauth_request: invalid user mayer [preauth]
Jan  1 05:21:08 host sshd[5278]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 05:21:08 host sshd[5278]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.68.149.134
Jan  1 05:21:09 host sshd[5285]: Invalid user corpus from 161.82.213.204 port 40810
Jan  1 05:21:09 host sshd[5285]: input_userauth_request: invalid user corpus [preauth]
Jan  1 05:21:09 host sshd[5285]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 05:21:09 host sshd[5285]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.82.213.204
Jan  1 05:21:10 host sshd[5278]: Failed password for invalid user mayer from 34.68.149.134 port 35738 ssh2
Jan  1 05:21:10 host sshd[5278]: Received disconnect from 34.68.149.134 port 35738:11: Bye Bye [preauth]
Jan  1 05:21:10 host sshd[5278]: Disconnected from 34.68.149.134 port 35738 [preauth]
Jan  1 05:21:11 host sshd[5285]: Failed password for invalid user corpus from 161.82.213.204 port 40810 ssh2
Jan  1 05:21:11 host sshd[5285]: Received disconnect from 161.82.213.204 port 40810:11: Bye Bye [preauth]
Jan  1 05:21:11 host sshd[5285]: Disconnected from 161.82.213.204 port 40810 [preauth]
Jan  1 05:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  1 05:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 05:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 05:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  1 05:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 05:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 05:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  1 05:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 05:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 05:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  1 05:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 05:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 05:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  1 05:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 05:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 05:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  1 05:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 05:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 05:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  1 05:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 05:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  1 05:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 05:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  1 05:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 05:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  1 05:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 05:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  1 05:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 05:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  1 05:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 05:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  1 05:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 05:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=gifterman user-2=palco123 user-3=phmetals user-4=kottayamcalldriv user-5=wwwnexidigital user-6=mrsclean user-7=bonifacegroup user-8=wwwevmhonda user-9=straightcurve user-10=wwwletsstalkfood user-11=vfmassets user-12=wwwtestugo user-13=shalinijames user-14=pmcresources user-15=disposeat user-16=remysagr user-17=wwwkmaorg user-18=woodpeck user-19=wwwkapin user-20=travelboniface user-21=wwwrmswll user-22=keralaholi user-23=wwwresourcehunte user-24=ugotscom user-25=wwwpmcresource user-26=dartsimp user-27=a2zgroup user-28=laundryboniface user-29=cochintaxi user-30=wwwkaretakers feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  1 05:21:50 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  1 05:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 05:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  1 05:21:50 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  1 05:21:50 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  1 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=evmhonda.com --output=json
Jan  1 05:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 05:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/test -e /home/wwwevmhonda/wordpress-backups
Jan  1 05:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  1 05:21:50 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  1 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && find -H /home/wwwevmhonda/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  1 05:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  1 05:21:50 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  1 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=letsstalkfood.com --output=json
Jan  1 05:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 05:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/wordpress-backups
Jan  1 05:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  1 05:21:51 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  1 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && find -H /home/wwwletsstalkfood/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  1 05:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  1 05:21:51 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  1 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=mrsclean.co.in --output=json
Jan  1 05:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 05:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/wordpress-backups
Jan  1 05:21:51 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  1 05:21:51 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  1 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/backup && find -H /home/mrsclean/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  1 05:21:51 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  1 05:21:51 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  1 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/wordpress-backups
Jan  1 05:21:51 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  1 05:21:51 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  1 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/blog && find -H /home/mrsclean/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  1 05:21:51 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  1 05:21:51 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  1 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=shalinijames.com --output=json
Jan  1 05:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 05:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/wordpress-backups
Jan  1 05:21:51 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  1 05:21:51 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  1 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && find -H /home/shalinijames/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  1 05:21:51 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  1 05:21:51 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  1 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=testugo.in --output=json
Jan  1 05:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 05:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups
Jan  1 05:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  1 05:21:51 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  1 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && find -H /home/wwwtestugo/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  1 05:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  1 05:21:51 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  1 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups
Jan  1 05:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  1 05:21:51 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  1 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && find -H /home/wwwtestugo/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  1 05:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  1 05:21:51 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  1 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups
Jan  1 05:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  1 05:21:51 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  1 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && find -H /home/wwwtestugo/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  1 05:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  1 05:21:51 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  1 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=ugotechnologies.com --output=json
Jan  1 05:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 05:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups
Jan  1 05:21:51 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  1 05:21:51 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  1 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/boniface/blog && find -H /home/ugotscom/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  1 05:21:52 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  1 05:21:52 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  1 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups
Jan  1 05:21:52 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  1 05:21:52 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  1 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && find -H /home/ugotscom/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  1 05:21:52 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  1 05:21:52 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  1 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups
Jan  1 05:21:52 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  1 05:21:52 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  1 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && find -H /home/ugotscom/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  1 05:21:52 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  1 05:21:52 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  1 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=woodpeckerindia.com --output=json
Jan  1 05:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 05:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/test -e /home/woodpeck/wordpress-backups
Jan  1 05:21:52 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0)
Jan  1 05:21:52 host sudo: pam_unix(sudo:session): session closed for user woodpeck
Jan  1 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html/wp && find -H /home/woodpeck/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  1 05:21:52 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0)
Jan  1 05:21:52 host sudo: pam_unix(sudo:session): session closed for user woodpeck
Jan  1 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=panlys.com --output=json
Jan  1 05:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 05:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/wordpress-backups
Jan  1 05:21:52 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  1 05:21:52 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  1 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && find -H /home/palco123/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  1 05:21:52 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  1 05:21:52 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  1 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=resourcehunters.com --output=json
Jan  1 05:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 05:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/test -e /home/wwwresourcehunte/wordpress-backups
Jan  1 05:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  1 05:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  1 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && find -H /home/wwwresourcehunte/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  1 05:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  1 05:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  1 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /var/cpanel/licenseid_credentials.json
Jan  1 05:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 05:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  1 05:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 05:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=gifterman ; COMMAND=/bin/cat /home/gifterman/.wp-toolkit-identifier
Jan  1 05:21:52 host sudo: pam_unix(sudo:session): session opened for user gifterman by (uid=0)
Jan  1 05:21:52 host sudo: pam_unix(sudo:session): session closed for user gifterman
Jan  1 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/cat /home/palco123/.wp-toolkit-identifier
Jan  1 05:21:52 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  1 05:21:52 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  1 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=phmetals ; COMMAND=/bin/cat /home/phmetals/.wp-toolkit-identifier
Jan  1 05:21:52 host sudo: pam_unix(sudo:session): session opened for user phmetals by (uid=0)
Jan  1 05:21:52 host sudo: pam_unix(sudo:session): session closed for user phmetals
Jan  1 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=kottayamcalldriv ; COMMAND=/bin/cat /home/kottayamcalldriv/.wp-toolkit-identifier
Jan  1 05:21:52 host sudo: pam_unix(sudo:session): session opened for user kottayamcalldriv by (uid=0)
Jan  1 05:21:52 host sudo: pam_unix(sudo:session): session closed for user kottayamcalldriv
Jan  1 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwnexidigital ; COMMAND=/bin/cat /home/wwwnexidigital/.wp-toolkit-identifier
Jan  1 05:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwnexidigital by (uid=0)
Jan  1 05:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwnexidigital
Jan  1 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/cat /home/mrsclean/.wp-toolkit-identifier
Jan  1 05:21:53 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  1 05:21:53 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  1 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=bonifacegroup ; COMMAND=/bin/cat /home/bonifacegroup/.wp-toolkit-identifier
Jan  1 05:21:53 host sudo: pam_unix(sudo:session): session opened for user bonifacegroup by (uid=0)
Jan  1 05:21:53 host sudo: pam_unix(sudo:session): session closed for user bonifacegroup
Jan  1 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/cat /home/wwwevmhonda/.wp-toolkit-identifier
Jan  1 05:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  1 05:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  1 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=straightcurve ; COMMAND=/bin/cat /home/straightcurve/.wp-toolkit-identifier
Jan  1 05:21:53 host sudo: pam_unix(sudo:session): session opened for user straightcurve by (uid=0)
Jan  1 05:21:53 host sudo: pam_unix(sudo:session): session closed for user straightcurve
Jan  1 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/cat /home/wwwletsstalkfood/.wp-toolkit-identifier
Jan  1 05:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  1 05:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  1 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=vfmassets ; COMMAND=/bin/cat /home/vfmassets/.wp-toolkit-identifier
Jan  1 05:21:53 host sudo: pam_unix(sudo:session): session opened for user vfmassets by (uid=0)
Jan  1 05:21:53 host sudo: pam_unix(sudo:session): session closed for user vfmassets
Jan  1 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/cat /home/wwwtestugo/.wp-toolkit-identifier
Jan  1 05:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  1 05:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  1 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/cat /home/shalinijames/.wp-toolkit-identifier
Jan  1 05:21:53 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  1 05:21:53 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  1 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=pmcresources ; COMMAND=/bin/cat /home/pmcresources/.wp-toolkit-identifier
Jan  1 05:21:53 host sudo: pam_unix(sudo:session): session opened for user pmcresources by (uid=0)
Jan  1 05:21:53 host sudo: pam_unix(sudo:session): session closed for user pmcresources
Jan  1 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=disposeat ; COMMAND=/bin/cat /home/disposeat/.wp-toolkit-identifier
Jan  1 05:21:53 host sudo: pam_unix(sudo:session): session opened for user disposeat by (uid=0)
Jan  1 05:21:53 host sudo: pam_unix(sudo:session): session closed for user disposeat
Jan  1 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=remysagr ; COMMAND=/bin/cat /home/remysagr/.wp-toolkit-identifier
Jan  1 05:21:53 host sudo: pam_unix(sudo:session): session opened for user remysagr by (uid=0)
Jan  1 05:21:53 host sudo: pam_unix(sudo:session): session closed for user remysagr
Jan  1 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkmaorg ; COMMAND=/bin/cat /home/wwwkmaorg/.wp-toolkit-identifier
Jan  1 05:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwkmaorg by (uid=0)
Jan  1 05:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwkmaorg
Jan  1 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/cat /home/woodpeck/.wp-toolkit-identifier
Jan  1 05:21:53 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0)
Jan  1 05:21:53 host sudo: pam_unix(sudo:session): session closed for user woodpeck
Jan  1 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkapin ; COMMAND=/bin/cat /home/wwwkapin/.wp-toolkit-identifier
Jan  1 05:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwkapin by (uid=0)
Jan  1 05:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwkapin
Jan  1 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=travelboniface ; COMMAND=/bin/cat /home/travelboniface/.wp-toolkit-identifier
Jan  1 05:21:53 host sudo: pam_unix(sudo:session): session opened for user travelboniface by (uid=0)
Jan  1 05:21:53 host sudo: pam_unix(sudo:session): session closed for user travelboniface
Jan  1 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwrmswll ; COMMAND=/bin/cat /home/wwwrmswll/.wp-toolkit-identifier
Jan  1 05:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwrmswll by (uid=0)
Jan  1 05:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwrmswll
Jan  1 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/cat /home/keralaholi/.wp-toolkit-identifier
Jan  1 05:21:53 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0)
Jan  1 05:21:53 host sudo: pam_unix(sudo:session): session closed for user keralaholi
Jan  1 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -f /home/keralaholi/.wp-toolkit-identifier
Jan  1 05:21:53 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0)
Jan  1 05:21:53 host sudo: pam_unix(sudo:session): session closed for user keralaholi
Jan  1 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -e /home/keralaholi/-wpt-tmp-8UNFgJ4l5MibLxpQ.wp-toolkit-identifier
Jan  1 05:21:53 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0)
Jan  1 05:21:53 host sudo: pam_unix(sudo:session): session closed for user keralaholi
Jan  1 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/sh -c cat > /home/keralaholi/-wpt-tmp-8UNFgJ4l5MibLxpQ.wp-toolkit-identifier
Jan  1 05:21:53 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0)
Jan  1 05:21:53 host sudo: pam_unix(sudo:session): session closed for user keralaholi
Jan  1 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/cat /home/wwwresourcehunte/.wp-toolkit-identifier
Jan  1 05:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  1 05:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  1 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwpmcresource ; COMMAND=/bin/cat /home/wwwpmcresource/.wp-toolkit-identifier
Jan  1 05:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwpmcresource by (uid=0)
Jan  1 05:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwpmcresource
Jan  1 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=dartsimp ; COMMAND=/bin/cat /home/dartsimp/.wp-toolkit-identifier
Jan  1 05:21:53 host sudo: pam_unix(sudo:session): session opened for user dartsimp by (uid=0)
Jan  1 05:21:53 host sudo: pam_unix(sudo:session): session closed for user dartsimp
Jan  1 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=a2zgroup ; COMMAND=/bin/cat /home/a2zgroup/.wp-toolkit-identifier
Jan  1 05:21:54 host sudo: pam_unix(sudo:session): session opened for user a2zgroup by (uid=0)
Jan  1 05:21:54 host sudo: pam_unix(sudo:session): session closed for user a2zgroup
Jan  1 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=laundryboniface ; COMMAND=/bin/cat /home/laundryboniface/.wp-toolkit-identifier
Jan  1 05:21:54 host sudo: pam_unix(sudo:session): session opened for user laundryboniface by (uid=0)
Jan  1 05:21:54 host sudo: pam_unix(sudo:session): session closed for user laundryboniface
Jan  1 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=cochintaxi ; COMMAND=/bin/cat /home/cochintaxi/.wp-toolkit-identifier
Jan  1 05:21:54 host sudo: pam_unix(sudo:session): session opened for user cochintaxi by (uid=0)
Jan  1 05:21:54 host sudo: pam_unix(sudo:session): session closed for user cochintaxi
Jan  1 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkaretakers ; COMMAND=/bin/cat /home/wwwkaretakers/.wp-toolkit-identifier
Jan  1 05:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwkaretakers by (uid=0)
Jan  1 05:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwkaretakers
Jan  1 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/cat /home/keralaholi/.wp-toolkit-identifier
Jan  1 05:21:54 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0)
Jan  1 05:21:54 host sudo: pam_unix(sudo:session): session closed for user keralaholi
Jan  1 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -f /home/keralaholi/.wp-toolkit-identifier
Jan  1 05:21:54 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0)
Jan  1 05:21:54 host sudo: pam_unix(sudo:session): session closed for user keralaholi
Jan  1 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -e /home/keralaholi/-wpt-tmp-1sdZm4200OZd8n07.wp-toolkit-identifier
Jan  1 05:21:54 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0)
Jan  1 05:21:54 host sudo: pam_unix(sudo:session): session closed for user keralaholi
Jan  1 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/sh -c cat > /home/keralaholi/-wpt-tmp-1sdZm4200OZd8n07.wp-toolkit-identifier
Jan  1 05:21:54 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0)
Jan  1 05:21:54 host sudo: pam_unix(sudo:session): session closed for user keralaholi
Jan  1 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_shared_ip --output=json
Jan  1 05:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 05:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_public_ip ip=167.71.234.10 --output=json
Jan  1 05:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 05:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  1 05:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 05:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-weWtgkLG7I60idCk.~
Jan  1 05:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 05:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-weWtgkLG7I60idCk.~'
Jan  1 05:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 05:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-weWtgkLG7I60idCk.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  1 05:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 05:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  1 05:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 05:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  1 05:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 05:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  1 05:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 05:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  1 05:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 05:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  1 05:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 05:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  1 05:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 05:21:59 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  1 05:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  1 05:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  1 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  1 05:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  1 05:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  1 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  1 05:22:01 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  1 05:22:03 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  1 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  1 05:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  1 05:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  1 05:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  1 05:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  1 05:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  1 05:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  1 05:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  1 05:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  1 05:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  1 05:22:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  1 05:22:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  1 05:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  1 05:22:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  1 05:22:10 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  1 05:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  1 05:22:11 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  1 05:22:12 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  1 05:22:20 host sshd[5979]: Invalid user guest from 111.48.205.81 port 57782
Jan  1 05:22:20 host sshd[5979]: input_userauth_request: invalid user guest [preauth]
Jan  1 05:22:20 host sshd[5979]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 05:22:20 host sshd[5979]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.48.205.81
Jan  1 05:22:22 host sshd[5979]: Failed password for invalid user guest from 111.48.205.81 port 57782 ssh2
Jan  1 05:22:32 host sshd[5979]: Received disconnect from 111.48.205.81 port 57782:11: Bye Bye [preauth]
Jan  1 05:22:32 host sshd[5979]: Disconnected from 111.48.205.81 port 57782 [preauth]
Jan  1 05:23:01 host sshd[6080]: Invalid user ubuntu from 34.68.149.134 port 56952
Jan  1 05:23:01 host sshd[6080]: input_userauth_request: invalid user ubuntu [preauth]
Jan  1 05:23:01 host sshd[6080]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 05:23:01 host sshd[6080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.68.149.134
Jan  1 05:23:03 host sshd[6080]: Failed password for invalid user ubuntu from 34.68.149.134 port 56952 ssh2
Jan  1 05:23:04 host sshd[6080]: Received disconnect from 34.68.149.134 port 56952:11: Bye Bye [preauth]
Jan  1 05:23:04 host sshd[6080]: Disconnected from 34.68.149.134 port 56952 [preauth]
Jan  1 05:23:19 host sshd[6122]: Invalid user user1 from 103.13.40.2 port 59176
Jan  1 05:23:19 host sshd[6122]: input_userauth_request: invalid user user1 [preauth]
Jan  1 05:23:19 host sshd[6122]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 05:23:19 host sshd[6122]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2
Jan  1 05:23:21 host sshd[6126]: Invalid user xr from 157.245.101.171 port 53700
Jan  1 05:23:21 host sshd[6126]: input_userauth_request: invalid user xr [preauth]
Jan  1 05:23:21 host sshd[6126]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 05:23:21 host sshd[6126]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.101.171
Jan  1 05:23:21 host sshd[6122]: Failed password for invalid user user1 from 103.13.40.2 port 59176 ssh2
Jan  1 05:23:21 host sshd[6122]: Connection closed by 103.13.40.2 port 59176 [preauth]
Jan  1 05:23:23 host sshd[6126]: Failed password for invalid user xr from 157.245.101.171 port 53700 ssh2
Jan  1 05:23:23 host sshd[6126]: Received disconnect from 157.245.101.171 port 53700:11: Bye Bye [preauth]
Jan  1 05:23:23 host sshd[6126]: Disconnected from 157.245.101.171 port 53700 [preauth]
Jan  1 05:24:02 host sshd[6199]: Invalid user madan from 34.68.149.134 port 48954
Jan  1 05:24:02 host sshd[6199]: input_userauth_request: invalid user madan [preauth]
Jan  1 05:24:02 host sshd[6199]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 05:24:02 host sshd[6199]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.68.149.134
Jan  1 05:24:04 host sshd[6199]: Failed password for invalid user madan from 34.68.149.134 port 48954 ssh2
Jan  1 05:24:04 host sshd[6199]: Received disconnect from 34.68.149.134 port 48954:11: Bye Bye [preauth]
Jan  1 05:24:04 host sshd[6199]: Disconnected from 34.68.149.134 port 48954 [preauth]
Jan  1 05:24:19 host sshd[6267]: User root from 161.82.213.204 not allowed because not listed in AllowUsers
Jan  1 05:24:19 host sshd[6267]: input_userauth_request: invalid user root [preauth]
Jan  1 05:24:19 host unix_chkpwd[6269]: password check failed for user (root)
Jan  1 05:24:19 host sshd[6267]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.82.213.204  user=root
Jan  1 05:24:19 host sshd[6267]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 05:24:21 host sshd[6267]: Failed password for invalid user root from 161.82.213.204 port 42264 ssh2
Jan  1 05:24:21 host sshd[6267]: Received disconnect from 161.82.213.204 port 42264:11: Bye Bye [preauth]
Jan  1 05:24:21 host sshd[6267]: Disconnected from 161.82.213.204 port 42264 [preauth]
Jan  1 05:24:37 host sshd[6354]: Invalid user rd from 157.245.101.171 port 48466
Jan  1 05:24:37 host sshd[6354]: input_userauth_request: invalid user rd [preauth]
Jan  1 05:24:37 host sshd[6354]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 05:24:37 host sshd[6354]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.101.171
Jan  1 05:24:39 host sshd[6354]: Failed password for invalid user rd from 157.245.101.171 port 48466 ssh2
Jan  1 05:24:39 host sshd[6354]: Received disconnect from 157.245.101.171 port 48466:11: Bye Bye [preauth]
Jan  1 05:24:39 host sshd[6354]: Disconnected from 157.245.101.171 port 48466 [preauth]
Jan  1 05:27:48 host sshd[6862]: Invalid user rancid from 111.48.205.81 port 50394
Jan  1 05:27:48 host sshd[6862]: input_userauth_request: invalid user rancid [preauth]
Jan  1 05:27:48 host sshd[6862]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 05:27:48 host sshd[6862]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.48.205.81
Jan  1 05:27:50 host sshd[6862]: Failed password for invalid user rancid from 111.48.205.81 port 50394 ssh2
Jan  1 05:27:56 host sshd[6862]: Received disconnect from 111.48.205.81 port 50394:11: Bye Bye [preauth]
Jan  1 05:27:56 host sshd[6862]: Disconnected from 111.48.205.81 port 50394 [preauth]
Jan  1 05:29:57 host sshd[7180]: Connection closed by 111.48.205.81 port 48708 [preauth]
Jan  1 05:32:01 host sshd[7460]: User root from 111.48.205.81 not allowed because not listed in AllowUsers
Jan  1 05:32:01 host sshd[7460]: input_userauth_request: invalid user root [preauth]
Jan  1 05:32:01 host unix_chkpwd[7574]: password check failed for user (root)
Jan  1 05:32:01 host sshd[7460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.48.205.81  user=root
Jan  1 05:32:01 host sshd[7460]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 05:32:02 host sshd[7460]: Failed password for invalid user root from 111.48.205.81 port 47022 ssh2
Jan  1 05:32:05 host sshd[7460]: Received disconnect from 111.48.205.81 port 47022:11: Bye Bye [preauth]
Jan  1 05:32:05 host sshd[7460]: Disconnected from 111.48.205.81 port 47022 [preauth]
Jan  1 05:40:08 host sshd[8771]: Invalid user zxc from 41.197.31.178 port 38780
Jan  1 05:40:08 host sshd[8771]: input_userauth_request: invalid user zxc [preauth]
Jan  1 05:40:09 host sshd[8771]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 05:40:09 host sshd[8771]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178
Jan  1 05:40:11 host sshd[8771]: Failed password for invalid user zxc from 41.197.31.178 port 38780 ssh2
Jan  1 05:40:11 host sshd[8771]: Connection closed by 41.197.31.178 port 38780 [preauth]
Jan  1 05:52:19 host sshd[10367]: Did not receive identification string from 205.185.123.43 port 42464
Jan  1 06:01:17 host sshd[11648]: Invalid user bitnami from 104.244.74.6 port 53906
Jan  1 06:01:17 host sshd[11648]: input_userauth_request: invalid user bitnami [preauth]
Jan  1 06:01:17 host sshd[11648]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 06:01:17 host sshd[11648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6
Jan  1 06:01:18 host sshd[11648]: Failed password for invalid user bitnami from 104.244.74.6 port 53906 ssh2
Jan  1 06:01:19 host sshd[11648]: Connection closed by 104.244.74.6 port 53906 [preauth]
Jan  1 06:02:33 host sshd[11795]: Invalid user user from 162.218.126.136 port 42086
Jan  1 06:02:33 host sshd[11795]: input_userauth_request: invalid user user [preauth]
Jan  1 06:02:33 host sshd[11795]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 06:02:33 host sshd[11795]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136
Jan  1 06:02:35 host sshd[11795]: Failed password for invalid user user from 162.218.126.136 port 42086 ssh2
Jan  1 06:02:36 host sshd[11795]: Connection closed by 162.218.126.136 port 42086 [preauth]
Jan  1 06:05:16 host sshd[12096]: Invalid user bitnami from 104.244.74.6 port 39238
Jan  1 06:05:16 host sshd[12096]: input_userauth_request: invalid user bitnami [preauth]
Jan  1 06:05:16 host sshd[12096]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 06:05:16 host sshd[12096]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6
Jan  1 06:05:19 host sshd[12096]: Failed password for invalid user bitnami from 104.244.74.6 port 39238 ssh2
Jan  1 06:05:19 host sshd[12096]: Connection closed by 104.244.74.6 port 39238 [preauth]
Jan  1 06:07:19 host sshd[12385]: User mail from 45.93.201.90 not allowed because not listed in AllowUsers
Jan  1 06:07:19 host sshd[12385]: input_userauth_request: invalid user mail [preauth]
Jan  1 06:07:19 host sshd[12385]: Failed none for invalid user mail from 45.93.201.90 port 45170 ssh2
Jan  1 06:07:22 host unix_chkpwd[12399]: password check failed for user (mail)
Jan  1 06:07:22 host sshd[12385]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90  user=mail
Jan  1 06:07:22 host sshd[12385]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "mail"
Jan  1 06:07:24 host sshd[12385]: Failed password for invalid user mail from 45.93.201.90 port 45170 ssh2
Jan  1 06:07:27 host unix_chkpwd[12425]: password check failed for user (mail)
Jan  1 06:07:27 host sshd[12385]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "mail"
Jan  1 06:07:29 host sshd[12385]: Failed password for invalid user mail from 45.93.201.90 port 45170 ssh2
Jan  1 06:07:32 host sshd[12385]: Connection closed by 45.93.201.90 port 45170 [preauth]
Jan  1 06:07:32 host sshd[12385]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90  user=mail
Jan  1 06:10:55 host sshd[12945]: Invalid user ftpuser from 134.209.109.149 port 33330
Jan  1 06:10:55 host sshd[12945]: input_userauth_request: invalid user ftpuser [preauth]
Jan  1 06:10:55 host sshd[12945]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 06:10:55 host sshd[12945]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.109.149
Jan  1 06:10:57 host sshd[12945]: Failed password for invalid user ftpuser from 134.209.109.149 port 33330 ssh2
Jan  1 06:10:57 host sshd[12945]: Received disconnect from 134.209.109.149 port 33330:11: Bye Bye [preauth]
Jan  1 06:10:57 host sshd[12945]: Disconnected from 134.209.109.149 port 33330 [preauth]
Jan  1 06:11:40 host sshd[13044]: Invalid user ll from 23.95.44.105 port 41526
Jan  1 06:11:40 host sshd[13044]: input_userauth_request: invalid user ll [preauth]
Jan  1 06:11:40 host sshd[13044]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 06:11:40 host sshd[13044]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.95.44.105
Jan  1 06:11:42 host sshd[13044]: Failed password for invalid user ll from 23.95.44.105 port 41526 ssh2
Jan  1 06:11:42 host sshd[13044]: Received disconnect from 23.95.44.105 port 41526:11: Bye Bye [preauth]
Jan  1 06:11:42 host sshd[13044]: Disconnected from 23.95.44.105 port 41526 [preauth]
Jan  1 06:11:44 host sshd[13051]: Invalid user ac from 170.106.115.231 port 48970
Jan  1 06:11:44 host sshd[13051]: input_userauth_request: invalid user ac [preauth]
Jan  1 06:11:44 host sshd[13051]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 06:11:44 host sshd[13051]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.106.115.231
Jan  1 06:11:46 host sshd[13051]: Failed password for invalid user ac from 170.106.115.231 port 48970 ssh2
Jan  1 06:11:46 host sshd[13051]: Received disconnect from 170.106.115.231 port 48970:11: Bye Bye [preauth]
Jan  1 06:11:46 host sshd[13051]: Disconnected from 170.106.115.231 port 48970 [preauth]
Jan  1 06:12:52 host sshd[13225]: User root from 197.5.145.81 not allowed because not listed in AllowUsers
Jan  1 06:12:52 host sshd[13225]: input_userauth_request: invalid user root [preauth]
Jan  1 06:12:52 host unix_chkpwd[13229]: password check failed for user (root)
Jan  1 06:12:52 host sshd[13225]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.5.145.81  user=root
Jan  1 06:12:52 host sshd[13225]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 06:12:54 host sshd[13225]: Failed password for invalid user root from 197.5.145.81 port 21951 ssh2
Jan  1 06:12:54 host sshd[13225]: Received disconnect from 197.5.145.81 port 21951:11: Bye Bye [preauth]
Jan  1 06:12:54 host sshd[13225]: Disconnected from 197.5.145.81 port 21951 [preauth]
Jan  1 06:14:13 host sshd[13485]: Invalid user p from 164.92.86.206 port 36554
Jan  1 06:14:13 host sshd[13485]: input_userauth_request: invalid user p [preauth]
Jan  1 06:14:13 host sshd[13485]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 06:14:13 host sshd[13485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.86.206
Jan  1 06:14:15 host sshd[13485]: Failed password for invalid user p from 164.92.86.206 port 36554 ssh2
Jan  1 06:14:15 host sshd[13485]: Received disconnect from 164.92.86.206 port 36554:11: Bye Bye [preauth]
Jan  1 06:14:15 host sshd[13485]: Disconnected from 164.92.86.206 port 36554 [preauth]
Jan  1 06:14:37 host sshd[13547]: Connection closed by 45.79.181.104 port 42718 [preauth]
Jan  1 06:14:39 host sshd[13559]: Connection closed by 45.79.181.104 port 42728 [preauth]
Jan  1 06:14:42 host sshd[13565]: Connection closed by 45.79.181.104 port 2414 [preauth]
Jan  1 06:15:19 host sshd[13691]: Invalid user tim from 51.38.70.212 port 43122
Jan  1 06:15:19 host sshd[13691]: input_userauth_request: invalid user tim [preauth]
Jan  1 06:15:19 host sshd[13691]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 06:15:19 host sshd[13691]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.70.212
Jan  1 06:15:21 host sshd[13691]: Failed password for invalid user tim from 51.38.70.212 port 43122 ssh2
Jan  1 06:15:21 host sshd[13691]: Received disconnect from 51.38.70.212 port 43122:11: Bye Bye [preauth]
Jan  1 06:15:21 host sshd[13691]: Disconnected from 51.38.70.212 port 43122 [preauth]
Jan  1 06:17:10 host sshd[14050]: User root from 134.209.109.149 not allowed because not listed in AllowUsers
Jan  1 06:17:10 host sshd[14050]: input_userauth_request: invalid user root [preauth]
Jan  1 06:17:10 host unix_chkpwd[14053]: password check failed for user (root)
Jan  1 06:17:10 host sshd[14050]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.109.149  user=root
Jan  1 06:17:10 host sshd[14050]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 06:17:12 host sshd[14050]: Failed password for invalid user root from 134.209.109.149 port 36308 ssh2
Jan  1 06:17:13 host sshd[14050]: Received disconnect from 134.209.109.149 port 36308:11: Bye Bye [preauth]
Jan  1 06:17:13 host sshd[14050]: Disconnected from 134.209.109.149 port 36308 [preauth]
Jan  1 06:17:14 host sshd[14057]: User root from 197.5.145.81 not allowed because not listed in AllowUsers
Jan  1 06:17:14 host sshd[14057]: input_userauth_request: invalid user root [preauth]
Jan  1 06:17:15 host unix_chkpwd[14061]: password check failed for user (root)
Jan  1 06:17:15 host sshd[14057]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.5.145.81  user=root
Jan  1 06:17:15 host sshd[14057]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 06:17:17 host sshd[14057]: Failed password for invalid user root from 197.5.145.81 port 21952 ssh2
Jan  1 06:17:23 host sshd[14141]: Invalid user bbbbb from 23.95.44.105 port 39678
Jan  1 06:17:23 host sshd[14141]: input_userauth_request: invalid user bbbbb [preauth]
Jan  1 06:17:23 host sshd[14141]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 06:17:23 host sshd[14141]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.95.44.105
Jan  1 06:17:26 host sshd[14141]: Failed password for invalid user bbbbb from 23.95.44.105 port 39678 ssh2
Jan  1 06:17:26 host sshd[14141]: Received disconnect from 23.95.44.105 port 39678:11: Bye Bye [preauth]
Jan  1 06:17:26 host sshd[14141]: Disconnected from 23.95.44.105 port 39678 [preauth]
Jan  1 06:17:52 host sshd[14208]: Invalid user ac from 164.92.86.206 port 56964
Jan  1 06:17:52 host sshd[14208]: input_userauth_request: invalid user ac [preauth]
Jan  1 06:17:52 host sshd[14208]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 06:17:52 host sshd[14208]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.86.206
Jan  1 06:17:54 host sshd[14208]: Failed password for invalid user ac from 164.92.86.206 port 56964 ssh2
Jan  1 06:17:55 host sshd[14208]: Received disconnect from 164.92.86.206 port 56964:11: Bye Bye [preauth]
Jan  1 06:17:55 host sshd[14208]: Disconnected from 164.92.86.206 port 56964 [preauth]
Jan  1 06:18:01 host sshd[14233]: User root from 51.38.70.212 not allowed because not listed in AllowUsers
Jan  1 06:18:01 host sshd[14233]: input_userauth_request: invalid user root [preauth]
Jan  1 06:18:01 host unix_chkpwd[14247]: password check failed for user (root)
Jan  1 06:18:01 host sshd[14233]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.70.212  user=root
Jan  1 06:18:01 host sshd[14233]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 06:18:04 host sshd[14233]: Failed password for invalid user root from 51.38.70.212 port 33304 ssh2
Jan  1 06:18:04 host sshd[14233]: Received disconnect from 51.38.70.212 port 33304:11: Bye Bye [preauth]
Jan  1 06:18:04 host sshd[14233]: Disconnected from 51.38.70.212 port 33304 [preauth]
Jan  1 06:18:33 host sshd[14370]: Invalid user xymon from 23.95.44.105 port 35194
Jan  1 06:18:33 host sshd[14370]: input_userauth_request: invalid user xymon [preauth]
Jan  1 06:18:33 host sshd[14370]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 06:18:33 host sshd[14370]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.95.44.105
Jan  1 06:18:35 host sshd[14370]: Failed password for invalid user xymon from 23.95.44.105 port 35194 ssh2
Jan  1 06:18:35 host sshd[14370]: Received disconnect from 23.95.44.105 port 35194:11: Bye Bye [preauth]
Jan  1 06:18:35 host sshd[14370]: Disconnected from 23.95.44.105 port 35194 [preauth]
Jan  1 06:19:00 host sshd[14452]: Invalid user fp from 164.92.86.206 port 55314
Jan  1 06:19:00 host sshd[14452]: input_userauth_request: invalid user fp [preauth]
Jan  1 06:19:00 host sshd[14452]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 06:19:00 host sshd[14452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.86.206
Jan  1 06:19:02 host sshd[14452]: Failed password for invalid user fp from 164.92.86.206 port 55314 ssh2
Jan  1 06:21:31 host sshd[14981]: Invalid user radmin from 170.106.115.231 port 36470
Jan  1 06:21:31 host sshd[14981]: input_userauth_request: invalid user radmin [preauth]
Jan  1 06:21:31 host sshd[14981]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 06:21:31 host sshd[14981]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.106.115.231
Jan  1 06:21:33 host sshd[14981]: Failed password for invalid user radmin from 170.106.115.231 port 36470 ssh2
Jan  1 06:21:33 host sshd[14981]: Received disconnect from 170.106.115.231 port 36470:11: Bye Bye [preauth]
Jan  1 06:21:33 host sshd[14981]: Disconnected from 170.106.115.231 port 36470 [preauth]
Jan  1 06:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  1 06:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 06:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 06:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  1 06:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 06:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 06:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  1 06:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 06:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 06:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  1 06:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 06:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 06:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  1 06:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 06:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 06:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  1 06:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 06:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 06:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  1 06:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 06:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 06:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  1 06:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 06:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 06:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  1 06:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 06:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 06:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  1 06:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 06:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 06:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  1 06:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 06:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 06:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  1 06:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 06:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 06:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  1 06:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 06:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 06:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=laundryboniface user-2=dartsimp user-3=a2zgroup user-4=cochintaxi user-5=wwwkaretakers user-6=wwwrmswll user-7=keralaholi user-8=wwwresourcehunte user-9=ugotscom user-10=travelboniface user-11=wwwpmcresource user-12=pmcresources user-13=vfmassets user-14=wwwtestugo user-15=shalinijames user-16=wwwkapin user-17=woodpeck user-18=wwwkmaorg user-19=disposeat user-20=remysagr user-21=mrsclean user-22=wwwnexidigital user-23=gifterman user-24=palco123 user-25=phmetals user-26=kottayamcalldriv user-27=wwwletsstalkfood user-28=straightcurve user-29=bonifacegroup user-30=wwwevmhonda feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  1 06:21:51 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  1 06:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 06:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 06:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  1 06:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 06:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 06:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-BN3FrLGIKViojBvz.~
Jan  1 06:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 06:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 06:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-BN3FrLGIKViojBvz.~'
Jan  1 06:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 06:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 06:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-BN3FrLGIKViojBvz.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  1 06:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 06:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 06:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  1 06:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 06:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 06:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  1 06:21:51 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  1 06:21:51 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  1 06:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  1 06:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 06:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 06:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  1 06:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 06:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 06:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  1 06:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 06:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 06:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  1 06:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 06:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 06:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  1 06:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 06:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 06:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  1 06:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  1 06:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  1 06:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  1 06:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  1 06:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  1 06:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  1 06:21:56 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  1 06:21:58 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  1 06:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  1 06:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  1 06:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  1 06:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  1 06:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  1 06:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  1 06:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  1 06:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  1 06:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  1 06:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  1 06:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  1 06:22:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  1 06:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  1 06:22:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  1 06:22:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  1 06:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  1 06:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  1 06:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  1 06:25:58 host sshd[15849]: Invalid user uuu from 170.106.115.231 port 38930
Jan  1 06:25:58 host sshd[15849]: input_userauth_request: invalid user uuu [preauth]
Jan  1 06:25:58 host sshd[15849]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 06:25:58 host sshd[15849]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.106.115.231
Jan  1 06:26:00 host sshd[15849]: Failed password for invalid user uuu from 170.106.115.231 port 38930 ssh2
Jan  1 06:26:00 host sshd[15849]: Received disconnect from 170.106.115.231 port 38930:11: Bye Bye [preauth]
Jan  1 06:26:00 host sshd[15849]: Disconnected from 170.106.115.231 port 38930 [preauth]
Jan  1 06:27:18 host sshd[16178]: Invalid user pradeep from 106.10.122.53 port 50112
Jan  1 06:27:18 host sshd[16178]: input_userauth_request: invalid user pradeep [preauth]
Jan  1 06:27:18 host sshd[16178]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 06:27:18 host sshd[16178]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53
Jan  1 06:27:20 host sshd[16178]: Failed password for invalid user pradeep from 106.10.122.53 port 50112 ssh2
Jan  1 06:27:20 host sshd[16178]: Connection closed by 106.10.122.53 port 50112 [preauth]
Jan  1 06:34:35 host sshd[17364]: Invalid user bitnami from 104.244.74.6 port 44076
Jan  1 06:34:35 host sshd[17364]: input_userauth_request: invalid user bitnami [preauth]
Jan  1 06:34:35 host sshd[17364]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 06:34:35 host sshd[17364]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6
Jan  1 06:34:37 host sshd[17364]: Failed password for invalid user bitnami from 104.244.74.6 port 44076 ssh2
Jan  1 06:34:37 host sshd[17364]: Connection closed by 104.244.74.6 port 44076 [preauth]
Jan  1 06:45:14 host sshd[18730]: Invalid user dell from 103.13.40.2 port 52296
Jan  1 06:45:14 host sshd[18730]: input_userauth_request: invalid user dell [preauth]
Jan  1 06:45:14 host sshd[18730]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 06:45:14 host sshd[18730]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2
Jan  1 06:45:16 host sshd[18730]: Failed password for invalid user dell from 103.13.40.2 port 52296 ssh2
Jan  1 06:45:16 host sshd[18730]: Connection closed by 103.13.40.2 port 52296 [preauth]
Jan  1 06:46:17 host sshd[18842]: Invalid user ubuntu from 51.15.105.243 port 41856
Jan  1 06:46:17 host sshd[18842]: input_userauth_request: invalid user ubuntu [preauth]
Jan  1 06:46:17 host sshd[18842]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 06:46:17 host sshd[18842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.105.243
Jan  1 06:46:19 host sshd[18842]: Failed password for invalid user ubuntu from 51.15.105.243 port 41856 ssh2
Jan  1 06:46:19 host sshd[18842]: Received disconnect from 51.15.105.243 port 41856:11: Bye Bye [preauth]
Jan  1 06:46:19 host sshd[18842]: Disconnected from 51.15.105.243 port 41856 [preauth]
Jan  1 06:46:20 host sshd[18856]: Invalid user ubuntu from 167.99.114.108 port 50544
Jan  1 06:46:20 host sshd[18856]: input_userauth_request: invalid user ubuntu [preauth]
Jan  1 06:46:20 host sshd[18856]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 06:46:20 host sshd[18856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.114.108
Jan  1 06:46:22 host sshd[18856]: Failed password for invalid user ubuntu from 167.99.114.108 port 50544 ssh2
Jan  1 06:46:22 host sshd[18856]: Received disconnect from 167.99.114.108 port 50544:11: Bye Bye [preauth]
Jan  1 06:46:22 host sshd[18856]: Disconnected from 167.99.114.108 port 50544 [preauth]
Jan  1 06:46:31 host sshd[18893]: Invalid user admin from 189.178.141.95 port 47148
Jan  1 06:46:31 host sshd[18893]: input_userauth_request: invalid user admin [preauth]
Jan  1 06:46:31 host sshd[18893]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 06:46:31 host sshd[18893]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.178.141.95
Jan  1 06:46:33 host sshd[18893]: Failed password for invalid user admin from 189.178.141.95 port 47148 ssh2
Jan  1 06:46:33 host sshd[18893]: Received disconnect from 189.178.141.95 port 47148:11: Bye Bye [preauth]
Jan  1 06:46:33 host sshd[18893]: Disconnected from 189.178.141.95 port 47148 [preauth]
Jan  1 06:46:56 host sshd[18918]: Invalid user phion from 128.199.22.245 port 41682
Jan  1 06:46:56 host sshd[18918]: input_userauth_request: invalid user phion [preauth]
Jan  1 06:46:56 host sshd[18918]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 06:46:56 host sshd[18918]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.22.245
Jan  1 06:46:59 host sshd[18918]: Failed password for invalid user phion from 128.199.22.245 port 41682 ssh2
Jan  1 06:46:59 host sshd[18918]: Received disconnect from 128.199.22.245 port 41682:11: Bye Bye [preauth]
Jan  1 06:46:59 host sshd[18918]: Disconnected from 128.199.22.245 port 41682 [preauth]
Jan  1 06:47:37 host sshd[19007]: Invalid user deploy from 103.218.241.80 port 42160
Jan  1 06:47:37 host sshd[19007]: input_userauth_request: invalid user deploy [preauth]
Jan  1 06:47:37 host sshd[19007]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 06:47:37 host sshd[19007]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.218.241.80
Jan  1 06:47:39 host sshd[19007]: Failed password for invalid user deploy from 103.218.241.80 port 42160 ssh2
Jan  1 06:47:39 host sshd[19007]: Received disconnect from 103.218.241.80 port 42160:11: Bye Bye [preauth]
Jan  1 06:47:39 host sshd[19007]: Disconnected from 103.218.241.80 port 42160 [preauth]
Jan  1 06:47:56 host sshd[19030]: Invalid user ubuntu from 79.137.195.230 port 45776
Jan  1 06:47:56 host sshd[19030]: input_userauth_request: invalid user ubuntu [preauth]
Jan  1 06:47:56 host sshd[19030]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 06:47:56 host sshd[19030]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.195.230
Jan  1 06:47:58 host sshd[19030]: Failed password for invalid user ubuntu from 79.137.195.230 port 45776 ssh2
Jan  1 06:47:58 host sshd[19030]: Received disconnect from 79.137.195.230 port 45776:11: Bye Bye [preauth]
Jan  1 06:47:58 host sshd[19030]: Disconnected from 79.137.195.230 port 45776 [preauth]
Jan  1 06:48:09 host sshd[19055]: User root from 45.249.247.148 not allowed because not listed in AllowUsers
Jan  1 06:48:09 host sshd[19055]: input_userauth_request: invalid user root [preauth]
Jan  1 06:48:09 host unix_chkpwd[19057]: password check failed for user (root)
Jan  1 06:48:09 host sshd[19055]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.249.247.148  user=root
Jan  1 06:48:09 host sshd[19055]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 06:48:11 host sshd[19055]: Failed password for invalid user root from 45.249.247.148 port 48026 ssh2
Jan  1 06:48:11 host sshd[19055]: Received disconnect from 45.249.247.148 port 48026:11: Bye Bye [preauth]
Jan  1 06:48:11 host sshd[19055]: Disconnected from 45.249.247.148 port 48026 [preauth]
Jan  1 06:48:39 host sshd[19128]: Invalid user admin from 45.152.67.253 port 46562
Jan  1 06:48:39 host sshd[19128]: input_userauth_request: invalid user admin [preauth]
Jan  1 06:48:39 host sshd[19128]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 06:48:39 host sshd[19128]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.152.67.253
Jan  1 06:48:41 host sshd[19135]: Invalid user lisi from 43.131.27.221 port 48320
Jan  1 06:48:41 host sshd[19135]: input_userauth_request: invalid user lisi [preauth]
Jan  1 06:48:41 host sshd[19135]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 06:48:41 host sshd[19135]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.131.27.221
Jan  1 06:48:42 host sshd[19128]: Failed password for invalid user admin from 45.152.67.253 port 46562 ssh2
Jan  1 06:48:42 host sshd[19128]: Received disconnect from 45.152.67.253 port 46562:11: Bye Bye [preauth]
Jan  1 06:48:42 host sshd[19128]: Disconnected from 45.152.67.253 port 46562 [preauth]
Jan  1 06:48:43 host sshd[19135]: Failed password for invalid user lisi from 43.131.27.221 port 48320 ssh2
Jan  1 06:48:43 host sshd[19135]: Received disconnect from 43.131.27.221 port 48320:11: Bye Bye [preauth]
Jan  1 06:48:43 host sshd[19135]: Disconnected from 43.131.27.221 port 48320 [preauth]
Jan  1 06:49:32 host sshd[19244]: Invalid user teaspeak from 167.99.198.18 port 53304
Jan  1 06:49:32 host sshd[19244]: input_userauth_request: invalid user teaspeak [preauth]
Jan  1 06:49:32 host sshd[19244]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 06:49:32 host sshd[19244]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.198.18
Jan  1 06:49:34 host sshd[19244]: Failed password for invalid user teaspeak from 167.99.198.18 port 53304 ssh2
Jan  1 06:49:34 host sshd[19244]: Received disconnect from 167.99.198.18 port 53304:11: Bye Bye [preauth]
Jan  1 06:49:34 host sshd[19244]: Disconnected from 167.99.198.18 port 53304 [preauth]
Jan  1 06:49:36 host sshd[19252]: User root from 104.248.62.102 not allowed because not listed in AllowUsers
Jan  1 06:49:36 host sshd[19252]: input_userauth_request: invalid user root [preauth]
Jan  1 06:49:36 host unix_chkpwd[19257]: password check failed for user (root)
Jan  1 06:49:36 host sshd[19252]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.62.102  user=root
Jan  1 06:49:36 host sshd[19252]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 06:49:37 host sshd[19252]: Failed password for invalid user root from 104.248.62.102 port 55328 ssh2
Jan  1 06:49:38 host sshd[19252]: Received disconnect from 104.248.62.102 port 55328:11: Bye Bye [preauth]
Jan  1 06:49:38 host sshd[19252]: Disconnected from 104.248.62.102 port 55328 [preauth]
Jan  1 06:50:29 host sshd[19547]: Invalid user integral from 146.190.48.34 port 48702
Jan  1 06:50:29 host sshd[19547]: input_userauth_request: invalid user integral [preauth]
Jan  1 06:50:29 host sshd[19547]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 06:50:29 host sshd[19547]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.190.48.34
Jan  1 06:50:31 host sshd[19547]: Failed password for invalid user integral from 146.190.48.34 port 48702 ssh2
Jan  1 06:50:31 host sshd[19547]: Received disconnect from 146.190.48.34 port 48702:11: Bye Bye [preauth]
Jan  1 06:50:31 host sshd[19547]: Disconnected from 146.190.48.34 port 48702 [preauth]
Jan  1 06:50:58 host sshd[19593]: User root from 45.55.63.118 not allowed because not listed in AllowUsers
Jan  1 06:50:58 host sshd[19593]: input_userauth_request: invalid user root [preauth]
Jan  1 06:50:58 host unix_chkpwd[19598]: password check failed for user (root)
Jan  1 06:50:58 host sshd[19593]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.63.118  user=root
Jan  1 06:50:58 host sshd[19593]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 06:51:00 host sshd[19593]: Failed password for invalid user root from 45.55.63.118 port 55092 ssh2
Jan  1 06:51:00 host sshd[19593]: Received disconnect from 45.55.63.118 port 55092:11: Bye Bye [preauth]
Jan  1 06:51:00 host sshd[19593]: Disconnected from 45.55.63.118 port 55092 [preauth]
Jan  1 06:51:27 host sshd[19674]: Invalid user ftproot from 51.15.105.243 port 40744
Jan  1 06:51:27 host sshd[19674]: input_userauth_request: invalid user ftproot [preauth]
Jan  1 06:51:27 host sshd[19674]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 06:51:27 host sshd[19674]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.105.243
Jan  1 06:51:28 host sshd[19674]: Failed password for invalid user ftproot from 51.15.105.243 port 40744 ssh2
Jan  1 06:51:28 host sshd[19674]: Received disconnect from 51.15.105.243 port 40744:11: Bye Bye [preauth]
Jan  1 06:51:28 host sshd[19674]: Disconnected from 51.15.105.243 port 40744 [preauth]
Jan  1 06:52:04 host sshd[19742]: Invalid user user from 189.178.141.95 port 48311
Jan  1 06:52:04 host sshd[19742]: input_userauth_request: invalid user user [preauth]
Jan  1 06:52:04 host sshd[19742]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 06:52:04 host sshd[19742]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.178.141.95
Jan  1 06:52:05 host sshd[19745]: User root from 79.137.195.230 not allowed because not listed in AllowUsers
Jan  1 06:52:05 host sshd[19745]: input_userauth_request: invalid user root [preauth]
Jan  1 06:52:05 host unix_chkpwd[19748]: password check failed for user (root)
Jan  1 06:52:05 host sshd[19745]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.195.230  user=root
Jan  1 06:52:05 host sshd[19745]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 06:52:06 host sshd[19742]: Failed password for invalid user user from 189.178.141.95 port 48311 ssh2
Jan  1 06:52:07 host sshd[19745]: Failed password for invalid user root from 79.137.195.230 port 45968 ssh2
Jan  1 06:52:07 host sshd[19742]: Received disconnect from 189.178.141.95 port 48311:11: Bye Bye [preauth]
Jan  1 06:52:07 host sshd[19742]: Disconnected from 189.178.141.95 port 48311 [preauth]
Jan  1 06:52:07 host sshd[19745]: Received disconnect from 79.137.195.230 port 45968:11: Bye Bye [preauth]
Jan  1 06:52:07 host sshd[19745]: Disconnected from 79.137.195.230 port 45968 [preauth]
Jan  1 06:52:24 host sshd[19803]: Invalid user zhangfei from 128.199.22.245 port 41910
Jan  1 06:52:24 host sshd[19803]: input_userauth_request: invalid user zhangfei [preauth]
Jan  1 06:52:24 host sshd[19803]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 06:52:24 host sshd[19803]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.22.245
Jan  1 06:52:25 host sshd[19803]: Failed password for invalid user zhangfei from 128.199.22.245 port 41910 ssh2
Jan  1 06:52:25 host sshd[19803]: Received disconnect from 128.199.22.245 port 41910:11: Bye Bye [preauth]
Jan  1 06:52:25 host sshd[19803]: Disconnected from 128.199.22.245 port 41910 [preauth]
Jan  1 06:52:29 host sshd[19837]: User root from 167.99.114.108 not allowed because not listed in AllowUsers
Jan  1 06:52:29 host sshd[19837]: input_userauth_request: invalid user root [preauth]
Jan  1 06:52:29 host unix_chkpwd[19840]: password check failed for user (root)
Jan  1 06:52:29 host sshd[19837]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.114.108  user=root
Jan  1 06:52:29 host sshd[19837]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 06:52:31 host sshd[19837]: Failed password for invalid user root from 167.99.114.108 port 51134 ssh2
Jan  1 06:52:32 host sshd[19837]: Received disconnect from 167.99.114.108 port 51134:11: Bye Bye [preauth]
Jan  1 06:52:32 host sshd[19837]: Disconnected from 167.99.114.108 port 51134 [preauth]
Jan  1 06:52:36 host sshd[19876]: Invalid user sami from 51.15.105.243 port 40722
Jan  1 06:52:36 host sshd[19876]: input_userauth_request: invalid user sami [preauth]
Jan  1 06:52:36 host sshd[19876]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 06:52:36 host sshd[19876]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.105.243
Jan  1 06:52:37 host sshd[19876]: Failed password for invalid user sami from 51.15.105.243 port 40722 ssh2
Jan  1 06:52:37 host sshd[19876]: Received disconnect from 51.15.105.243 port 40722:11: Bye Bye [preauth]
Jan  1 06:52:37 host sshd[19876]: Disconnected from 51.15.105.243 port 40722 [preauth]
Jan  1 06:52:46 host sshd[19916]: User root from 43.131.27.221 not allowed because not listed in AllowUsers
Jan  1 06:52:46 host sshd[19916]: input_userauth_request: invalid user root [preauth]
Jan  1 06:52:46 host unix_chkpwd[19919]: password check failed for user (root)
Jan  1 06:52:46 host sshd[19916]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.131.27.221  user=root
Jan  1 06:52:46 host sshd[19916]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 06:52:49 host sshd[19916]: Failed password for invalid user root from 43.131.27.221 port 35432 ssh2
Jan  1 06:52:49 host sshd[19916]: Received disconnect from 43.131.27.221 port 35432:11: Bye Bye [preauth]
Jan  1 06:52:49 host sshd[19916]: Disconnected from 43.131.27.221 port 35432 [preauth]
Jan  1 06:53:01 host sshd[19969]: Invalid user r00t from 104.248.62.102 port 49886
Jan  1 06:53:01 host sshd[19969]: input_userauth_request: invalid user r00t [preauth]
Jan  1 06:53:01 host sshd[19969]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 06:53:01 host sshd[19969]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.62.102
Jan  1 06:53:03 host sshd[19969]: Failed password for invalid user r00t from 104.248.62.102 port 49886 ssh2
Jan  1 06:53:03 host sshd[19969]: Received disconnect from 104.248.62.102 port 49886:11: Bye Bye [preauth]
Jan  1 06:53:03 host sshd[19969]: Disconnected from 104.248.62.102 port 49886 [preauth]
Jan  1 06:53:09 host sshd[20021]: Invalid user swapnil from 103.218.241.80 port 39720
Jan  1 06:53:09 host sshd[20021]: input_userauth_request: invalid user swapnil [preauth]
Jan  1 06:53:09 host sshd[20021]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 06:53:09 host sshd[20021]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.218.241.80
Jan  1 06:53:11 host sshd[20021]: Failed password for invalid user swapnil from 103.218.241.80 port 39720 ssh2
Jan  1 06:53:11 host sshd[20021]: Received disconnect from 103.218.241.80 port 39720:11: Bye Bye [preauth]
Jan  1 06:53:11 host sshd[20021]: Disconnected from 103.218.241.80 port 39720 [preauth]
Jan  1 06:53:15 host sshd[20029]: Invalid user test from 45.152.67.253 port 38378
Jan  1 06:53:15 host sshd[20029]: input_userauth_request: invalid user test [preauth]
Jan  1 06:53:15 host sshd[20029]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 06:53:15 host sshd[20029]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.152.67.253
Jan  1 06:53:17 host sshd[20029]: Failed password for invalid user test from 45.152.67.253 port 38378 ssh2
Jan  1 06:53:17 host sshd[20029]: Received disconnect from 45.152.67.253 port 38378:11: Bye Bye [preauth]
Jan  1 06:53:17 host sshd[20029]: Disconnected from 45.152.67.253 port 38378 [preauth]
Jan  1 06:53:18 host sshd[20032]: Invalid user jenkins from 45.55.63.118 port 58992
Jan  1 06:53:18 host sshd[20032]: input_userauth_request: invalid user jenkins [preauth]
Jan  1 06:53:18 host sshd[20032]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 06:53:18 host sshd[20032]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.63.118
Jan  1 06:53:20 host sshd[20032]: Failed password for invalid user jenkins from 45.55.63.118 port 58992 ssh2
Jan  1 06:53:20 host sshd[20032]: Received disconnect from 45.55.63.118 port 58992:11: Bye Bye [preauth]
Jan  1 06:53:20 host sshd[20032]: Disconnected from 45.55.63.118 port 58992 [preauth]
Jan  1 06:53:22 host sshd[20046]: Invalid user test from 189.178.141.95 port 20170
Jan  1 06:53:22 host sshd[20046]: input_userauth_request: invalid user test [preauth]
Jan  1 06:53:22 host sshd[20046]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 06:53:22 host sshd[20046]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.178.141.95
Jan  1 06:53:24 host sshd[20084]: Invalid user ts3 from 167.99.198.18 port 46134
Jan  1 06:53:24 host sshd[20084]: input_userauth_request: invalid user ts3 [preauth]
Jan  1 06:53:24 host sshd[20084]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 06:53:24 host sshd[20084]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.198.18
Jan  1 06:53:24 host sshd[20046]: Failed password for invalid user test from 189.178.141.95 port 20170 ssh2
Jan  1 06:53:26 host sshd[20084]: Failed password for invalid user ts3 from 167.99.198.18 port 46134 ssh2
Jan  1 06:53:26 host sshd[20084]: Received disconnect from 167.99.198.18 port 46134:11: Bye Bye [preauth]
Jan  1 06:53:26 host sshd[20084]: Disconnected from 167.99.198.18 port 46134 [preauth]
Jan  1 06:53:37 host sshd[20141]: Connection closed by 45.249.247.148 port 41812 [preauth]
Jan  1 06:53:49 host sshd[20163]: Invalid user hh from 128.199.22.245 port 42022
Jan  1 06:53:49 host sshd[20163]: input_userauth_request: invalid user hh [preauth]
Jan  1 06:53:49 host sshd[20163]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 06:53:49 host sshd[20163]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.22.245
Jan  1 06:53:51 host sshd[20163]: Failed password for invalid user hh from 128.199.22.245 port 42022 ssh2
Jan  1 06:53:51 host sshd[20163]: Received disconnect from 128.199.22.245 port 42022:11: Bye Bye [preauth]
Jan  1 06:53:51 host sshd[20163]: Disconnected from 128.199.22.245 port 42022 [preauth]
Jan  1 06:54:16 host sshd[20233]: Invalid user test from 146.190.48.34 port 60934
Jan  1 06:54:16 host sshd[20233]: input_userauth_request: invalid user test [preauth]
Jan  1 06:54:16 host sshd[20233]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 06:54:16 host sshd[20233]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.190.48.34
Jan  1 06:54:18 host sshd[20233]: Failed password for invalid user test from 146.190.48.34 port 60934 ssh2
Jan  1 06:54:18 host sshd[20233]: Received disconnect from 146.190.48.34 port 60934:11: Bye Bye [preauth]
Jan  1 06:54:18 host sshd[20233]: Disconnected from 146.190.48.34 port 60934 [preauth]
Jan  1 06:54:20 host sshd[20247]: Invalid user lfq from 167.99.198.18 port 44972
Jan  1 06:54:20 host sshd[20247]: input_userauth_request: invalid user lfq [preauth]
Jan  1 06:54:20 host sshd[20247]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 06:54:20 host sshd[20247]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.198.18
Jan  1 06:54:22 host sshd[20247]: Failed password for invalid user lfq from 167.99.198.18 port 44972 ssh2
Jan  1 06:54:22 host sshd[20247]: Received disconnect from 167.99.198.18 port 44972:11: Bye Bye [preauth]
Jan  1 06:54:22 host sshd[20247]: Disconnected from 167.99.198.18 port 44972 [preauth]
Jan  1 06:54:24 host sshd[20283]: Invalid user founder from 103.218.241.80 port 63378
Jan  1 06:54:24 host sshd[20283]: input_userauth_request: invalid user founder [preauth]
Jan  1 06:54:24 host sshd[20283]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 06:54:24 host sshd[20283]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.218.241.80
Jan  1 06:54:26 host sshd[20283]: Failed password for invalid user founder from 103.218.241.80 port 63378 ssh2
Jan  1 06:54:26 host sshd[20283]: Received disconnect from 103.218.241.80 port 63378:11: Bye Bye [preauth]
Jan  1 06:54:26 host sshd[20283]: Disconnected from 103.218.241.80 port 63378 [preauth]
Jan  1 06:54:44 host sshd[20355]: Invalid user segreteria from 45.152.67.253 port 38948
Jan  1 06:54:44 host sshd[20355]: input_userauth_request: invalid user segreteria [preauth]
Jan  1 06:54:44 host sshd[20355]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 06:54:44 host sshd[20355]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.152.67.253
Jan  1 06:54:47 host sshd[20355]: Failed password for invalid user segreteria from 45.152.67.253 port 38948 ssh2
Jan  1 06:54:47 host sshd[20355]: Received disconnect from 45.152.67.253 port 38948:11: Bye Bye [preauth]
Jan  1 06:54:47 host sshd[20355]: Disconnected from 45.152.67.253 port 38948 [preauth]
Jan  1 06:55:40 host sshd[20510]: Invalid user kw from 146.190.48.34 port 60852
Jan  1 06:55:40 host sshd[20510]: input_userauth_request: invalid user kw [preauth]
Jan  1 06:55:40 host sshd[20510]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 06:55:40 host sshd[20510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.190.48.34
Jan  1 06:55:42 host sshd[20510]: Failed password for invalid user kw from 146.190.48.34 port 60852 ssh2
Jan  1 06:55:42 host sshd[20510]: Received disconnect from 146.190.48.34 port 60852:11: Bye Bye [preauth]
Jan  1 06:55:42 host sshd[20510]: Disconnected from 146.190.48.34 port 60852 [preauth]
Jan  1 06:55:45 host sshd[20515]: User root from 45.249.247.148 not allowed because not listed in AllowUsers
Jan  1 06:55:45 host sshd[20515]: input_userauth_request: invalid user root [preauth]
Jan  1 06:55:45 host unix_chkpwd[20626]: password check failed for user (root)
Jan  1 06:55:45 host sshd[20515]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.249.247.148  user=root
Jan  1 06:55:45 host sshd[20515]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 06:55:47 host sshd[20515]: Failed password for invalid user root from 45.249.247.148 port 64984 ssh2
Jan  1 06:55:48 host sshd[20515]: Received disconnect from 45.249.247.148 port 64984:11: Bye Bye [preauth]
Jan  1 06:55:48 host sshd[20515]: Disconnected from 45.249.247.148 port 64984 [preauth]
Jan  1 07:05:35 host sshd[22347]: Invalid user user from 92.219.168.165 port 52620
Jan  1 07:05:35 host sshd[22347]: input_userauth_request: invalid user user [preauth]
Jan  1 07:05:35 host sshd[22347]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:05:35 host sshd[22347]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.219.168.165
Jan  1 07:05:37 host sshd[22347]: Failed password for invalid user user from 92.219.168.165 port 52620 ssh2
Jan  1 07:05:37 host sshd[22347]: Received disconnect from 92.219.168.165 port 52620:11: Bye Bye [preauth]
Jan  1 07:05:37 host sshd[22347]: Disconnected from 92.219.168.165 port 52620 [preauth]
Jan  1 07:05:52 host sshd[22394]: User root from 80.87.33.100 not allowed because not listed in AllowUsers
Jan  1 07:05:52 host sshd[22394]: input_userauth_request: invalid user root [preauth]
Jan  1 07:05:52 host unix_chkpwd[22397]: password check failed for user (root)
Jan  1 07:05:52 host sshd[22394]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.87.33.100  user=root
Jan  1 07:05:52 host sshd[22394]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 07:05:54 host sshd[22394]: Failed password for invalid user root from 80.87.33.100 port 40878 ssh2
Jan  1 07:05:54 host sshd[22394]: Received disconnect from 80.87.33.100 port 40878:11: Bye Bye [preauth]
Jan  1 07:05:54 host sshd[22394]: Disconnected from 80.87.33.100 port 40878 [preauth]
Jan  1 07:06:02 host sshd[22429]: Invalid user odoo2 from 146.70.158.89 port 59548
Jan  1 07:06:02 host sshd[22429]: input_userauth_request: invalid user odoo2 [preauth]
Jan  1 07:06:02 host sshd[22429]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:06:02 host sshd[22429]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.70.158.89
Jan  1 07:06:04 host sshd[22429]: Failed password for invalid user odoo2 from 146.70.158.89 port 59548 ssh2
Jan  1 07:06:05 host sshd[22429]: Received disconnect from 146.70.158.89 port 59548:11: Bye Bye [preauth]
Jan  1 07:06:05 host sshd[22429]: Disconnected from 146.70.158.89 port 59548 [preauth]
Jan  1 07:06:14 host sshd[22456]: Invalid user test from 92.219.168.165 port 37614
Jan  1 07:06:14 host sshd[22456]: input_userauth_request: invalid user test [preauth]
Jan  1 07:06:14 host sshd[22456]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:06:14 host sshd[22456]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.219.168.165
Jan  1 07:06:16 host sshd[22456]: Failed password for invalid user test from 92.219.168.165 port 37614 ssh2
Jan  1 07:06:16 host sshd[22456]: Received disconnect from 92.219.168.165 port 37614:11: Bye Bye [preauth]
Jan  1 07:06:16 host sshd[22456]: Disconnected from 92.219.168.165 port 37614 [preauth]
Jan  1 07:06:31 host sshd[22520]: User root from 92.219.168.165 not allowed because not listed in AllowUsers
Jan  1 07:06:31 host sshd[22520]: input_userauth_request: invalid user root [preauth]
Jan  1 07:06:31 host unix_chkpwd[22523]: password check failed for user (root)
Jan  1 07:06:31 host sshd[22520]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.219.168.165  user=root
Jan  1 07:06:31 host sshd[22520]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 07:06:32 host sshd[22520]: Failed password for invalid user root from 92.219.168.165 port 43152 ssh2
Jan  1 07:06:32 host sshd[22520]: Received disconnect from 92.219.168.165 port 43152:11: Bye Bye [preauth]
Jan  1 07:06:32 host sshd[22520]: Disconnected from 92.219.168.165 port 43152 [preauth]
Jan  1 07:06:34 host sshd[22537]: Invalid user gi from 45.82.122.188 port 36868
Jan  1 07:06:34 host sshd[22537]: input_userauth_request: invalid user gi [preauth]
Jan  1 07:06:34 host sshd[22537]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:06:34 host sshd[22537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.82.122.188
Jan  1 07:06:35 host sshd[22537]: Failed password for invalid user gi from 45.82.122.188 port 36868 ssh2
Jan  1 07:06:36 host sshd[22537]: Received disconnect from 45.82.122.188 port 36868:11: Bye Bye [preauth]
Jan  1 07:06:36 host sshd[22537]: Disconnected from 45.82.122.188 port 36868 [preauth]
Jan  1 07:07:09 host sshd[22662]: User root from 81.29.214.123 not allowed because not listed in AllowUsers
Jan  1 07:07:09 host sshd[22662]: input_userauth_request: invalid user root [preauth]
Jan  1 07:07:09 host unix_chkpwd[22665]: password check failed for user (root)
Jan  1 07:07:09 host sshd[22662]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.29.214.123  user=root
Jan  1 07:07:09 host sshd[22662]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 07:07:10 host sshd[22667]: Invalid user odoo2 from 212.129.45.251 port 53498
Jan  1 07:07:10 host sshd[22667]: input_userauth_request: invalid user odoo2 [preauth]
Jan  1 07:07:10 host sshd[22667]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:07:10 host sshd[22667]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.129.45.251
Jan  1 07:07:11 host sshd[22662]: Failed password for invalid user root from 81.29.214.123 port 48750 ssh2
Jan  1 07:07:11 host sshd[22662]: Received disconnect from 81.29.214.123 port 48750:11: Bye Bye [preauth]
Jan  1 07:07:11 host sshd[22662]: Disconnected from 81.29.214.123 port 48750 [preauth]
Jan  1 07:07:13 host sshd[22667]: Failed password for invalid user odoo2 from 212.129.45.251 port 53498 ssh2
Jan  1 07:07:13 host sshd[22667]: Received disconnect from 212.129.45.251 port 53498:11: Bye Bye [preauth]
Jan  1 07:07:13 host sshd[22667]: Disconnected from 212.129.45.251 port 53498 [preauth]
Jan  1 07:07:13 host sshd[22677]: User root from 109.128.231.53 not allowed because not listed in AllowUsers
Jan  1 07:07:13 host sshd[22677]: input_userauth_request: invalid user root [preauth]
Jan  1 07:07:13 host unix_chkpwd[22683]: password check failed for user (root)
Jan  1 07:07:13 host sshd[22677]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.128.231.53  user=root
Jan  1 07:07:13 host sshd[22677]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 07:07:15 host sshd[22677]: Failed password for invalid user root from 109.128.231.53 port 46820 ssh2
Jan  1 07:07:15 host sshd[22677]: Received disconnect from 109.128.231.53 port 46820:11: Bye Bye [preauth]
Jan  1 07:07:15 host sshd[22677]: Disconnected from 109.128.231.53 port 46820 [preauth]
Jan  1 07:07:36 host sshd[22757]: User root from 51.83.45.110 not allowed because not listed in AllowUsers
Jan  1 07:07:36 host sshd[22757]: input_userauth_request: invalid user root [preauth]
Jan  1 07:07:36 host unix_chkpwd[22762]: password check failed for user (root)
Jan  1 07:07:36 host sshd[22757]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.45.110  user=root
Jan  1 07:07:36 host sshd[22757]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 07:07:37 host sshd[22760]: Invalid user flame from 51.68.136.72 port 37198
Jan  1 07:07:37 host sshd[22760]: input_userauth_request: invalid user flame [preauth]
Jan  1 07:07:37 host sshd[22760]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:07:37 host sshd[22760]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.136.72
Jan  1 07:07:38 host sshd[22760]: Failed password for invalid user flame from 51.68.136.72 port 37198 ssh2
Jan  1 07:07:39 host sshd[22760]: Received disconnect from 51.68.136.72 port 37198:11: Bye Bye [preauth]
Jan  1 07:07:39 host sshd[22760]: Disconnected from 51.68.136.72 port 37198 [preauth]
Jan  1 07:07:39 host sshd[22757]: Failed password for invalid user root from 51.83.45.110 port 49796 ssh2
Jan  1 07:07:39 host sshd[22757]: Received disconnect from 51.83.45.110 port 49796:11: Bye Bye [preauth]
Jan  1 07:07:39 host sshd[22757]: Disconnected from 51.83.45.110 port 49796 [preauth]
Jan  1 07:07:46 host sshd[22771]: Invalid user apache from 162.218.126.136 port 46436
Jan  1 07:07:46 host sshd[22771]: input_userauth_request: invalid user apache [preauth]
Jan  1 07:07:46 host sshd[22771]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:07:46 host sshd[22771]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136
Jan  1 07:07:49 host sshd[22771]: Failed password for invalid user apache from 162.218.126.136 port 46436 ssh2
Jan  1 07:07:49 host sshd[22771]: Connection closed by 162.218.126.136 port 46436 [preauth]
Jan  1 07:07:54 host sshd[22786]: User root from 178.128.50.71 not allowed because not listed in AllowUsers
Jan  1 07:07:54 host sshd[22786]: input_userauth_request: invalid user root [preauth]
Jan  1 07:07:54 host unix_chkpwd[22788]: password check failed for user (root)
Jan  1 07:07:54 host sshd[22786]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.50.71  user=root
Jan  1 07:07:54 host sshd[22786]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 07:07:57 host sshd[22786]: Failed password for invalid user root from 178.128.50.71 port 54712 ssh2
Jan  1 07:07:57 host sshd[22786]: Received disconnect from 178.128.50.71 port 54712:11: Bye Bye [preauth]
Jan  1 07:07:57 host sshd[22786]: Disconnected from 178.128.50.71 port 54712 [preauth]
Jan  1 07:07:58 host sshd[22791]: User root from 188.36.123.6 not allowed because not listed in AllowUsers
Jan  1 07:07:58 host sshd[22791]: input_userauth_request: invalid user root [preauth]
Jan  1 07:07:58 host unix_chkpwd[22794]: password check failed for user (root)
Jan  1 07:07:58 host sshd[22791]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.36.123.6  user=root
Jan  1 07:07:58 host sshd[22791]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 07:08:00 host sshd[22791]: Failed password for invalid user root from 188.36.123.6 port 52018 ssh2
Jan  1 07:08:00 host sshd[22791]: Received disconnect from 188.36.123.6 port 52018:11: Bye Bye [preauth]
Jan  1 07:08:00 host sshd[22791]: Disconnected from 188.36.123.6 port 52018 [preauth]
Jan  1 07:08:27 host sshd[22864]: Invalid user testaccount from 203.231.115.243 port 46082
Jan  1 07:08:27 host sshd[22864]: input_userauth_request: invalid user testaccount [preauth]
Jan  1 07:08:27 host sshd[22864]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:08:27 host sshd[22864]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.231.115.243
Jan  1 07:08:29 host sshd[22864]: Failed password for invalid user testaccount from 203.231.115.243 port 46082 ssh2
Jan  1 07:08:30 host sshd[22864]: Received disconnect from 203.231.115.243 port 46082:11: Bye Bye [preauth]
Jan  1 07:08:30 host sshd[22864]: Disconnected from 203.231.115.243 port 46082 [preauth]
Jan  1 07:08:33 host sshd[22871]: User root from 195.29.102.20 not allowed because not listed in AllowUsers
Jan  1 07:08:33 host sshd[22871]: input_userauth_request: invalid user root [preauth]
Jan  1 07:08:33 host unix_chkpwd[22874]: password check failed for user (root)
Jan  1 07:08:33 host sshd[22871]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.29.102.20  user=root
Jan  1 07:08:33 host sshd[22871]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 07:08:35 host sshd[22871]: Failed password for invalid user root from 195.29.102.20 port 35092 ssh2
Jan  1 07:08:35 host sshd[22871]: Received disconnect from 195.29.102.20 port 35092:11: Bye Bye [preauth]
Jan  1 07:08:35 host sshd[22871]: Disconnected from 195.29.102.20 port 35092 [preauth]
Jan  1 07:08:37 host sshd[22877]: User root from 82.65.135.40 not allowed because not listed in AllowUsers
Jan  1 07:08:37 host sshd[22877]: input_userauth_request: invalid user root [preauth]
Jan  1 07:08:37 host unix_chkpwd[22947]: password check failed for user (root)
Jan  1 07:08:37 host sshd[22877]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.65.135.40  user=root
Jan  1 07:08:37 host sshd[22877]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 07:08:38 host sshd[22932]: User root from 51.89.211.33 not allowed because not listed in AllowUsers
Jan  1 07:08:38 host sshd[22932]: input_userauth_request: invalid user root [preauth]
Jan  1 07:08:38 host unix_chkpwd[22948]: password check failed for user (root)
Jan  1 07:08:38 host sshd[22932]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.89.211.33  user=root
Jan  1 07:08:38 host sshd[22932]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 07:08:38 host sshd[22877]: Failed password for invalid user root from 82.65.135.40 port 34610 ssh2
Jan  1 07:08:39 host sshd[22877]: Received disconnect from 82.65.135.40 port 34610:11: Bye Bye [preauth]
Jan  1 07:08:39 host sshd[22877]: Disconnected from 82.65.135.40 port 34610 [preauth]
Jan  1 07:08:39 host sshd[22932]: Failed password for invalid user root from 51.89.211.33 port 49252 ssh2
Jan  1 07:08:39 host sshd[22932]: Received disconnect from 51.89.211.33 port 49252:11: Bye Bye [preauth]
Jan  1 07:08:39 host sshd[22932]: Disconnected from 51.89.211.33 port 49252 [preauth]
Jan  1 07:10:05 host sshd[23154]: Invalid user av from 141.95.1.76 port 48706
Jan  1 07:10:05 host sshd[23154]: input_userauth_request: invalid user av [preauth]
Jan  1 07:10:05 host sshd[23154]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:10:05 host sshd[23154]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.95.1.76
Jan  1 07:10:07 host sshd[23154]: Failed password for invalid user av from 141.95.1.76 port 48706 ssh2
Jan  1 07:10:07 host sshd[23154]: Received disconnect from 141.95.1.76 port 48706:11: Bye Bye [preauth]
Jan  1 07:10:07 host sshd[23154]: Disconnected from 141.95.1.76 port 48706 [preauth]
Jan  1 07:10:17 host sshd[23171]: Invalid user user from 54.38.146.63 port 39930
Jan  1 07:10:17 host sshd[23171]: input_userauth_request: invalid user user [preauth]
Jan  1 07:10:17 host sshd[23171]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:10:17 host sshd[23171]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.146.63
Jan  1 07:10:19 host sshd[23171]: Failed password for invalid user user from 54.38.146.63 port 39930 ssh2
Jan  1 07:10:19 host sshd[23171]: Received disconnect from 54.38.146.63 port 39930:11: Bye Bye [preauth]
Jan  1 07:10:19 host sshd[23171]: Disconnected from 54.38.146.63 port 39930 [preauth]
Jan  1 07:10:23 host sshd[23195]: Invalid user valheim from 2.139.220.58 port 36004
Jan  1 07:10:23 host sshd[23195]: input_userauth_request: invalid user valheim [preauth]
Jan  1 07:10:23 host sshd[23195]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:10:23 host sshd[23195]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.139.220.58
Jan  1 07:10:25 host sshd[23195]: Failed password for invalid user valheim from 2.139.220.58 port 36004 ssh2
Jan  1 07:10:25 host sshd[23195]: Received disconnect from 2.139.220.58 port 36004:11: Bye Bye [preauth]
Jan  1 07:10:25 host sshd[23195]: Disconnected from 2.139.220.58 port 36004 [preauth]
Jan  1 07:10:29 host sshd[23229]: User root from 217.133.27.74 not allowed because not listed in AllowUsers
Jan  1 07:10:29 host sshd[23229]: input_userauth_request: invalid user root [preauth]
Jan  1 07:10:29 host unix_chkpwd[23232]: password check failed for user (root)
Jan  1 07:10:29 host sshd[23229]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.133.27.74  user=root
Jan  1 07:10:29 host sshd[23229]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 07:10:30 host sshd[23229]: Failed password for invalid user root from 217.133.27.74 port 48745 ssh2
Jan  1 07:10:31 host sshd[23229]: Received disconnect from 217.133.27.74 port 48745:11: Bye Bye [preauth]
Jan  1 07:10:31 host sshd[23229]: Disconnected from 217.133.27.74 port 48745 [preauth]
Jan  1 07:10:41 host sshd[23247]: Invalid user yc from 5.253.244.170 port 41020
Jan  1 07:10:41 host sshd[23247]: input_userauth_request: invalid user yc [preauth]
Jan  1 07:10:41 host sshd[23247]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:10:41 host sshd[23247]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.253.244.170
Jan  1 07:10:43 host sshd[23247]: Failed password for invalid user yc from 5.253.244.170 port 41020 ssh2
Jan  1 07:10:43 host sshd[23247]: Received disconnect from 5.253.244.170 port 41020:11: Bye Bye [preauth]
Jan  1 07:10:43 host sshd[23247]: Disconnected from 5.253.244.170 port 41020 [preauth]
Jan  1 07:10:44 host sshd[23251]: User root from 85.70.64.168 not allowed because not listed in AllowUsers
Jan  1 07:10:44 host sshd[23251]: input_userauth_request: invalid user root [preauth]
Jan  1 07:10:44 host unix_chkpwd[23256]: password check failed for user (root)
Jan  1 07:10:44 host sshd[23251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.70.64.168  user=root
Jan  1 07:10:44 host sshd[23251]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 07:10:45 host sshd[23251]: Failed password for invalid user root from 85.70.64.168 port 39272 ssh2
Jan  1 07:10:45 host sshd[23251]: Received disconnect from 85.70.64.168 port 39272:11: Bye Bye [preauth]
Jan  1 07:10:45 host sshd[23251]: Disconnected from 85.70.64.168 port 39272 [preauth]
Jan  1 07:10:58 host sshd[23288]: User root from 5.255.104.166 not allowed because not listed in AllowUsers
Jan  1 07:10:58 host sshd[23288]: input_userauth_request: invalid user root [preauth]
Jan  1 07:10:58 host unix_chkpwd[23292]: password check failed for user (root)
Jan  1 07:10:58 host sshd[23288]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.255.104.166  user=root
Jan  1 07:10:58 host sshd[23288]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 07:10:59 host sshd[23293]: User root from 83.40.247.158 not allowed because not listed in AllowUsers
Jan  1 07:10:59 host sshd[23293]: input_userauth_request: invalid user root [preauth]
Jan  1 07:10:59 host unix_chkpwd[23295]: password check failed for user (root)
Jan  1 07:10:59 host sshd[23293]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.40.247.158  user=root
Jan  1 07:10:59 host sshd[23293]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 07:10:59 host sshd[23288]: Failed password for invalid user root from 5.255.104.166 port 43658 ssh2
Jan  1 07:11:00 host sshd[23288]: Received disconnect from 5.255.104.166 port 43658:11: Bye Bye [preauth]
Jan  1 07:11:00 host sshd[23288]: Disconnected from 5.255.104.166 port 43658 [preauth]
Jan  1 07:11:01 host sshd[23293]: Failed password for invalid user root from 83.40.247.158 port 59714 ssh2
Jan  1 07:11:01 host sshd[23297]: Invalid user ez from 168.253.210.25 port 52148
Jan  1 07:11:01 host sshd[23297]: input_userauth_request: invalid user ez [preauth]
Jan  1 07:11:01 host sshd[23297]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:11:01 host sshd[23297]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.253.210.25
Jan  1 07:11:01 host sshd[23293]: Received disconnect from 83.40.247.158 port 59714:11: Bye Bye [preauth]
Jan  1 07:11:01 host sshd[23293]: Disconnected from 83.40.247.158 port 59714 [preauth]
Jan  1 07:11:02 host sshd[23310]: User root from 217.133.27.74 not allowed because not listed in AllowUsers
Jan  1 07:11:02 host sshd[23310]: input_userauth_request: invalid user root [preauth]
Jan  1 07:11:02 host unix_chkpwd[23313]: password check failed for user (root)
Jan  1 07:11:02 host sshd[23310]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.133.27.74  user=root
Jan  1 07:11:02 host sshd[23310]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 07:11:03 host sshd[23297]: Failed password for invalid user ez from 168.253.210.25 port 52148 ssh2
Jan  1 07:11:04 host sshd[23310]: Failed password for invalid user root from 217.133.27.74 port 55062 ssh2
Jan  1 07:11:04 host sshd[23297]: Received disconnect from 168.253.210.25 port 52148:11: Bye Bye [preauth]
Jan  1 07:11:04 host sshd[23297]: Disconnected from 168.253.210.25 port 52148 [preauth]
Jan  1 07:11:19 host sshd[23362]: Invalid user deploy from 80.99.177.30 port 45446
Jan  1 07:11:19 host sshd[23362]: input_userauth_request: invalid user deploy [preauth]
Jan  1 07:11:19 host sshd[23362]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:11:19 host sshd[23362]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.99.177.30
Jan  1 07:11:21 host sshd[23362]: Failed password for invalid user deploy from 80.99.177.30 port 45446 ssh2
Jan  1 07:11:21 host sshd[23362]: Received disconnect from 80.99.177.30 port 45446:11: Bye Bye [preauth]
Jan  1 07:11:21 host sshd[23362]: Disconnected from 80.99.177.30 port 45446 [preauth]
Jan  1 07:11:26 host sshd[23375]: User root from 188.157.208.250 not allowed because not listed in AllowUsers
Jan  1 07:11:26 host sshd[23375]: input_userauth_request: invalid user root [preauth]
Jan  1 07:11:26 host unix_chkpwd[23398]: password check failed for user (root)
Jan  1 07:11:26 host sshd[23375]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.157.208.250  user=root
Jan  1 07:11:26 host sshd[23375]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 07:11:27 host sshd[23375]: Failed password for invalid user root from 188.157.208.250 port 38752 ssh2
Jan  1 07:11:27 host sshd[23375]: Received disconnect from 188.157.208.250 port 38752:11: Bye Bye [preauth]
Jan  1 07:11:27 host sshd[23375]: Disconnected from 188.157.208.250 port 38752 [preauth]
Jan  1 07:11:47 host sshd[23422]: User root from 196.179.231.103 not allowed because not listed in AllowUsers
Jan  1 07:11:47 host sshd[23422]: input_userauth_request: invalid user root [preauth]
Jan  1 07:11:47 host unix_chkpwd[23427]: password check failed for user (root)
Jan  1 07:11:47 host sshd[23422]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.179.231.103  user=root
Jan  1 07:11:47 host sshd[23422]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 07:11:48 host sshd[23422]: Failed password for invalid user root from 196.179.231.103 port 36786 ssh2
Jan  1 07:11:49 host sshd[23422]: Received disconnect from 196.179.231.103 port 36786:11: Bye Bye [preauth]
Jan  1 07:11:49 host sshd[23422]: Disconnected from 196.179.231.103 port 36786 [preauth]
Jan  1 07:11:54 host sshd[23442]: User root from 92.220.162.17 not allowed because not listed in AllowUsers
Jan  1 07:11:54 host sshd[23442]: input_userauth_request: invalid user root [preauth]
Jan  1 07:11:54 host unix_chkpwd[23445]: password check failed for user (root)
Jan  1 07:11:54 host sshd[23442]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.220.162.17  user=root
Jan  1 07:11:54 host sshd[23442]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 07:11:56 host sshd[23442]: Failed password for invalid user root from 92.220.162.17 port 1496 ssh2
Jan  1 07:11:56 host sshd[23442]: Received disconnect from 92.220.162.17 port 1496:11: Bye Bye [preauth]
Jan  1 07:11:56 host sshd[23442]: Disconnected from 92.220.162.17 port 1496 [preauth]
Jan  1 07:12:20 host sshd[23483]: Invalid user kau from 51.68.136.72 port 33568
Jan  1 07:12:20 host sshd[23483]: input_userauth_request: invalid user kau [preauth]
Jan  1 07:12:20 host sshd[23483]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:12:20 host sshd[23483]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.136.72
Jan  1 07:12:21 host sshd[23483]: Failed password for invalid user kau from 51.68.136.72 port 33568 ssh2
Jan  1 07:12:21 host sshd[23483]: Received disconnect from 51.68.136.72 port 33568:11: Bye Bye [preauth]
Jan  1 07:12:21 host sshd[23483]: Disconnected from 51.68.136.72 port 33568 [preauth]
Jan  1 07:12:26 host sshd[23512]: Invalid user are from 146.70.158.89 port 34110
Jan  1 07:12:26 host sshd[23512]: input_userauth_request: invalid user are [preauth]
Jan  1 07:12:26 host sshd[23512]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:12:26 host sshd[23512]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.70.158.89
Jan  1 07:12:28 host sshd[23512]: Failed password for invalid user are from 146.70.158.89 port 34110 ssh2
Jan  1 07:12:28 host sshd[23512]: Received disconnect from 146.70.158.89 port 34110:11: Bye Bye [preauth]
Jan  1 07:12:28 host sshd[23512]: Disconnected from 146.70.158.89 port 34110 [preauth]
Jan  1 07:12:31 host sshd[23518]: Invalid user yc from 51.83.45.110 port 45404
Jan  1 07:12:31 host sshd[23518]: input_userauth_request: invalid user yc [preauth]
Jan  1 07:12:31 host sshd[23518]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:12:31 host sshd[23518]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.45.110
Jan  1 07:12:33 host sshd[23518]: Failed password for invalid user yc from 51.83.45.110 port 45404 ssh2
Jan  1 07:12:33 host sshd[23518]: Received disconnect from 51.83.45.110 port 45404:11: Bye Bye [preauth]
Jan  1 07:12:33 host sshd[23518]: Disconnected from 51.83.45.110 port 45404 [preauth]
Jan  1 07:12:36 host sshd[23523]: Invalid user dq from 197.5.145.77 port 22545
Jan  1 07:12:36 host sshd[23523]: input_userauth_request: invalid user dq [preauth]
Jan  1 07:12:36 host sshd[23523]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:12:36 host sshd[23523]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.5.145.77
Jan  1 07:12:38 host sshd[23523]: Failed password for invalid user dq from 197.5.145.77 port 22545 ssh2
Jan  1 07:12:38 host sshd[23523]: Received disconnect from 197.5.145.77 port 22545:11: Bye Bye [preauth]
Jan  1 07:12:38 host sshd[23523]: Disconnected from 197.5.145.77 port 22545 [preauth]
Jan  1 07:12:41 host sshd[23560]: User root from 212.129.45.251 not allowed because not listed in AllowUsers
Jan  1 07:12:41 host sshd[23560]: input_userauth_request: invalid user root [preauth]
Jan  1 07:12:41 host unix_chkpwd[23562]: password check failed for user (root)
Jan  1 07:12:41 host sshd[23560]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.129.45.251  user=root
Jan  1 07:12:41 host sshd[23560]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 07:12:43 host sshd[23560]: Failed password for invalid user root from 212.129.45.251 port 51646 ssh2
Jan  1 07:12:43 host sshd[23560]: Received disconnect from 212.129.45.251 port 51646:11: Bye Bye [preauth]
Jan  1 07:12:43 host sshd[23560]: Disconnected from 212.129.45.251 port 51646 [preauth]
Jan  1 07:12:43 host sshd[23568]: User root from 195.29.102.20 not allowed because not listed in AllowUsers
Jan  1 07:12:43 host sshd[23568]: input_userauth_request: invalid user root [preauth]
Jan  1 07:12:43 host unix_chkpwd[23579]: password check failed for user (root)
Jan  1 07:12:43 host sshd[23568]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.29.102.20  user=root
Jan  1 07:12:43 host sshd[23568]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 07:12:44 host sshd[23576]: User root from 188.36.123.6 not allowed because not listed in AllowUsers
Jan  1 07:12:44 host sshd[23576]: input_userauth_request: invalid user root [preauth]
Jan  1 07:12:44 host unix_chkpwd[23604]: password check failed for user (root)
Jan  1 07:12:44 host sshd[23576]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.36.123.6  user=root
Jan  1 07:12:44 host sshd[23576]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 07:12:45 host sshd[23568]: Failed password for invalid user root from 195.29.102.20 port 43792 ssh2
Jan  1 07:12:46 host sshd[23568]: Received disconnect from 195.29.102.20 port 43792:11: Bye Bye [preauth]
Jan  1 07:12:46 host sshd[23568]: Disconnected from 195.29.102.20 port 43792 [preauth]
Jan  1 07:12:46 host sshd[23576]: Failed password for invalid user root from 188.36.123.6 port 48900 ssh2
Jan  1 07:12:46 host sshd[23607]: Invalid user av from 109.128.231.53 port 33730
Jan  1 07:12:46 host sshd[23607]: input_userauth_request: invalid user av [preauth]
Jan  1 07:12:46 host sshd[23607]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:12:46 host sshd[23607]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.128.231.53
Jan  1 07:12:46 host sshd[23576]: Received disconnect from 188.36.123.6 port 48900:11: Bye Bye [preauth]
Jan  1 07:12:46 host sshd[23576]: Disconnected from 188.36.123.6 port 48900 [preauth]
Jan  1 07:12:48 host sshd[23607]: Failed password for invalid user av from 109.128.231.53 port 33730 ssh2
Jan  1 07:12:48 host sshd[23607]: Received disconnect from 109.128.231.53 port 33730:11: Bye Bye [preauth]
Jan  1 07:12:48 host sshd[23607]: Disconnected from 109.128.231.53 port 33730 [preauth]
Jan  1 07:12:48 host sshd[23611]: User root from 141.95.1.76 not allowed because not listed in AllowUsers
Jan  1 07:12:48 host sshd[23611]: input_userauth_request: invalid user root [preauth]
Jan  1 07:12:48 host unix_chkpwd[23666]: password check failed for user (root)
Jan  1 07:12:48 host sshd[23611]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.95.1.76  user=root
Jan  1 07:12:48 host sshd[23611]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 07:12:50 host sshd[23703]: Invalid user pic from 45.82.122.188 port 37694
Jan  1 07:12:50 host sshd[23703]: input_userauth_request: invalid user pic [preauth]
Jan  1 07:12:50 host sshd[23703]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:12:50 host sshd[23703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.82.122.188
Jan  1 07:12:50 host sshd[23611]: Failed password for invalid user root from 141.95.1.76 port 57940 ssh2
Jan  1 07:12:50 host sshd[23611]: Received disconnect from 141.95.1.76 port 57940:11: Bye Bye [preauth]
Jan  1 07:12:50 host sshd[23611]: Disconnected from 141.95.1.76 port 57940 [preauth]
Jan  1 07:12:52 host sshd[23703]: Failed password for invalid user pic from 45.82.122.188 port 37694 ssh2
Jan  1 07:12:52 host sshd[23703]: Received disconnect from 45.82.122.188 port 37694:11: Bye Bye [preauth]
Jan  1 07:12:52 host sshd[23703]: Disconnected from 45.82.122.188 port 37694 [preauth]
Jan  1 07:12:56 host sshd[23740]: Invalid user ed from 81.29.214.123 port 46494
Jan  1 07:12:56 host sshd[23740]: input_userauth_request: invalid user ed [preauth]
Jan  1 07:12:56 host sshd[23740]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:12:56 host sshd[23740]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.29.214.123
Jan  1 07:12:58 host sshd[23740]: Failed password for invalid user ed from 81.29.214.123 port 46494 ssh2
Jan  1 07:12:58 host sshd[23740]: Received disconnect from 81.29.214.123 port 46494:11: Bye Bye [preauth]
Jan  1 07:12:58 host sshd[23740]: Disconnected from 81.29.214.123 port 46494 [preauth]
Jan  1 07:12:59 host sshd[23759]: Invalid user lgx from 178.128.50.71 port 57518
Jan  1 07:12:59 host sshd[23759]: input_userauth_request: invalid user lgx [preauth]
Jan  1 07:12:59 host sshd[23759]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:12:59 host sshd[23759]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.50.71
Jan  1 07:12:59 host sshd[23745]: Invalid user konan from 82.65.135.40 port 51552
Jan  1 07:12:59 host sshd[23745]: input_userauth_request: invalid user konan [preauth]
Jan  1 07:12:59 host sshd[23745]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:12:59 host sshd[23745]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.65.135.40
Jan  1 07:13:01 host sshd[23759]: Failed password for invalid user lgx from 178.128.50.71 port 57518 ssh2
Jan  1 07:13:01 host sshd[23759]: Received disconnect from 178.128.50.71 port 57518:11: Bye Bye [preauth]
Jan  1 07:13:01 host sshd[23759]: Disconnected from 178.128.50.71 port 57518 [preauth]
Jan  1 07:13:02 host sshd[23745]: Failed password for invalid user konan from 82.65.135.40 port 51552 ssh2
Jan  1 07:13:02 host sshd[23745]: Received disconnect from 82.65.135.40 port 51552:11: Bye Bye [preauth]
Jan  1 07:13:02 host sshd[23745]: Disconnected from 82.65.135.40 port 51552 [preauth]
Jan  1 07:13:02 host sshd[23797]: Invalid user odoo2 from 80.87.33.100 port 46022
Jan  1 07:13:02 host sshd[23797]: input_userauth_request: invalid user odoo2 [preauth]
Jan  1 07:13:02 host sshd[23797]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:13:02 host sshd[23797]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.87.33.100
Jan  1 07:13:04 host sshd[23797]: Failed password for invalid user odoo2 from 80.87.33.100 port 46022 ssh2
Jan  1 07:13:04 host sshd[23797]: Received disconnect from 80.87.33.100 port 46022:11: Bye Bye [preauth]
Jan  1 07:13:04 host sshd[23797]: Disconnected from 80.87.33.100 port 46022 [preauth]
Jan  1 07:13:04 host sshd[23815]: User root from 188.157.208.250 not allowed because not listed in AllowUsers
Jan  1 07:13:04 host sshd[23815]: input_userauth_request: invalid user root [preauth]
Jan  1 07:13:04 host unix_chkpwd[23865]: password check failed for user (root)
Jan  1 07:13:04 host sshd[23815]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.157.208.250  user=root
Jan  1 07:13:04 host sshd[23815]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 07:13:07 host sshd[23815]: Failed password for invalid user root from 188.157.208.250 port 40762 ssh2
Jan  1 07:13:07 host sshd[23815]: Received disconnect from 188.157.208.250 port 40762:11: Bye Bye [preauth]
Jan  1 07:13:07 host sshd[23815]: Disconnected from 188.157.208.250 port 40762 [preauth]
Jan  1 07:13:15 host sshd[23939]: User root from 196.179.231.103 not allowed because not listed in AllowUsers
Jan  1 07:13:15 host sshd[23939]: input_userauth_request: invalid user root [preauth]
Jan  1 07:13:16 host unix_chkpwd[23942]: password check failed for user (root)
Jan  1 07:13:16 host sshd[23939]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.179.231.103  user=root
Jan  1 07:13:16 host sshd[23939]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 07:13:18 host sshd[23939]: Failed password for invalid user root from 196.179.231.103 port 38348 ssh2
Jan  1 07:13:18 host sshd[23939]: Received disconnect from 196.179.231.103 port 38348:11: Bye Bye [preauth]
Jan  1 07:13:18 host sshd[23939]: Disconnected from 196.179.231.103 port 38348 [preauth]
Jan  1 07:13:22 host sshd[23983]: Invalid user test from 5.253.244.170 port 39394
Jan  1 07:13:22 host sshd[23983]: input_userauth_request: invalid user test [preauth]
Jan  1 07:13:22 host sshd[23983]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:13:22 host sshd[23983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.253.244.170
Jan  1 07:13:24 host sshd[23986]: Invalid user ftpuser from 85.70.64.168 port 55842
Jan  1 07:13:24 host sshd[23986]: input_userauth_request: invalid user ftpuser [preauth]
Jan  1 07:13:24 host sshd[23986]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:13:24 host sshd[23986]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.70.64.168
Jan  1 07:13:24 host sshd[23983]: Failed password for invalid user test from 5.253.244.170 port 39394 ssh2
Jan  1 07:13:24 host sshd[23983]: Received disconnect from 5.253.244.170 port 39394:11: Bye Bye [preauth]
Jan  1 07:13:24 host sshd[23983]: Disconnected from 5.253.244.170 port 39394 [preauth]
Jan  1 07:13:26 host sshd[23986]: Failed password for invalid user ftpuser from 85.70.64.168 port 55842 ssh2
Jan  1 07:13:26 host sshd[23986]: Received disconnect from 85.70.64.168 port 55842:11: Bye Bye [preauth]
Jan  1 07:13:26 host sshd[23986]: Disconnected from 85.70.64.168 port 55842 [preauth]
Jan  1 07:13:27 host sshd[24013]: Invalid user ftpuser from 80.99.177.30 port 32876
Jan  1 07:13:27 host sshd[24013]: input_userauth_request: invalid user ftpuser [preauth]
Jan  1 07:13:27 host sshd[24013]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:13:27 host sshd[24013]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.99.177.30
Jan  1 07:13:28 host sshd[24015]: Invalid user oc from 54.38.146.63 port 50600
Jan  1 07:13:28 host sshd[24015]: input_userauth_request: invalid user oc [preauth]
Jan  1 07:13:28 host sshd[24015]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:13:28 host sshd[24015]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.146.63
Jan  1 07:13:28 host sshd[24018]: Invalid user user from 5.255.104.166 port 46490
Jan  1 07:13:28 host sshd[24018]: input_userauth_request: invalid user user [preauth]
Jan  1 07:13:28 host sshd[24018]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:13:28 host sshd[24018]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.255.104.166
Jan  1 07:13:29 host sshd[24015]: Failed password for invalid user oc from 54.38.146.63 port 50600 ssh2
Jan  1 07:13:30 host sshd[24013]: Failed password for invalid user ftpuser from 80.99.177.30 port 32876 ssh2
Jan  1 07:13:30 host sshd[24015]: Received disconnect from 54.38.146.63 port 50600:11: Bye Bye [preauth]
Jan  1 07:13:30 host sshd[24015]: Disconnected from 54.38.146.63 port 50600 [preauth]
Jan  1 07:13:30 host sshd[24013]: Received disconnect from 80.99.177.30 port 32876:11: Bye Bye [preauth]
Jan  1 07:13:30 host sshd[24013]: Disconnected from 80.99.177.30 port 32876 [preauth]
Jan  1 07:13:30 host sshd[24018]: Failed password for invalid user user from 5.255.104.166 port 46490 ssh2
Jan  1 07:13:30 host sshd[24018]: Received disconnect from 5.255.104.166 port 46490:11: Bye Bye [preauth]
Jan  1 07:13:30 host sshd[24018]: Disconnected from 5.255.104.166 port 46490 [preauth]
Jan  1 07:13:32 host sshd[24071]: Invalid user admin from 51.210.241.6 port 53122
Jan  1 07:13:32 host sshd[24071]: input_userauth_request: invalid user admin [preauth]
Jan  1 07:13:32 host sshd[24071]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:13:32 host sshd[24071]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.210.241.6
Jan  1 07:13:33 host sshd[24073]: User root from 92.220.162.17 not allowed because not listed in AllowUsers
Jan  1 07:13:33 host sshd[24073]: input_userauth_request: invalid user root [preauth]
Jan  1 07:13:33 host unix_chkpwd[24076]: password check failed for user (root)
Jan  1 07:13:33 host sshd[24073]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.220.162.17  user=root
Jan  1 07:13:33 host sshd[24073]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 07:13:34 host sshd[24071]: Failed password for invalid user admin from 51.210.241.6 port 53122 ssh2
Jan  1 07:13:34 host sshd[24071]: Received disconnect from 51.210.241.6 port 53122:11: Bye Bye [preauth]
Jan  1 07:13:34 host sshd[24071]: Disconnected from 51.210.241.6 port 53122 [preauth]
Jan  1 07:13:35 host sshd[24073]: Failed password for invalid user root from 92.220.162.17 port 18185 ssh2
Jan  1 07:13:36 host sshd[24143]: User root from 146.70.158.89 not allowed because not listed in AllowUsers
Jan  1 07:13:36 host sshd[24143]: input_userauth_request: invalid user root [preauth]
Jan  1 07:13:36 host unix_chkpwd[24146]: password check failed for user (root)
Jan  1 07:13:36 host sshd[24143]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.70.158.89  user=root
Jan  1 07:13:36 host sshd[24143]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 07:13:38 host sshd[24147]: User root from 51.68.136.72 not allowed because not listed in AllowUsers
Jan  1 07:13:38 host sshd[24147]: input_userauth_request: invalid user root [preauth]
Jan  1 07:13:38 host unix_chkpwd[24150]: password check failed for user (root)
Jan  1 07:13:38 host sshd[24147]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.136.72  user=root
Jan  1 07:13:38 host sshd[24147]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 07:13:39 host sshd[24143]: Failed password for invalid user root from 146.70.158.89 port 58360 ssh2
Jan  1 07:13:39 host sshd[24147]: Failed password for invalid user root from 51.68.136.72 port 46272 ssh2
Jan  1 07:13:47 host sshd[24330]: Invalid user lu from 203.231.115.243 port 40798
Jan  1 07:13:47 host sshd[24330]: input_userauth_request: invalid user lu [preauth]
Jan  1 07:13:47 host sshd[24330]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:13:47 host sshd[24330]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.231.115.243
Jan  1 07:13:49 host sshd[24330]: Failed password for invalid user lu from 203.231.115.243 port 40798 ssh2
Jan  1 07:13:49 host sshd[24330]: Received disconnect from 203.231.115.243 port 40798:11: Bye Bye [preauth]
Jan  1 07:13:49 host sshd[24330]: Disconnected from 203.231.115.243 port 40798 [preauth]
Jan  1 07:13:50 host sshd[24339]: Invalid user stk from 168.253.210.25 port 32768
Jan  1 07:13:50 host sshd[24339]: input_userauth_request: invalid user stk [preauth]
Jan  1 07:13:50 host sshd[24339]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:13:50 host sshd[24339]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.253.210.25
Jan  1 07:13:52 host sshd[24339]: Failed password for invalid user stk from 168.253.210.25 port 32768 ssh2
Jan  1 07:13:52 host sshd[24339]: Received disconnect from 168.253.210.25 port 32768:11: Bye Bye [preauth]
Jan  1 07:13:52 host sshd[24339]: Disconnected from 168.253.210.25 port 32768 [preauth]
Jan  1 07:13:59 host sshd[24349]: Invalid user guest from 45.82.122.188 port 33084
Jan  1 07:13:59 host sshd[24349]: input_userauth_request: invalid user guest [preauth]
Jan  1 07:13:59 host sshd[24349]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:13:59 host sshd[24349]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.82.122.188
Jan  1 07:14:01 host sshd[24349]: Failed password for invalid user guest from 45.82.122.188 port 33084 ssh2
Jan  1 07:14:01 host sshd[24349]: Received disconnect from 45.82.122.188 port 33084:11: Bye Bye [preauth]
Jan  1 07:14:01 host sshd[24349]: Disconnected from 45.82.122.188 port 33084 [preauth]
Jan  1 07:14:03 host sshd[24368]: Invalid user ftpuser from 197.5.145.77 port 22546
Jan  1 07:14:03 host sshd[24368]: input_userauth_request: invalid user ftpuser [preauth]
Jan  1 07:14:03 host sshd[24368]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:14:03 host sshd[24368]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.5.145.77
Jan  1 07:14:05 host sshd[24368]: Failed password for invalid user ftpuser from 197.5.145.77 port 22546 ssh2
Jan  1 07:14:05 host sshd[24368]: Received disconnect from 197.5.145.77 port 22546:11: Bye Bye [preauth]
Jan  1 07:14:05 host sshd[24368]: Disconnected from 197.5.145.77 port 22546 [preauth]
Jan  1 07:14:09 host sshd[24407]: User root from 2.139.220.58 not allowed because not listed in AllowUsers
Jan  1 07:14:09 host sshd[24407]: input_userauth_request: invalid user root [preauth]
Jan  1 07:14:09 host unix_chkpwd[24410]: password check failed for user (root)
Jan  1 07:14:09 host sshd[24407]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.139.220.58  user=root
Jan  1 07:14:09 host sshd[24407]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 07:14:11 host sshd[24407]: Failed password for invalid user root from 2.139.220.58 port 45666 ssh2
Jan  1 07:14:11 host sshd[24407]: Received disconnect from 2.139.220.58 port 45666:11: Bye Bye [preauth]
Jan  1 07:14:11 host sshd[24407]: Disconnected from 2.139.220.58 port 45666 [preauth]
Jan  1 07:14:12 host sshd[24412]: User root from 51.89.211.33 not allowed because not listed in AllowUsers
Jan  1 07:14:12 host sshd[24412]: input_userauth_request: invalid user root [preauth]
Jan  1 07:14:12 host unix_chkpwd[24415]: password check failed for user (root)
Jan  1 07:14:12 host sshd[24412]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.89.211.33  user=root
Jan  1 07:14:12 host sshd[24412]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 07:14:14 host sshd[24412]: Failed password for invalid user root from 51.89.211.33 port 43720 ssh2
Jan  1 07:14:41 host sshd[24539]: Invalid user deploy from 80.99.177.30 port 57360
Jan  1 07:14:41 host sshd[24539]: input_userauth_request: invalid user deploy [preauth]
Jan  1 07:14:41 host sshd[24539]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:14:41 host sshd[24539]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.99.177.30
Jan  1 07:14:44 host sshd[24539]: Failed password for invalid user deploy from 80.99.177.30 port 57360 ssh2
Jan  1 07:14:54 host sshd[24598]: Invalid user gi from 5.253.244.170 port 44884
Jan  1 07:14:54 host sshd[24598]: input_userauth_request: invalid user gi [preauth]
Jan  1 07:14:54 host sshd[24598]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:14:54 host sshd[24598]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.253.244.170
Jan  1 07:14:55 host sshd[24595]: User root from 92.46.108.20 not allowed because not listed in AllowUsers
Jan  1 07:14:55 host sshd[24595]: input_userauth_request: invalid user root [preauth]
Jan  1 07:14:56 host unix_chkpwd[24604]: password check failed for user (root)
Jan  1 07:14:56 host sshd[24595]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20  user=root
Jan  1 07:14:56 host sshd[24595]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 07:14:56 host sshd[24601]: Invalid user zm from 54.38.146.63 port 50610
Jan  1 07:14:56 host sshd[24601]: input_userauth_request: invalid user zm [preauth]
Jan  1 07:14:56 host sshd[24601]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:14:56 host sshd[24601]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.146.63
Jan  1 07:14:57 host sshd[24598]: Failed password for invalid user gi from 5.253.244.170 port 44884 ssh2
Jan  1 07:14:57 host sshd[24598]: Received disconnect from 5.253.244.170 port 44884:11: Bye Bye [preauth]
Jan  1 07:14:57 host sshd[24598]: Disconnected from 5.253.244.170 port 44884 [preauth]
Jan  1 07:14:58 host sshd[24595]: Failed password for invalid user root from 92.46.108.20 port 56732 ssh2
Jan  1 07:14:58 host sshd[24601]: Failed password for invalid user zm from 54.38.146.63 port 50610 ssh2
Jan  1 07:14:59 host sshd[24601]: Received disconnect from 54.38.146.63 port 50610:11: Bye Bye [preauth]
Jan  1 07:14:59 host sshd[24601]: Disconnected from 54.38.146.63 port 50610 [preauth]
Jan  1 07:14:59 host sshd[24595]: Connection closed by 92.46.108.20 port 56732 [preauth]
Jan  1 07:14:59 host sshd[24619]: Invalid user george from 83.40.247.158 port 38886
Jan  1 07:14:59 host sshd[24619]: input_userauth_request: invalid user george [preauth]
Jan  1 07:14:59 host sshd[24619]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:14:59 host sshd[24619]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.40.247.158
Jan  1 07:15:02 host sshd[24619]: Failed password for invalid user george from 83.40.247.158 port 38886 ssh2
Jan  1 07:15:02 host sshd[24619]: Received disconnect from 83.40.247.158 port 38886:11: Bye Bye [preauth]
Jan  1 07:15:02 host sshd[24619]: Disconnected from 83.40.247.158 port 38886 [preauth]
Jan  1 07:15:13 host sshd[24733]: Invalid user deploy from 197.5.145.77 port 22548
Jan  1 07:15:13 host sshd[24733]: input_userauth_request: invalid user deploy [preauth]
Jan  1 07:15:13 host sshd[24733]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:15:13 host sshd[24733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.5.145.77
Jan  1 07:15:15 host sshd[24733]: Failed password for invalid user deploy from 197.5.145.77 port 22548 ssh2
Jan  1 07:15:16 host sshd[24770]: User root from 51.210.241.6 not allowed because not listed in AllowUsers
Jan  1 07:15:16 host sshd[24770]: input_userauth_request: invalid user root [preauth]
Jan  1 07:15:16 host unix_chkpwd[24772]: password check failed for user (root)
Jan  1 07:15:16 host sshd[24770]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.210.241.6  user=root
Jan  1 07:15:16 host sshd[24770]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 07:15:18 host sshd[24770]: Failed password for invalid user root from 51.210.241.6 port 54538 ssh2
Jan  1 07:15:18 host sshd[24770]: Received disconnect from 51.210.241.6 port 54538:11: Bye Bye [preauth]
Jan  1 07:15:18 host sshd[24770]: Disconnected from 51.210.241.6 port 54538 [preauth]
Jan  1 07:15:26 host sshd[24843]: Invalid user gl from 203.231.115.243 port 40864
Jan  1 07:15:26 host sshd[24843]: input_userauth_request: invalid user gl [preauth]
Jan  1 07:15:26 host sshd[24843]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:15:26 host sshd[24843]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.231.115.243
Jan  1 07:15:28 host sshd[24843]: Failed password for invalid user gl from 203.231.115.243 port 40864 ssh2
Jan  1 07:15:28 host sshd[24843]: Received disconnect from 203.231.115.243 port 40864:11: Bye Bye [preauth]
Jan  1 07:15:28 host sshd[24843]: Disconnected from 203.231.115.243 port 40864 [preauth]
Jan  1 07:15:28 host sshd[24846]: Invalid user ftpuser from 168.253.210.25 port 33200
Jan  1 07:15:28 host sshd[24846]: input_userauth_request: invalid user ftpuser [preauth]
Jan  1 07:15:28 host sshd[24846]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:15:28 host sshd[24846]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.253.210.25
Jan  1 07:15:30 host sshd[24846]: Failed password for invalid user ftpuser from 168.253.210.25 port 33200 ssh2
Jan  1 07:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  1 07:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 07:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 07:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  1 07:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 07:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 07:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  1 07:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 07:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 07:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  1 07:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 07:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 07:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  1 07:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 07:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 07:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  1 07:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 07:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 07:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  1 07:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 07:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 07:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  1 07:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 07:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 07:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  1 07:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 07:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 07:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  1 07:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 07:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 07:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  1 07:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 07:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 07:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  1 07:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 07:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 07:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  1 07:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 07:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 07:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwnexidigital user-2=mrsclean user-3=kottayamcalldriv user-4=phmetals user-5=gifterman user-6=palco123 user-7=wwwletsstalkfood user-8=straightcurve user-9=wwwevmhonda user-10=bonifacegroup user-11=pmcresources user-12=wwwtestugo user-13=shalinijames user-14=vfmassets user-15=wwwkapin user-16=woodpeck user-17=wwwkmaorg user-18=disposeat user-19=remysagr user-20=ugotscom user-21=wwwrmswll user-22=wwwresourcehunte user-23=keralaholi user-24=travelboniface user-25=wwwpmcresource user-26=laundryboniface user-27=dartsimp user-28=a2zgroup user-29=cochintaxi user-30=wwwkaretakers feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  1 07:21:50 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  1 07:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 07:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 07:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  1 07:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 07:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 07:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-wkfOFN6hKq4DqmzY.~
Jan  1 07:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 07:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 07:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-wkfOFN6hKq4DqmzY.~'
Jan  1 07:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 07:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 07:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-wkfOFN6hKq4DqmzY.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  1 07:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 07:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 07:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  1 07:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 07:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 07:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  1 07:21:51 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  1 07:21:51 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  1 07:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  1 07:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 07:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 07:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  1 07:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 07:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 07:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  1 07:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 07:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 07:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  1 07:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 07:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 07:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  1 07:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 07:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 07:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  1 07:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  1 07:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  1 07:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  1 07:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  1 07:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  1 07:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  1 07:21:56 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  1 07:21:58 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  1 07:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  1 07:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  1 07:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  1 07:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  1 07:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  1 07:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  1 07:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  1 07:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  1 07:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  1 07:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  1 07:22:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  1 07:22:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  1 07:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  1 07:22:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  1 07:22:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  1 07:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  1 07:22:08 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  1 07:22:12 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  1 07:22:55 host sshd[26045]: Invalid user user from 41.197.31.178 port 40566
Jan  1 07:22:55 host sshd[26045]: input_userauth_request: invalid user user [preauth]
Jan  1 07:22:55 host sshd[26045]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:22:55 host sshd[26045]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178
Jan  1 07:22:58 host sshd[26045]: Failed password for invalid user user from 41.197.31.178 port 40566 ssh2
Jan  1 07:22:58 host sshd[26045]: Connection closed by 41.197.31.178 port 40566 [preauth]
Jan  1 07:39:29 host sshd[28329]: Invalid user mq from 128.199.211.118 port 53228
Jan  1 07:39:29 host sshd[28329]: input_userauth_request: invalid user mq [preauth]
Jan  1 07:39:29 host sshd[28329]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:39:29 host sshd[28329]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.211.118
Jan  1 07:39:32 host sshd[28329]: Failed password for invalid user mq from 128.199.211.118 port 53228 ssh2
Jan  1 07:39:32 host sshd[28329]: Received disconnect from 128.199.211.118 port 53228:11: Bye Bye [preauth]
Jan  1 07:39:32 host sshd[28329]: Disconnected from 128.199.211.118 port 53228 [preauth]
Jan  1 07:40:11 host sshd[28424]: User root from 89.251.102.54 not allowed because not listed in AllowUsers
Jan  1 07:40:11 host sshd[28424]: input_userauth_request: invalid user root [preauth]
Jan  1 07:40:11 host unix_chkpwd[28429]: password check failed for user (root)
Jan  1 07:40:11 host sshd[28424]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.251.102.54  user=root
Jan  1 07:40:11 host sshd[28424]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 07:40:14 host sshd[28424]: Failed password for invalid user root from 89.251.102.54 port 57200 ssh2
Jan  1 07:40:14 host sshd[28424]: Received disconnect from 89.251.102.54 port 57200:11: Bye Bye [preauth]
Jan  1 07:40:14 host sshd[28424]: Disconnected from 89.251.102.54 port 57200 [preauth]
Jan  1 07:41:11 host sshd[28583]: Invalid user dv from 96.78.175.42 port 34304
Jan  1 07:41:11 host sshd[28583]: input_userauth_request: invalid user dv [preauth]
Jan  1 07:41:11 host sshd[28583]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:41:11 host sshd[28583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.78.175.42
Jan  1 07:41:12 host sshd[28583]: Failed password for invalid user dv from 96.78.175.42 port 34304 ssh2
Jan  1 07:41:13 host sshd[28583]: Received disconnect from 96.78.175.42 port 34304:11: Bye Bye [preauth]
Jan  1 07:41:13 host sshd[28583]: Disconnected from 96.78.175.42 port 34304 [preauth]
Jan  1 07:42:12 host sshd[28730]: Invalid user iq from 46.24.187.141 port 50450
Jan  1 07:42:12 host sshd[28730]: input_userauth_request: invalid user iq [preauth]
Jan  1 07:42:12 host sshd[28730]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:42:12 host sshd[28730]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.24.187.141
Jan  1 07:42:14 host sshd[28740]: User root from 206.189.137.162 not allowed because not listed in AllowUsers
Jan  1 07:42:14 host sshd[28740]: input_userauth_request: invalid user root [preauth]
Jan  1 07:42:14 host unix_chkpwd[28742]: password check failed for user (root)
Jan  1 07:42:14 host sshd[28740]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.137.162  user=root
Jan  1 07:42:14 host sshd[28740]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 07:42:14 host sshd[28730]: Failed password for invalid user iq from 46.24.187.141 port 50450 ssh2
Jan  1 07:42:15 host sshd[28730]: Received disconnect from 46.24.187.141 port 50450:11: Bye Bye [preauth]
Jan  1 07:42:15 host sshd[28730]: Disconnected from 46.24.187.141 port 50450 [preauth]
Jan  1 07:42:16 host sshd[28740]: Failed password for invalid user root from 206.189.137.162 port 44138 ssh2
Jan  1 07:42:16 host sshd[28740]: Received disconnect from 206.189.137.162 port 44138:11: Bye Bye [preauth]
Jan  1 07:42:16 host sshd[28740]: Disconnected from 206.189.137.162 port 44138 [preauth]
Jan  1 07:43:43 host sshd[28939]: Invalid user Minecraft from 206.81.9.31 port 30084
Jan  1 07:43:43 host sshd[28939]: input_userauth_request: invalid user Minecraft [preauth]
Jan  1 07:43:43 host sshd[28939]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:43:43 host sshd[28939]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.81.9.31
Jan  1 07:43:45 host sshd[28939]: Failed password for invalid user Minecraft from 206.81.9.31 port 30084 ssh2
Jan  1 07:43:45 host sshd[28939]: Received disconnect from 206.81.9.31 port 30084:11: Bye Bye [preauth]
Jan  1 07:43:45 host sshd[28939]: Disconnected from 206.81.9.31 port 30084 [preauth]
Jan  1 07:44:07 host sshd[28977]: Invalid user ekp from 89.251.102.54 port 43194
Jan  1 07:44:07 host sshd[28977]: input_userauth_request: invalid user ekp [preauth]
Jan  1 07:44:07 host sshd[28977]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:44:07 host sshd[28977]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.251.102.54
Jan  1 07:44:08 host sshd[28977]: Failed password for invalid user ekp from 89.251.102.54 port 43194 ssh2
Jan  1 07:44:08 host sshd[28977]: Received disconnect from 89.251.102.54 port 43194:11: Bye Bye [preauth]
Jan  1 07:44:08 host sshd[28977]: Disconnected from 89.251.102.54 port 43194 [preauth]
Jan  1 07:44:44 host sshd[29229]: Invalid user iw from 187.72.128.177 port 58054
Jan  1 07:44:44 host sshd[29229]: input_userauth_request: invalid user iw [preauth]
Jan  1 07:44:44 host sshd[29229]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:44:44 host sshd[29229]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.72.128.177
Jan  1 07:44:45 host sshd[29229]: Failed password for invalid user iw from 187.72.128.177 port 58054 ssh2
Jan  1 07:44:46 host sshd[29229]: Received disconnect from 187.72.128.177 port 58054:11: Bye Bye [preauth]
Jan  1 07:44:46 host sshd[29229]: Disconnected from 187.72.128.177 port 58054 [preauth]
Jan  1 07:45:16 host sshd[29380]: Invalid user hacluster from 168.121.237.82 port 39062
Jan  1 07:45:16 host sshd[29380]: input_userauth_request: invalid user hacluster [preauth]
Jan  1 07:45:16 host sshd[29380]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:45:16 host sshd[29380]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.121.237.82
Jan  1 07:45:18 host sshd[29380]: Failed password for invalid user hacluster from 168.121.237.82 port 39062 ssh2
Jan  1 07:45:18 host sshd[29380]: Received disconnect from 168.121.237.82 port 39062:11: Bye Bye [preauth]
Jan  1 07:45:18 host sshd[29380]: Disconnected from 168.121.237.82 port 39062 [preauth]
Jan  1 07:45:24 host sshd[29411]: Invalid user dy from 128.199.211.118 port 26710
Jan  1 07:45:24 host sshd[29411]: input_userauth_request: invalid user dy [preauth]
Jan  1 07:45:24 host sshd[29411]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:45:24 host sshd[29411]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.211.118
Jan  1 07:45:26 host sshd[29411]: Failed password for invalid user dy from 128.199.211.118 port 26710 ssh2
Jan  1 07:45:27 host sshd[29411]: Received disconnect from 128.199.211.118 port 26710:11: Bye Bye [preauth]
Jan  1 07:45:27 host sshd[29411]: Disconnected from 128.199.211.118 port 26710 [preauth]
Jan  1 07:45:37 host sshd[29457]: Invalid user hcn from 206.189.137.162 port 35606
Jan  1 07:45:37 host sshd[29457]: input_userauth_request: invalid user hcn [preauth]
Jan  1 07:45:37 host sshd[29457]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:45:37 host sshd[29457]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.137.162
Jan  1 07:45:39 host sshd[29457]: Failed password for invalid user hcn from 206.189.137.162 port 35606 ssh2
Jan  1 07:45:39 host sshd[29457]: Received disconnect from 206.189.137.162 port 35606:11: Bye Bye [preauth]
Jan  1 07:45:39 host sshd[29457]: Disconnected from 206.189.137.162 port 35606 [preauth]
Jan  1 07:45:45 host sshd[29475]: Invalid user willy from 96.78.175.42 port 47726
Jan  1 07:45:45 host sshd[29475]: input_userauth_request: invalid user willy [preauth]
Jan  1 07:45:45 host sshd[29475]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:45:45 host sshd[29475]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.78.175.42
Jan  1 07:45:47 host sshd[29475]: Failed password for invalid user willy from 96.78.175.42 port 47726 ssh2
Jan  1 07:45:47 host sshd[29475]: Received disconnect from 96.78.175.42 port 47726:11: Bye Bye [preauth]
Jan  1 07:45:47 host sshd[29475]: Disconnected from 96.78.175.42 port 47726 [preauth]
Jan  1 07:45:47 host sshd[29516]: Invalid user bala from 46.24.187.141 port 33892
Jan  1 07:45:47 host sshd[29516]: input_userauth_request: invalid user bala [preauth]
Jan  1 07:45:47 host sshd[29516]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:45:47 host sshd[29516]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.24.187.141
Jan  1 07:45:50 host sshd[29516]: Failed password for invalid user bala from 46.24.187.141 port 33892 ssh2
Jan  1 07:45:50 host sshd[29516]: Received disconnect from 46.24.187.141 port 33892:11: Bye Bye [preauth]
Jan  1 07:45:50 host sshd[29516]: Disconnected from 46.24.187.141 port 33892 [preauth]
Jan  1 07:46:29 host sshd[29667]: Invalid user eden from 187.72.128.177 port 45041
Jan  1 07:46:29 host sshd[29667]: input_userauth_request: invalid user eden [preauth]
Jan  1 07:46:29 host sshd[29667]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:46:29 host sshd[29667]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.72.128.177
Jan  1 07:46:31 host sshd[29667]: Failed password for invalid user eden from 187.72.128.177 port 45041 ssh2
Jan  1 07:46:32 host sshd[29667]: Received disconnect from 187.72.128.177 port 45041:11: Bye Bye [preauth]
Jan  1 07:46:32 host sshd[29667]: Disconnected from 187.72.128.177 port 45041 [preauth]
Jan  1 07:46:52 host sshd[29744]: Invalid user user from 128.199.211.118 port 23150
Jan  1 07:46:52 host sshd[29744]: input_userauth_request: invalid user user [preauth]
Jan  1 07:46:52 host sshd[29744]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:46:52 host sshd[29744]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.211.118
Jan  1 07:46:54 host sshd[29747]: User root from 96.78.175.42 not allowed because not listed in AllowUsers
Jan  1 07:46:54 host sshd[29747]: input_userauth_request: invalid user root [preauth]
Jan  1 07:46:54 host unix_chkpwd[29753]: password check failed for user (root)
Jan  1 07:46:54 host sshd[29747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.78.175.42  user=root
Jan  1 07:46:54 host sshd[29747]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 07:46:54 host sshd[29744]: Failed password for invalid user user from 128.199.211.118 port 23150 ssh2
Jan  1 07:46:54 host sshd[29744]: Received disconnect from 128.199.211.118 port 23150:11: Bye Bye [preauth]
Jan  1 07:46:54 host sshd[29744]: Disconnected from 128.199.211.118 port 23150 [preauth]
Jan  1 07:46:56 host sshd[29816]: Invalid user test from 46.24.187.141 port 60434
Jan  1 07:46:56 host sshd[29816]: input_userauth_request: invalid user test [preauth]
Jan  1 07:46:56 host sshd[29816]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:46:56 host sshd[29816]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.24.187.141
Jan  1 07:46:56 host sshd[29747]: Failed password for invalid user root from 96.78.175.42 port 52542 ssh2
Jan  1 07:46:58 host sshd[29816]: Failed password for invalid user test from 46.24.187.141 port 60434 ssh2
Jan  1 07:46:58 host sshd[29816]: Received disconnect from 46.24.187.141 port 60434:11: Bye Bye [preauth]
Jan  1 07:46:58 host sshd[29816]: Disconnected from 46.24.187.141 port 60434 [preauth]
Jan  1 07:47:29 host sshd[29987]: User root from 168.121.237.82 not allowed because not listed in AllowUsers
Jan  1 07:47:29 host sshd[29987]: input_userauth_request: invalid user root [preauth]
Jan  1 07:47:29 host unix_chkpwd[29991]: password check failed for user (root)
Jan  1 07:47:29 host sshd[29987]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.121.237.82  user=root
Jan  1 07:47:29 host sshd[29987]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 07:47:32 host sshd[29987]: Failed password for invalid user root from 168.121.237.82 port 55626 ssh2
Jan  1 07:47:32 host sshd[29987]: Received disconnect from 168.121.237.82 port 55626:11: Bye Bye [preauth]
Jan  1 07:47:32 host sshd[29987]: Disconnected from 168.121.237.82 port 55626 [preauth]
Jan  1 07:47:36 host sshd[30029]: Invalid user deploy from 206.81.9.31 port 40812
Jan  1 07:47:36 host sshd[30029]: input_userauth_request: invalid user deploy [preauth]
Jan  1 07:47:36 host sshd[30029]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:47:36 host sshd[30029]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.81.9.31
Jan  1 07:47:38 host sshd[30029]: Failed password for invalid user deploy from 206.81.9.31 port 40812 ssh2
Jan  1 07:47:39 host sshd[30029]: Received disconnect from 206.81.9.31 port 40812:11: Bye Bye [preauth]
Jan  1 07:47:39 host sshd[30029]: Disconnected from 206.81.9.31 port 40812 [preauth]
Jan  1 07:48:00 host sshd[30123]: Invalid user postgres from 187.72.128.177 port 57563
Jan  1 07:48:00 host sshd[30123]: input_userauth_request: invalid user postgres [preauth]
Jan  1 07:48:00 host sshd[30123]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:48:00 host sshd[30123]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.72.128.177
Jan  1 07:48:02 host sshd[30123]: Failed password for invalid user postgres from 187.72.128.177 port 57563 ssh2
Jan  1 07:48:02 host sshd[30123]: Received disconnect from 187.72.128.177 port 57563:11: Bye Bye [preauth]
Jan  1 07:48:02 host sshd[30123]: Disconnected from 187.72.128.177 port 57563 [preauth]
Jan  1 07:49:02 host sshd[30264]: Invalid user nanda from 206.81.9.31 port 47998
Jan  1 07:49:02 host sshd[30264]: input_userauth_request: invalid user nanda [preauth]
Jan  1 07:49:02 host sshd[30264]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:49:02 host sshd[30264]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.81.9.31
Jan  1 07:49:04 host sshd[30264]: Failed password for invalid user nanda from 206.81.9.31 port 47998 ssh2
Jan  1 07:49:04 host sshd[30264]: Received disconnect from 206.81.9.31 port 47998:11: Bye Bye [preauth]
Jan  1 07:49:04 host sshd[30264]: Disconnected from 206.81.9.31 port 47998 [preauth]
Jan  1 07:50:46 host sshd[30654]: User root from 106.10.122.53 not allowed because not listed in AllowUsers
Jan  1 07:50:46 host sshd[30654]: input_userauth_request: invalid user root [preauth]
Jan  1 07:50:46 host unix_chkpwd[30656]: password check failed for user (root)
Jan  1 07:50:46 host sshd[30654]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53  user=root
Jan  1 07:50:46 host sshd[30654]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 07:50:48 host sshd[30654]: Failed password for invalid user root from 106.10.122.53 port 53188 ssh2
Jan  1 07:50:48 host sshd[30654]: Connection closed by 106.10.122.53 port 53188 [preauth]
Jan  1 07:51:08 host sshd[30695]: Did not receive identification string from 106.12.172.93 port 46124
Jan  1 07:51:10 host sshd[30698]: Invalid user test from 106.12.172.93 port 51802
Jan  1 07:51:10 host sshd[30698]: input_userauth_request: invalid user test [preauth]
Jan  1 07:51:10 host sshd[30699]: Invalid user oracle from 106.12.172.93 port 51790
Jan  1 07:51:10 host sshd[30699]: input_userauth_request: invalid user oracle [preauth]
Jan  1 07:51:10 host sshd[30700]: Invalid user steam from 106.12.172.93 port 51806
Jan  1 07:51:10 host sshd[30700]: input_userauth_request: invalid user steam [preauth]
Jan  1 07:51:10 host sshd[30702]: User centos from 106.12.172.93 not allowed because not listed in AllowUsers
Jan  1 07:51:10 host sshd[30702]: input_userauth_request: invalid user centos [preauth]
Jan  1 07:51:10 host sshd[30707]: Invalid user steam from 106.12.172.93 port 51784
Jan  1 07:51:10 host sshd[30707]: input_userauth_request: invalid user steam [preauth]
Jan  1 07:51:10 host sshd[30704]: User centos from 106.12.172.93 not allowed because not listed in AllowUsers
Jan  1 07:51:10 host sshd[30704]: input_userauth_request: invalid user centos [preauth]
Jan  1 07:51:10 host sshd[30708]: Invalid user mailadmin from 106.12.172.93 port 51792
Jan  1 07:51:10 host sshd[30708]: input_userauth_request: invalid user mailadmin [preauth]
Jan  1 07:51:10 host sshd[30706]: Invalid user dockeradmin from 106.12.172.93 port 51794
Jan  1 07:51:10 host sshd[30706]: input_userauth_request: invalid user dockeradmin [preauth]
Jan  1 07:51:10 host sshd[30710]: Invalid user www from 106.12.172.93 port 51798
Jan  1 07:51:10 host sshd[30710]: input_userauth_request: invalid user www [preauth]
Jan  1 07:51:10 host sshd[30718]: Invalid user git from 106.12.172.93 port 51788
Jan  1 07:51:10 host sshd[30718]: input_userauth_request: invalid user git [preauth]
Jan  1 07:51:10 host sshd[30728]: Invalid user teamspeak from 106.12.172.93 port 51778
Jan  1 07:51:10 host sshd[30728]: input_userauth_request: invalid user teamspeak [preauth]
Jan  1 07:51:10 host sshd[30719]: Invalid user emqx from 106.12.172.93 port 51828
Jan  1 07:51:10 host sshd[30719]: input_userauth_request: invalid user emqx [preauth]
Jan  1 07:51:10 host sshd[30723]: Invalid user ftpuser from 106.12.172.93 port 51820
Jan  1 07:51:10 host sshd[30723]: input_userauth_request: invalid user ftpuser [preauth]
Jan  1 07:51:10 host sshd[30722]: Invalid user gitlab-runner from 106.12.172.93 port 51846
Jan  1 07:51:10 host sshd[30722]: input_userauth_request: invalid user gitlab-runner [preauth]
Jan  1 07:51:10 host sshd[30724]: Invalid user ec2-user from 106.12.172.93 port 51814
Jan  1 07:51:10 host sshd[30724]: input_userauth_request: invalid user ec2-user [preauth]
Jan  1 07:51:10 host sshd[30729]: Invalid user emqx from 106.12.172.93 port 51772
Jan  1 07:51:10 host sshd[30729]: input_userauth_request: invalid user emqx [preauth]
Jan  1 07:51:10 host sshd[30733]: Invalid user es from 106.12.172.93 port 51826
Jan  1 07:51:10 host sshd[30733]: input_userauth_request: invalid user es [preauth]
Jan  1 07:51:10 host sshd[30727]: Invalid user elastic from 106.12.172.93 port 51844
Jan  1 07:51:10 host sshd[30727]: input_userauth_request: invalid user elastic [preauth]
Jan  1 07:51:10 host sshd[30735]: Invalid user oracle from 106.12.172.93 port 51842
Jan  1 07:51:10 host sshd[30735]: input_userauth_request: invalid user oracle [preauth]
Jan  1 07:51:10 host sshd[30726]: Invalid user dev from 106.12.172.93 port 51822
Jan  1 07:51:10 host sshd[30726]: input_userauth_request: invalid user dev [preauth]
Jan  1 07:51:10 host sshd[30740]: User centos from 106.12.172.93 not allowed because not listed in AllowUsers
Jan  1 07:51:10 host sshd[30740]: input_userauth_request: invalid user centos [preauth]
Jan  1 07:51:10 host sshd[30698]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:51:10 host sshd[30698]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.172.93
Jan  1 07:51:10 host sshd[30737]: Invalid user user from 106.12.172.93 port 51848
Jan  1 07:51:10 host sshd[30737]: input_userauth_request: invalid user user [preauth]
Jan  1 07:51:10 host sshd[30699]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:51:10 host sshd[30699]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.172.93
Jan  1 07:51:10 host sshd[30741]: Invalid user oracle from 106.12.172.93 port 51838
Jan  1 07:51:10 host sshd[30741]: input_userauth_request: invalid user oracle [preauth]
Jan  1 07:51:10 host sshd[30743]: Invalid user devops from 106.12.172.93 port 51834
Jan  1 07:51:10 host sshd[30743]: input_userauth_request: invalid user devops [preauth]
Jan  1 07:51:10 host sshd[30700]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:51:10 host sshd[30700]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.172.93
Jan  1 07:51:10 host unix_chkpwd[30760]: password check failed for user (centos)
Jan  1 07:51:10 host sshd[30707]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:51:10 host sshd[30707]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.172.93
Jan  1 07:51:10 host sshd[30702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.172.93  user=centos
Jan  1 07:51:10 host unix_chkpwd[30761]: password check failed for user (centos)
Jan  1 07:51:10 host sshd[30704]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.172.93  user=centos
Jan  1 07:51:10 host sshd[30706]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:51:10 host sshd[30706]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.172.93
Jan  1 07:51:10 host sshd[30708]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:51:10 host sshd[30708]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.172.93
Jan  1 07:51:10 host sshd[30710]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:51:10 host sshd[30710]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.172.93
Jan  1 07:51:10 host sshd[30728]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:51:10 host sshd[30728]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.172.93
Jan  1 07:51:10 host sshd[30719]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:51:10 host sshd[30719]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.172.93
Jan  1 07:51:10 host sshd[30723]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:51:10 host sshd[30723]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.172.93
Jan  1 07:51:10 host sshd[30722]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:51:10 host sshd[30722]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.172.93
Jan  1 07:51:10 host sshd[30724]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:51:10 host sshd[30724]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.172.93
Jan  1 07:51:10 host sshd[30697]: Invalid user postgres from 106.12.172.93 port 51782
Jan  1 07:51:10 host sshd[30697]: input_userauth_request: invalid user postgres [preauth]
Jan  1 07:51:10 host sshd[30727]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:51:10 host sshd[30727]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.172.93
Jan  1 07:51:10 host sshd[30733]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:51:10 host sshd[30733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.172.93
Jan  1 07:51:10 host sshd[30726]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:51:11 host sshd[30726]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.172.93
Jan  1 07:51:11 host sshd[30735]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:51:11 host sshd[30735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.172.93
Jan  1 07:51:11 host unix_chkpwd[30762]: password check failed for user (centos)
Jan  1 07:51:11 host sshd[30740]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.172.93  user=centos
Jan  1 07:51:11 host sshd[30737]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:51:11 host sshd[30737]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.172.93
Jan  1 07:51:11 host sshd[30741]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:51:11 host sshd[30741]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.172.93
Jan  1 07:51:11 host sshd[30743]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:51:11 host sshd[30743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.172.93
Jan  1 07:51:11 host sshd[30701]: Invalid user mcserver from 106.12.172.93 port 51786
Jan  1 07:51:11 host sshd[30701]: input_userauth_request: invalid user mcserver [preauth]
Jan  1 07:51:11 host sshd[30705]: Invalid user ubuntu from 106.12.172.93 port 51776
Jan  1 07:51:11 host sshd[30705]: input_userauth_request: invalid user ubuntu [preauth]
Jan  1 07:51:11 host sshd[30701]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:51:11 host sshd[30701]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.172.93
Jan  1 07:51:11 host sshd[30705]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:51:11 host sshd[30705]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.172.93
Jan  1 07:51:11 host sshd[30718]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:51:11 host sshd[30718]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.172.93
Jan  1 07:51:11 host sshd[30755]: User mail from 106.12.172.93 not allowed because not listed in AllowUsers
Jan  1 07:51:11 host sshd[30755]: input_userauth_request: invalid user mail [preauth]
Jan  1 07:51:11 host sshd[30729]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:51:11 host sshd[30729]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.172.93
Jan  1 07:51:12 host unix_chkpwd[30768]: password check failed for user (mail)
Jan  1 07:51:12 host sshd[30755]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.172.93  user=mail
Jan  1 07:51:12 host sshd[30755]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "mail"
Jan  1 07:51:12 host sshd[30754]: User centos from 106.12.172.93 not allowed because not listed in AllowUsers
Jan  1 07:51:12 host sshd[30754]: input_userauth_request: invalid user centos [preauth]
Jan  1 07:51:12 host sshd[30698]: Failed password for invalid user test from 106.12.172.93 port 51802 ssh2
Jan  1 07:51:12 host sshd[30757]: Invalid user ubuntu from 106.12.172.93 port 51824
Jan  1 07:51:12 host sshd[30757]: input_userauth_request: invalid user ubuntu [preauth]
Jan  1 07:51:12 host sshd[30699]: Failed password for invalid user oracle from 106.12.172.93 port 51790 ssh2
Jan  1 07:51:12 host sshd[30700]: Failed password for invalid user steam from 106.12.172.93 port 51806 ssh2
Jan  1 07:51:12 host sshd[30707]: Failed password for invalid user steam from 106.12.172.93 port 51784 ssh2
Jan  1 07:51:12 host sshd[30702]: Failed password for invalid user centos from 106.12.172.93 port 51804 ssh2
Jan  1 07:51:12 host sshd[30704]: Failed password for invalid user centos from 106.12.172.93 port 51800 ssh2
Jan  1 07:51:12 host sshd[30706]: Failed password for invalid user dockeradmin from 106.12.172.93 port 51794 ssh2
Jan  1 07:51:12 host sshd[30708]: Failed password for invalid user mailadmin from 106.12.172.93 port 51792 ssh2
Jan  1 07:51:12 host sshd[30710]: Failed password for invalid user www from 106.12.172.93 port 51798 ssh2
Jan  1 07:51:12 host sshd[30728]: Failed password for invalid user teamspeak from 106.12.172.93 port 51778 ssh2
Jan  1 07:51:12 host sshd[30719]: Failed password for invalid user emqx from 106.12.172.93 port 51828 ssh2
Jan  1 07:51:12 host sshd[30723]: Failed password for invalid user ftpuser from 106.12.172.93 port 51820 ssh2
Jan  1 07:51:12 host sshd[30722]: Failed password for invalid user gitlab-runner from 106.12.172.93 port 51846 ssh2
Jan  1 07:51:12 host sshd[30724]: Failed password for invalid user ec2-user from 106.12.172.93 port 51814 ssh2
Jan  1 07:51:12 host sshd[30698]: Connection closed by 106.12.172.93 port 51802 [preauth]
Jan  1 07:51:12 host unix_chkpwd[30770]: password check failed for user (centos)
Jan  1 07:51:12 host sshd[30754]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.172.93  user=centos
Jan  1 07:51:12 host sshd[30699]: Connection closed by 106.12.172.93 port 51790 [preauth]
Jan  1 07:51:12 host sshd[30727]: Failed password for invalid user elastic from 106.12.172.93 port 51844 ssh2
Jan  1 07:51:12 host sshd[30757]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:51:12 host sshd[30757]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.172.93
Jan  1 07:51:12 host sshd[30733]: Failed password for invalid user es from 106.12.172.93 port 51826 ssh2
Jan  1 07:51:12 host sshd[30726]: Failed password for invalid user dev from 106.12.172.93 port 51822 ssh2
Jan  1 07:51:12 host sshd[30700]: Connection closed by 106.12.172.93 port 51806 [preauth]
Jan  1 07:51:12 host sshd[30707]: Connection closed by 106.12.172.93 port 51784 [preauth]
Jan  1 07:51:12 host sshd[30702]: Connection closed by 106.12.172.93 port 51804 [preauth]
Jan  1 07:51:12 host sshd[30704]: Connection closed by 106.12.172.93 port 51800 [preauth]
Jan  1 07:51:12 host sshd[30706]: Connection closed by 106.12.172.93 port 51794 [preauth]
Jan  1 07:51:12 host sshd[30710]: Connection closed by 106.12.172.93 port 51798 [preauth]
Jan  1 07:51:13 host sshd[30723]: Connection closed by 106.12.172.93 port 51820 [preauth]
Jan  1 07:51:13 host sshd[30719]: Connection closed by 106.12.172.93 port 51828 [preauth]
Jan  1 07:51:13 host sshd[30724]: Connection closed by 106.12.172.93 port 51814 [preauth]
Jan  1 07:51:13 host sshd[30722]: Connection closed by 106.12.172.93 port 51846 [preauth]
Jan  1 07:51:13 host sshd[30728]: Connection closed by 106.12.172.93 port 51778 [preauth]
Jan  1 07:51:13 host sshd[30727]: Connection closed by 106.12.172.93 port 51844 [preauth]
Jan  1 07:51:13 host sshd[30726]: Connection closed by 106.12.172.93 port 51822 [preauth]
Jan  1 07:51:13 host sshd[30735]: Failed password for invalid user oracle from 106.12.172.93 port 51842 ssh2
Jan  1 07:51:13 host sshd[30740]: Failed password for invalid user centos from 106.12.172.93 port 51810 ssh2
Jan  1 07:51:13 host sshd[30737]: Failed password for invalid user user from 106.12.172.93 port 51848 ssh2
Jan  1 07:51:13 host sshd[30741]: Failed password for invalid user oracle from 106.12.172.93 port 51838 ssh2
Jan  1 07:51:13 host sshd[30743]: Failed password for invalid user devops from 106.12.172.93 port 51834 ssh2
Jan  1 07:51:13 host sshd[30697]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:51:13 host sshd[30697]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.172.93
Jan  1 07:51:13 host sshd[30708]: Connection closed by 106.12.172.93 port 51792 [preauth]
Jan  1 07:51:13 host sshd[30735]: Connection closed by 106.12.172.93 port 51842 [preauth]
Jan  1 07:51:13 host sshd[30737]: Connection closed by 106.12.172.93 port 51848 [preauth]
Jan  1 07:51:13 host sshd[30740]: Connection closed by 106.12.172.93 port 51810 [preauth]
Jan  1 07:51:13 host sshd[30701]: Failed password for invalid user mcserver from 106.12.172.93 port 51786 ssh2
Jan  1 07:51:13 host sshd[30741]: Connection closed by 106.12.172.93 port 51838 [preauth]
Jan  1 07:51:13 host sshd[30743]: Connection closed by 106.12.172.93 port 51834 [preauth]
Jan  1 07:51:13 host sshd[30705]: Failed password for invalid user ubuntu from 106.12.172.93 port 51776 ssh2
Jan  1 07:51:13 host sshd[30718]: Failed password for invalid user git from 106.12.172.93 port 51788 ssh2
Jan  1 07:51:13 host sshd[30733]: Connection closed by 106.12.172.93 port 51826 [preauth]
Jan  1 07:51:14 host sshd[30729]: Failed password for invalid user emqx from 106.12.172.93 port 51772 ssh2
Jan  1 07:51:14 host sshd[30701]: Connection closed by 106.12.172.93 port 51786 [preauth]
Jan  1 07:51:14 host sshd[30705]: Connection closed by 106.12.172.93 port 51776 [preauth]
Jan  1 07:51:14 host sshd[30755]: Failed password for invalid user mail from 106.12.172.93 port 51850 ssh2
Jan  1 07:51:14 host sshd[30718]: Connection closed by 106.12.172.93 port 51788 [preauth]
Jan  1 07:51:14 host sshd[30754]: Failed password for invalid user centos from 106.12.172.93 port 51832 ssh2
Jan  1 07:51:14 host sshd[30757]: Failed password for invalid user ubuntu from 106.12.172.93 port 51824 ssh2
Jan  1 07:51:15 host sshd[30729]: Connection closed by 106.12.172.93 port 51772 [preauth]
Jan  1 07:51:15 host sshd[30763]: Invalid user ftpuser from 106.12.172.93 port 51808
Jan  1 07:51:15 host sshd[30763]: input_userauth_request: invalid user ftpuser [preauth]
Jan  1 07:51:15 host sshd[30754]: Connection closed by 106.12.172.93 port 51832 [preauth]
Jan  1 07:51:15 host sshd[30757]: Connection closed by 106.12.172.93 port 51824 [preauth]
Jan  1 07:51:15 host sshd[30755]: Connection closed by 106.12.172.93 port 51850 [preauth]
Jan  1 07:51:15 host sshd[30697]: Failed password for invalid user postgres from 106.12.172.93 port 51782 ssh2
Jan  1 07:51:15 host sshd[30763]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 07:51:15 host sshd[30763]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.172.93
Jan  1 07:51:15 host sshd[30697]: Connection closed by 106.12.172.93 port 51782 [preauth]
Jan  1 07:51:16 host sshd[30766]: Invalid user ubuntu from 106.12.172.93 port 51840
Jan  1 07:51:16 host sshd[30766]: input_userauth_request: invalid user ubuntu [preauth]
Jan  1 07:51:18 host sshd[30763]: Failed password for invalid user ftpuser from 106.12.172.93 port 51808 ssh2
Jan  1 08:07:13 host sshd[563]: Invalid user user1 from 103.13.40.2 port 58590
Jan  1 08:07:13 host sshd[563]: input_userauth_request: invalid user user1 [preauth]
Jan  1 08:07:13 host sshd[563]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 08:07:13 host sshd[563]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2
Jan  1 08:07:15 host sshd[563]: Failed password for invalid user user1 from 103.13.40.2 port 58590 ssh2
Jan  1 08:07:15 host sshd[563]: Connection closed by 103.13.40.2 port 58590 [preauth]
Jan  1 08:12:56 host sshd[1393]: Invalid user kwx from 162.218.126.136 port 59636
Jan  1 08:12:56 host sshd[1393]: input_userauth_request: invalid user kwx [preauth]
Jan  1 08:12:56 host sshd[1393]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 08:12:56 host sshd[1393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136
Jan  1 08:12:58 host sshd[1393]: Failed password for invalid user kwx from 162.218.126.136 port 59636 ssh2
Jan  1 08:12:58 host sshd[1393]: Connection closed by 162.218.126.136 port 59636 [preauth]
Jan  1 08:20:33 host sshd[2443]: Invalid user bzrx1098ui from 92.255.85.115 port 30629
Jan  1 08:20:33 host sshd[2443]: input_userauth_request: invalid user bzrx1098ui [preauth]
Jan  1 08:20:33 host sshd[2443]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 08:20:33 host sshd[2443]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.255.85.115
Jan  1 08:20:35 host sshd[2443]: Failed password for invalid user bzrx1098ui from 92.255.85.115 port 30629 ssh2
Jan  1 08:20:35 host sshd[2443]: Connection reset by 92.255.85.115 port 30629 [preauth]
Jan  1 08:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  1 08:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 08:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 08:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  1 08:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 08:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 08:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  1 08:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 08:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 08:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  1 08:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 08:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 08:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  1 08:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 08:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 08:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  1 08:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 08:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 08:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  1 08:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 08:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 08:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  1 08:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 08:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 08:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  1 08:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 08:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 08:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  1 08:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 08:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 08:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  1 08:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 08:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 08:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  1 08:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 08:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 08:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  1 08:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 08:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 08:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=gifterman user-2=palco123 user-3=kottayamcalldriv user-4=phmetals user-5=mrsclean user-6=wwwnexidigital user-7=bonifacegroup user-8=wwwevmhonda user-9=straightcurve user-10=wwwletsstalkfood user-11=vfmassets user-12=wwwtestugo user-13=shalinijames user-14=pmcresources user-15=disposeat user-16=wwwkmaorg user-17=remysagr user-18=woodpeck user-19=wwwkapin user-20=travelboniface user-21=wwwrmswll user-22=wwwresourcehunte user-23=keralaholi user-24=ugotscom user-25=wwwpmcresource user-26=dartsimp user-27=a2zgroup user-28=laundryboniface user-29=cochintaxi user-30=wwwkaretakers feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  1 08:21:51 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  1 08:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 08:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 08:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  1 08:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 08:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 08:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-oONOLWTWs7IDsNfN.~
Jan  1 08:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 08:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 08:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-oONOLWTWs7IDsNfN.~'
Jan  1 08:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 08:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 08:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-oONOLWTWs7IDsNfN.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  1 08:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 08:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 08:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  1 08:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 08:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 08:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  1 08:21:51 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  1 08:21:51 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  1 08:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  1 08:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 08:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 08:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  1 08:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 08:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 08:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  1 08:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 08:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 08:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  1 08:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 08:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 08:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  1 08:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 08:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 08:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  1 08:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  1 08:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  1 08:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  1 08:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  1 08:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  1 08:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  1 08:21:56 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  1 08:21:58 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  1 08:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  1 08:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  1 08:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  1 08:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  1 08:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  1 08:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  1 08:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  1 08:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  1 08:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  1 08:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  1 08:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  1 08:22:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  1 08:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  1 08:22:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  1 08:22:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  1 08:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  1 08:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  1 08:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  1 08:30:56 host sshd[4033]: Invalid user stephen from 107.189.30.59 port 43528
Jan  1 08:30:56 host sshd[4033]: input_userauth_request: invalid user stephen [preauth]
Jan  1 08:30:56 host sshd[4033]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 08:30:56 host sshd[4033]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59
Jan  1 08:30:58 host sshd[4033]: Failed password for invalid user stephen from 107.189.30.59 port 43528 ssh2
Jan  1 08:30:59 host sshd[4033]: Connection closed by 107.189.30.59 port 43528 [preauth]
Jan  1 08:35:51 host sshd[4633]: Invalid user telecomadmin from 92.255.85.115 port 64238
Jan  1 08:35:51 host sshd[4633]: input_userauth_request: invalid user telecomadmin [preauth]
Jan  1 08:35:51 host sshd[4633]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 08:35:51 host sshd[4633]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.255.85.115
Jan  1 08:35:53 host sshd[4633]: Failed password for invalid user telecomadmin from 92.255.85.115 port 64238 ssh2
Jan  1 08:35:53 host sshd[4633]: Connection reset by 92.255.85.115 port 64238 [preauth]
Jan  1 08:47:05 host sshd[6198]: Connection closed by 192.241.210.29 port 49070 [preauth]
Jan  1 08:49:16 host sshd[6466]: Invalid user admin from 92.255.85.115 port 3353
Jan  1 08:49:16 host sshd[6466]: input_userauth_request: invalid user admin [preauth]
Jan  1 08:49:17 host sshd[6466]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 08:49:17 host sshd[6466]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.255.85.115
Jan  1 08:49:19 host sshd[6466]: Failed password for invalid user admin from 92.255.85.115 port 3353 ssh2
Jan  1 09:03:00 host sshd[8735]: User root from 45.93.201.90 not allowed because not listed in AllowUsers
Jan  1 09:03:00 host sshd[8735]: input_userauth_request: invalid user root [preauth]
Jan  1 09:03:00 host sshd[8735]: Failed none for invalid user root from 45.93.201.90 port 35304 ssh2
Jan  1 09:03:03 host unix_chkpwd[8753]: password check failed for user (root)
Jan  1 09:03:03 host sshd[8735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90  user=root
Jan  1 09:03:03 host sshd[8735]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 09:03:05 host sshd[8735]: Failed password for invalid user root from 45.93.201.90 port 35304 ssh2
Jan  1 09:03:08 host unix_chkpwd[8771]: password check failed for user (root)
Jan  1 09:03:08 host sshd[8735]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 09:03:11 host sshd[8735]: Failed password for invalid user root from 45.93.201.90 port 35304 ssh2
Jan  1 09:03:14 host sshd[8735]: Connection closed by 45.93.201.90 port 35304 [preauth]
Jan  1 09:03:14 host sshd[8735]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90  user=root
Jan  1 09:05:26 host sshd[9226]: Invalid user rsync from 41.197.31.178 port 39852
Jan  1 09:05:26 host sshd[9226]: input_userauth_request: invalid user rsync [preauth]
Jan  1 09:05:27 host sshd[9226]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 09:05:27 host sshd[9226]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178
Jan  1 09:05:30 host sshd[9226]: Failed password for invalid user rsync from 41.197.31.178 port 39852 ssh2
Jan  1 09:05:30 host sshd[9226]: Connection closed by 41.197.31.178 port 39852 [preauth]
Jan  1 09:14:26 host sshd[10657]: User root from 106.10.122.53 not allowed because not listed in AllowUsers
Jan  1 09:14:26 host sshd[10657]: input_userauth_request: invalid user root [preauth]
Jan  1 09:14:26 host unix_chkpwd[10679]: password check failed for user (root)
Jan  1 09:14:26 host sshd[10657]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53  user=root
Jan  1 09:14:26 host sshd[10657]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 09:14:28 host sshd[10657]: Failed password for invalid user root from 106.10.122.53 port 45024 ssh2
Jan  1 09:14:28 host sshd[10657]: Connection closed by 106.10.122.53 port 45024 [preauth]
Jan  1 09:18:02 host sshd[11146]: Invalid user user from 162.218.126.136 port 56204
Jan  1 09:18:02 host sshd[11146]: input_userauth_request: invalid user user [preauth]
Jan  1 09:18:03 host sshd[11146]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 09:18:03 host sshd[11146]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136
Jan  1 09:18:05 host sshd[11146]: Failed password for invalid user user from 162.218.126.136 port 56204 ssh2
Jan  1 09:18:05 host sshd[11146]: Connection closed by 162.218.126.136 port 56204 [preauth]
Jan  1 09:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  1 09:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 09:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 09:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  1 09:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 09:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 09:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  1 09:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 09:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 09:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  1 09:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 09:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 09:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  1 09:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 09:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 09:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  1 09:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 09:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 09:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  1 09:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 09:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 09:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  1 09:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 09:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 09:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  1 09:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 09:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 09:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  1 09:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 09:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 09:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  1 09:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 09:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 09:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  1 09:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 09:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 09:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  1 09:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 09:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 09:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=wwwrmswll user-3=keralaholi user-4=wwwresourcehunte user-5=ugotscom user-6=travelboniface user-7=cochintaxi user-8=wwwkaretakers user-9=laundryboniface user-10=dartsimp user-11=a2zgroup user-12=straightcurve user-13=wwwletsstalkfood user-14=bonifacegroup user-15=wwwevmhonda user-16=mrsclean user-17=wwwnexidigital user-18=gifterman user-19=palco123 user-20=phmetals user-21=kottayamcalldriv user-22=woodpeck user-23=wwwkapin user-24=disposeat user-25=wwwkmaorg user-26=remysagr user-27=pmcresources user-28=vfmassets user-29=wwwtestugo user-30=shalinijames feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  1 09:21:50 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  1 09:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 09:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 09:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  1 09:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 09:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 09:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Tn0vTZ64FUIVxded.~
Jan  1 09:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 09:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 09:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Tn0vTZ64FUIVxded.~'
Jan  1 09:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 09:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 09:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Tn0vTZ64FUIVxded.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  1 09:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 09:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 09:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  1 09:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 09:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 09:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  1 09:21:51 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  1 09:21:51 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  1 09:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  1 09:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 09:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 09:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  1 09:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 09:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 09:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  1 09:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 09:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 09:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  1 09:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 09:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 09:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  1 09:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 09:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 09:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  1 09:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  1 09:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  1 09:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  1 09:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  1 09:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  1 09:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  1 09:21:58 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  1 09:22:03 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  1 09:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  1 09:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  1 09:22:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  1 09:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  1 09:22:09 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  1 09:22:10 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  1 09:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  1 09:22:10 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  1 09:22:15 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  1 09:22:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  1 09:22:15 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  1 09:22:16 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  1 09:22:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  1 09:22:17 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  1 09:22:18 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  1 09:22:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  1 09:22:19 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  1 09:22:20 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  1 09:28:59 host sshd[13088]: Invalid user buntu from 103.13.40.2 port 49008
Jan  1 09:28:59 host sshd[13088]: input_userauth_request: invalid user buntu [preauth]
Jan  1 09:28:59 host sshd[13088]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 09:28:59 host sshd[13088]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2
Jan  1 09:29:01 host sshd[13088]: Failed password for invalid user buntu from 103.13.40.2 port 49008 ssh2
Jan  1 09:29:01 host sshd[13088]: Connection closed by 103.13.40.2 port 49008 [preauth]
Jan  1 09:32:47 host sshd[13773]: Did not receive identification string from 34.92.211.177 port 33702
Jan  1 09:43:34 host sshd[15482]: Did not receive identification string from 149.129.220.222 port 61000
Jan  1 09:49:50 host sshd[16351]: Invalid user adminuser from 92.46.108.20 port 57942
Jan  1 09:49:50 host sshd[16351]: input_userauth_request: invalid user adminuser [preauth]
Jan  1 09:49:51 host sshd[16351]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 09:49:51 host sshd[16351]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20
Jan  1 09:49:52 host sshd[16351]: Failed password for invalid user adminuser from 92.46.108.20 port 57942 ssh2
Jan  1 09:49:53 host sshd[16351]: Connection closed by 92.46.108.20 port 57942 [preauth]
Jan  1 10:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  1 10:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 10:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 10:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  1 10:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 10:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 10:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  1 10:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 10:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 10:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  1 10:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 10:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 10:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  1 10:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 10:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 10:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  1 10:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 10:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 10:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  1 10:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 10:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 10:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  1 10:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 10:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 10:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  1 10:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 10:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 10:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  1 10:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 10:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 10:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  1 10:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 10:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 10:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  1 10:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 10:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 10:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  1 10:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 10:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 10:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=disposeat user-2=wwwkmaorg user-3=remysagr user-4=wwwkapin user-5=woodpeck user-6=wwwtestugo user-7=shalinijames user-8=vfmassets user-9=pmcresources user-10=wwwevmhonda user-11=bonifacegroup user-12=wwwletsstalkfood user-13=straightcurve user-14=kottayamcalldriv user-15=phmetals user-16=gifterman user-17=palco123 user-18=mrsclean user-19=wwwnexidigital user-20=cochintaxi user-21=wwwkaretakers user-22=dartsimp user-23=a2zgroup user-24=laundryboniface user-25=wwwpmcresource user-26=travelboniface user-27=ugotscom user-28=wwwrmswll user-29=wwwresourcehunte user-30=keralaholi feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  1 10:21:50 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  1 10:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 10:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 10:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  1 10:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 10:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 10:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-MKdtKFobUPGhOe2G.~
Jan  1 10:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 10:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 10:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-MKdtKFobUPGhOe2G.~'
Jan  1 10:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 10:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 10:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-MKdtKFobUPGhOe2G.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  1 10:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 10:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 10:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  1 10:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 10:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 10:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  1 10:21:51 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  1 10:21:51 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  1 10:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  1 10:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 10:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 10:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  1 10:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 10:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 10:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  1 10:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 10:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 10:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  1 10:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 10:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 10:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  1 10:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 10:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 10:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  1 10:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  1 10:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  1 10:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  1 10:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  1 10:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  1 10:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  1 10:21:56 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  1 10:21:58 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  1 10:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  1 10:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  1 10:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  1 10:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  1 10:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  1 10:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  1 10:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  1 10:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  1 10:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  1 10:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  1 10:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  1 10:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  1 10:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  1 10:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  1 10:22:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  1 10:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  1 10:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  1 10:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  1 10:22:55 host sshd[20921]: Invalid user tmp from 162.218.126.136 port 45950
Jan  1 10:22:55 host sshd[20921]: input_userauth_request: invalid user tmp [preauth]
Jan  1 10:22:55 host sshd[20921]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 10:22:55 host sshd[20921]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136
Jan  1 10:22:57 host sshd[20921]: Failed password for invalid user tmp from 162.218.126.136 port 45950 ssh2
Jan  1 10:22:57 host sshd[20921]: Connection closed by 162.218.126.136 port 45950 [preauth]
Jan  1 10:28:22 host sshd[21684]: Bad protocol version identification '\026\003\001\001 \001' from 164.52.25.253 port 40085
Jan  1 10:28:22 host sshd[21685]: Bad protocol version identification '\026\003\001' from 164.52.25.253 port 38460
Jan  1 10:28:22 host sshd[21686]: Bad protocol version identification '\026\003\001' from 164.52.25.253 port 34458
Jan  1 10:28:23 host sshd[21687]: Bad protocol version identification '\026\003\001' from 164.52.25.253 port 52701
Jan  1 10:28:26 host sshd[21688]: Connection reset by 164.52.25.253 port 35272 [preauth]
Jan  1 10:30:26 host sshd[21915]: User root from 103.215.222.178 not allowed because not listed in AllowUsers
Jan  1 10:30:26 host sshd[21915]: input_userauth_request: invalid user root [preauth]
Jan  1 10:30:26 host unix_chkpwd[21939]: password check failed for user (root)
Jan  1 10:30:26 host sshd[21915]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.215.222.178  user=root
Jan  1 10:30:26 host sshd[21915]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 10:30:28 host sshd[21915]: Failed password for invalid user root from 103.215.222.178 port 46028 ssh2
Jan  1 10:30:28 host sshd[21915]: Received disconnect from 103.215.222.178 port 46028:11: Bye Bye [preauth]
Jan  1 10:30:28 host sshd[21915]: Disconnected from 103.215.222.178 port 46028 [preauth]
Jan  1 10:30:48 host sshd[22076]: User root from 198.27.67.44 not allowed because not listed in AllowUsers
Jan  1 10:30:48 host sshd[22076]: input_userauth_request: invalid user root [preauth]
Jan  1 10:30:48 host unix_chkpwd[22080]: password check failed for user (root)
Jan  1 10:30:48 host sshd[22076]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.27.67.44  user=root
Jan  1 10:30:48 host sshd[22076]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 10:30:50 host sshd[22076]: Failed password for invalid user root from 198.27.67.44 port 38448 ssh2
Jan  1 10:30:51 host sshd[22076]: Received disconnect from 198.27.67.44 port 38448:11: Bye Bye [preauth]
Jan  1 10:30:51 host sshd[22076]: Disconnected from 198.27.67.44 port 38448 [preauth]
Jan  1 10:31:06 host sshd[22114]: User root from 45.144.136.214 not allowed because not listed in AllowUsers
Jan  1 10:31:06 host sshd[22114]: input_userauth_request: invalid user root [preauth]
Jan  1 10:31:06 host unix_chkpwd[22116]: password check failed for user (root)
Jan  1 10:31:06 host sshd[22114]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.144.136.214  user=root
Jan  1 10:31:06 host sshd[22114]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 10:31:08 host sshd[22114]: Failed password for invalid user root from 45.144.136.214 port 38106 ssh2
Jan  1 10:31:08 host sshd[22114]: Received disconnect from 45.144.136.214 port 38106:11: Bye Bye [preauth]
Jan  1 10:31:08 host sshd[22114]: Disconnected from 45.144.136.214 port 38106 [preauth]
Jan  1 10:32:05 host sshd[22217]: Invalid user matt from 193.70.1.27 port 60862
Jan  1 10:32:05 host sshd[22217]: input_userauth_request: invalid user matt [preauth]
Jan  1 10:32:05 host sshd[22217]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 10:32:05 host sshd[22217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.1.27
Jan  1 10:32:07 host sshd[22217]: Failed password for invalid user matt from 193.70.1.27 port 60862 ssh2
Jan  1 10:32:07 host sshd[22217]: Received disconnect from 193.70.1.27 port 60862:11: Bye Bye [preauth]
Jan  1 10:32:07 host sshd[22217]: Disconnected from 193.70.1.27 port 60862 [preauth]
Jan  1 10:32:19 host sshd[22235]: User root from 160.86.98.213 not allowed because not listed in AllowUsers
Jan  1 10:32:19 host sshd[22235]: input_userauth_request: invalid user root [preauth]
Jan  1 10:32:19 host unix_chkpwd[22237]: password check failed for user (root)
Jan  1 10:32:19 host sshd[22235]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=160.86.98.213  user=root
Jan  1 10:32:19 host sshd[22235]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 10:32:22 host sshd[22235]: Failed password for invalid user root from 160.86.98.213 port 24875 ssh2
Jan  1 10:32:22 host sshd[22235]: Received disconnect from 160.86.98.213 port 24875:11: Bye Bye [preauth]
Jan  1 10:32:22 host sshd[22235]: Disconnected from 160.86.98.213 port 24875 [preauth]
Jan  1 10:32:25 host sshd[22243]: User root from 147.182.179.237 not allowed because not listed in AllowUsers
Jan  1 10:32:25 host sshd[22243]: input_userauth_request: invalid user root [preauth]
Jan  1 10:32:25 host unix_chkpwd[22247]: password check failed for user (root)
Jan  1 10:32:25 host sshd[22243]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.182.179.237  user=root
Jan  1 10:32:25 host sshd[22243]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 10:32:27 host sshd[22243]: Failed password for invalid user root from 147.182.179.237 port 52652 ssh2
Jan  1 10:32:27 host sshd[22243]: Received disconnect from 147.182.179.237 port 52652:11: Bye Bye [preauth]
Jan  1 10:32:27 host sshd[22243]: Disconnected from 147.182.179.237 port 52652 [preauth]
Jan  1 10:32:50 host sshd[22304]: User root from 104.243.23.43 not allowed because not listed in AllowUsers
Jan  1 10:32:50 host sshd[22304]: input_userauth_request: invalid user root [preauth]
Jan  1 10:32:50 host unix_chkpwd[22309]: password check failed for user (root)
Jan  1 10:32:50 host sshd[22304]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.243.23.43  user=root
Jan  1 10:32:50 host sshd[22304]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 10:32:52 host sshd[22304]: Failed password for invalid user root from 104.243.23.43 port 46510 ssh2
Jan  1 10:32:52 host sshd[22304]: Received disconnect from 104.243.23.43 port 46510:11: Bye Bye [preauth]
Jan  1 10:32:52 host sshd[22304]: Disconnected from 104.243.23.43 port 46510 [preauth]
Jan  1 10:33:03 host sshd[22334]: Invalid user oracle from 159.203.66.111 port 57548
Jan  1 10:33:03 host sshd[22334]: input_userauth_request: invalid user oracle [preauth]
Jan  1 10:33:03 host sshd[22334]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 10:33:03 host sshd[22334]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.66.111
Jan  1 10:33:05 host sshd[22334]: Failed password for invalid user oracle from 159.203.66.111 port 57548 ssh2
Jan  1 10:33:05 host sshd[22334]: Received disconnect from 159.203.66.111 port 57548:11: Bye Bye [preauth]
Jan  1 10:33:05 host sshd[22334]: Disconnected from 159.203.66.111 port 57548 [preauth]
Jan  1 10:34:51 host sshd[22548]: User root from 198.27.67.44 not allowed because not listed in AllowUsers
Jan  1 10:34:51 host sshd[22548]: input_userauth_request: invalid user root [preauth]
Jan  1 10:34:51 host unix_chkpwd[22551]: password check failed for user (root)
Jan  1 10:34:51 host sshd[22548]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.27.67.44  user=root
Jan  1 10:34:51 host sshd[22548]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 10:34:52 host sshd[22548]: Failed password for invalid user root from 198.27.67.44 port 60630 ssh2
Jan  1 10:34:53 host sshd[22548]: Received disconnect from 198.27.67.44 port 60630:11: Bye Bye [preauth]
Jan  1 10:34:53 host sshd[22548]: Disconnected from 198.27.67.44 port 60630 [preauth]
Jan  1 10:35:06 host sshd[22638]: User root from 147.182.179.237 not allowed because not listed in AllowUsers
Jan  1 10:35:06 host sshd[22638]: input_userauth_request: invalid user root [preauth]
Jan  1 10:35:06 host unix_chkpwd[22641]: password check failed for user (root)
Jan  1 10:35:06 host sshd[22638]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.182.179.237  user=root
Jan  1 10:35:06 host sshd[22638]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 10:35:08 host sshd[22638]: Failed password for invalid user root from 147.182.179.237 port 43674 ssh2
Jan  1 10:35:12 host sshd[22676]: Invalid user webpage from 159.203.66.111 port 60574
Jan  1 10:35:12 host sshd[22676]: input_userauth_request: invalid user webpage [preauth]
Jan  1 10:35:12 host sshd[22676]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 10:35:12 host sshd[22676]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.66.111
Jan  1 10:35:14 host sshd[22676]: Failed password for invalid user webpage from 159.203.66.111 port 60574 ssh2
Jan  1 10:35:14 host sshd[22676]: Received disconnect from 159.203.66.111 port 60574:11: Bye Bye [preauth]
Jan  1 10:35:14 host sshd[22676]: Disconnected from 159.203.66.111 port 60574 [preauth]
Jan  1 10:35:30 host sshd[22758]: User root from 193.70.1.27 not allowed because not listed in AllowUsers
Jan  1 10:35:30 host sshd[22758]: input_userauth_request: invalid user root [preauth]
Jan  1 10:35:30 host unix_chkpwd[22760]: password check failed for user (root)
Jan  1 10:35:30 host sshd[22758]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.1.27  user=root
Jan  1 10:35:30 host sshd[22758]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 10:35:33 host sshd[22758]: Failed password for invalid user root from 193.70.1.27 port 57194 ssh2
Jan  1 10:35:33 host sshd[22758]: Received disconnect from 193.70.1.27 port 57194:11: Bye Bye [preauth]
Jan  1 10:35:33 host sshd[22758]: Disconnected from 193.70.1.27 port 57194 [preauth]
Jan  1 10:36:15 host sshd[22945]: User root from 159.203.66.111 not allowed because not listed in AllowUsers
Jan  1 10:36:15 host sshd[22945]: input_userauth_request: invalid user root [preauth]
Jan  1 10:36:15 host unix_chkpwd[22950]: password check failed for user (root)
Jan  1 10:36:15 host sshd[22945]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.66.111  user=root
Jan  1 10:36:15 host sshd[22945]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 10:36:16 host sshd[22948]: User root from 160.86.98.213 not allowed because not listed in AllowUsers
Jan  1 10:36:16 host sshd[22948]: input_userauth_request: invalid user root [preauth]
Jan  1 10:36:16 host unix_chkpwd[22951]: password check failed for user (root)
Jan  1 10:36:16 host sshd[22948]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=160.86.98.213  user=root
Jan  1 10:36:16 host sshd[22948]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 10:36:17 host sshd[22945]: Failed password for invalid user root from 159.203.66.111 port 56456 ssh2
Jan  1 10:36:17 host sshd[22948]: Failed password for invalid user root from 160.86.98.213 port 11605 ssh2
Jan  1 10:36:17 host sshd[22945]: Received disconnect from 159.203.66.111 port 56456:11: Bye Bye [preauth]
Jan  1 10:36:17 host sshd[22945]: Disconnected from 159.203.66.111 port 56456 [preauth]
Jan  1 10:36:17 host sshd[22948]: Received disconnect from 160.86.98.213 port 11605:11: Bye Bye [preauth]
Jan  1 10:36:17 host sshd[22948]: Disconnected from 160.86.98.213 port 11605 [preauth]
Jan  1 10:36:23 host sshd[23018]: User root from 103.215.222.178 not allowed because not listed in AllowUsers
Jan  1 10:36:23 host sshd[23018]: input_userauth_request: invalid user root [preauth]
Jan  1 10:36:23 host unix_chkpwd[23021]: password check failed for user (root)
Jan  1 10:36:23 host sshd[23018]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.215.222.178  user=root
Jan  1 10:36:23 host sshd[23018]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 10:36:25 host sshd[23018]: Failed password for invalid user root from 103.215.222.178 port 39628 ssh2
Jan  1 10:36:25 host sshd[23018]: Received disconnect from 103.215.222.178 port 39628:11: Bye Bye [preauth]
Jan  1 10:36:25 host sshd[23018]: Disconnected from 103.215.222.178 port 39628 [preauth]
Jan  1 10:36:29 host sshd[23060]: User root from 45.144.136.214 not allowed because not listed in AllowUsers
Jan  1 10:36:29 host sshd[23060]: input_userauth_request: invalid user root [preauth]
Jan  1 10:36:30 host unix_chkpwd[23063]: password check failed for user (root)
Jan  1 10:36:30 host sshd[23060]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.144.136.214  user=root
Jan  1 10:36:30 host sshd[23060]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 10:36:32 host sshd[23060]: Failed password for invalid user root from 45.144.136.214 port 57994 ssh2
Jan  1 10:36:32 host sshd[23060]: Received disconnect from 45.144.136.214 port 57994:11: Bye Bye [preauth]
Jan  1 10:36:32 host sshd[23060]: Disconnected from 45.144.136.214 port 57994 [preauth]
Jan  1 10:37:42 host sshd[23247]: Invalid user user from 106.10.122.53 port 38710
Jan  1 10:37:42 host sshd[23247]: input_userauth_request: invalid user user [preauth]
Jan  1 10:37:42 host sshd[23247]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 10:37:42 host sshd[23247]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53
Jan  1 10:37:44 host sshd[23247]: Failed password for invalid user user from 106.10.122.53 port 38710 ssh2
Jan  1 10:37:44 host sshd[23247]: Connection closed by 106.10.122.53 port 38710 [preauth]
Jan  1 10:45:26 host sshd[24261]: Invalid user hxhtadmin from 104.243.23.43 port 33574
Jan  1 10:45:26 host sshd[24261]: input_userauth_request: invalid user hxhtadmin [preauth]
Jan  1 10:45:26 host sshd[24261]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 10:45:26 host sshd[24261]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.243.23.43
Jan  1 10:45:28 host sshd[24261]: Failed password for invalid user hxhtadmin from 104.243.23.43 port 33574 ssh2
Jan  1 10:45:31 host sshd[24261]: Received disconnect from 104.243.23.43 port 33574:11: Bye Bye [preauth]
Jan  1 10:45:31 host sshd[24261]: Disconnected from 104.243.23.43 port 33574 [preauth]
Jan  1 10:47:38 host sshd[24567]: User root from 41.197.31.178 not allowed because not listed in AllowUsers
Jan  1 10:47:38 host sshd[24567]: input_userauth_request: invalid user root [preauth]
Jan  1 10:47:38 host unix_chkpwd[24570]: password check failed for user (root)
Jan  1 10:47:38 host sshd[24567]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178  user=root
Jan  1 10:47:38 host sshd[24567]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 10:47:41 host sshd[24567]: Failed password for invalid user root from 41.197.31.178 port 56556 ssh2
Jan  1 10:47:41 host sshd[24567]: Connection closed by 41.197.31.178 port 56556 [preauth]
Jan  1 10:49:14 host sshd[24800]: Did not receive identification string from 80.66.77.84 port 65352
Jan  1 10:50:30 host sshd[25033]: Invalid user yh from 103.13.40.2 port 53098
Jan  1 10:50:30 host sshd[25033]: input_userauth_request: invalid user yh [preauth]
Jan  1 10:50:30 host sshd[25033]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 10:50:30 host sshd[25033]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2
Jan  1 10:50:33 host sshd[25033]: Failed password for invalid user yh from 103.13.40.2 port 53098 ssh2
Jan  1 10:50:33 host sshd[25033]: Connection closed by 103.13.40.2 port 53098 [preauth]
Jan  1 11:11:14 host sshd[27774]: User root from 209.141.55.27 not allowed because not listed in AllowUsers
Jan  1 11:11:14 host sshd[27774]: input_userauth_request: invalid user root [preauth]
Jan  1 11:11:14 host unix_chkpwd[27777]: password check failed for user (root)
Jan  1 11:11:14 host sshd[27774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.55.27  user=root
Jan  1 11:11:14 host sshd[27774]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 11:11:16 host sshd[27774]: Failed password for invalid user root from 209.141.55.27 port 43086 ssh2
Jan  1 11:11:16 host sshd[27774]: Received disconnect from 209.141.55.27 port 43086:11: Normal Shutdown, Thank you for playing [preauth]
Jan  1 11:11:16 host sshd[27774]: Disconnected from 209.141.55.27 port 43086 [preauth]
Jan  1 11:16:34 host sshd[28445]: User root from 111.125.70.22 not allowed because not listed in AllowUsers
Jan  1 11:16:34 host sshd[28445]: input_userauth_request: invalid user root [preauth]
Jan  1 11:16:34 host unix_chkpwd[28483]: password check failed for user (root)
Jan  1 11:16:34 host sshd[28445]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.125.70.22  user=root
Jan  1 11:16:34 host sshd[28445]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 11:16:37 host sshd[28445]: Failed password for invalid user root from 111.125.70.22 port 52673 ssh2
Jan  1 11:16:40 host sshd[28445]: Received disconnect from 111.125.70.22 port 52673:11: Bye Bye [preauth]
Jan  1 11:16:40 host sshd[28445]: Disconnected from 111.125.70.22 port 52673 [preauth]
Jan  1 11:17:15 host sshd[28577]: User root from 172.174.43.214 not allowed because not listed in AllowUsers
Jan  1 11:17:15 host sshd[28577]: input_userauth_request: invalid user root [preauth]
Jan  1 11:17:15 host unix_chkpwd[28580]: password check failed for user (root)
Jan  1 11:17:15 host sshd[28577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.174.43.214  user=root
Jan  1 11:17:15 host sshd[28577]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 11:17:16 host sshd[28577]: Failed password for invalid user root from 172.174.43.214 port 43928 ssh2
Jan  1 11:17:17 host sshd[28577]: Received disconnect from 172.174.43.214 port 43928:11: Bye Bye [preauth]
Jan  1 11:17:17 host sshd[28577]: Disconnected from 172.174.43.214 port 43928 [preauth]
Jan  1 11:19:45 host sshd[28865]: User root from 188.134.83.209 not allowed because not listed in AllowUsers
Jan  1 11:19:45 host sshd[28865]: input_userauth_request: invalid user root [preauth]
Jan  1 11:19:45 host unix_chkpwd[28869]: password check failed for user (root)
Jan  1 11:19:45 host sshd[28865]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.134.83.209  user=root
Jan  1 11:19:45 host sshd[28865]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 11:19:46 host sshd[28865]: Failed password for invalid user root from 188.134.83.209 port 44978 ssh2
Jan  1 11:19:46 host sshd[28865]: Received disconnect from 188.134.83.209 port 44978:11: Bye Bye [preauth]
Jan  1 11:19:46 host sshd[28865]: Disconnected from 188.134.83.209 port 44978 [preauth]
Jan  1 11:20:18 host sshd[28946]: Invalid user fenix from 111.125.70.22 port 44493
Jan  1 11:20:18 host sshd[28946]: input_userauth_request: invalid user fenix [preauth]
Jan  1 11:20:18 host sshd[28946]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 11:20:18 host sshd[28946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.125.70.22
Jan  1 11:20:20 host sshd[28946]: Failed password for invalid user fenix from 111.125.70.22 port 44493 ssh2
Jan  1 11:20:20 host sshd[28946]: Received disconnect from 111.125.70.22 port 44493:11: Bye Bye [preauth]
Jan  1 11:20:20 host sshd[28946]: Disconnected from 111.125.70.22 port 44493 [preauth]
Jan  1 11:21:20 host sshd[29199]: User root from 172.174.43.214 not allowed because not listed in AllowUsers
Jan  1 11:21:20 host sshd[29199]: input_userauth_request: invalid user root [preauth]
Jan  1 11:21:20 host unix_chkpwd[29202]: password check failed for user (root)
Jan  1 11:21:20 host sshd[29199]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.174.43.214  user=root
Jan  1 11:21:20 host sshd[29199]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 11:21:23 host sshd[29199]: Failed password for invalid user root from 172.174.43.214 port 37234 ssh2
Jan  1 11:21:23 host sshd[29199]: Received disconnect from 172.174.43.214 port 37234:11: Bye Bye [preauth]
Jan  1 11:21:23 host sshd[29199]: Disconnected from 172.174.43.214 port 37234 [preauth]
Jan  1 11:21:30 host sshd[29269]: User root from 188.134.83.209 not allowed because not listed in AllowUsers
Jan  1 11:21:30 host sshd[29269]: input_userauth_request: invalid user root [preauth]
Jan  1 11:21:30 host unix_chkpwd[29276]: password check failed for user (root)
Jan  1 11:21:30 host sshd[29269]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.134.83.209  user=root
Jan  1 11:21:30 host sshd[29269]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 11:21:32 host sshd[29269]: Failed password for invalid user root from 188.134.83.209 port 50562 ssh2
Jan  1 11:21:32 host sshd[29269]: Received disconnect from 188.134.83.209 port 50562:11: Bye Bye [preauth]
Jan  1 11:21:32 host sshd[29269]: Disconnected from 188.134.83.209 port 50562 [preauth]
Jan  1 11:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  1 11:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 11:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 11:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  1 11:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 11:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 11:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  1 11:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 11:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 11:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  1 11:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 11:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 11:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  1 11:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 11:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 11:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  1 11:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 11:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 11:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  1 11:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 11:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 11:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  1 11:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 11:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 11:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  1 11:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 11:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 11:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  1 11:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 11:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 11:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  1 11:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 11:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 11:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  1 11:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 11:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 11:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  1 11:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 11:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 11:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=mrsclean user-2=wwwnexidigital user-3=gifterman user-4=palco123 user-5=kottayamcalldriv user-6=phmetals user-7=wwwletsstalkfood user-8=straightcurve user-9=bonifacegroup user-10=wwwevmhonda user-11=pmcresources user-12=vfmassets user-13=wwwtestugo user-14=shalinijames user-15=woodpeck user-16=wwwkapin user-17=disposeat user-18=wwwkmaorg user-19=remysagr user-20=wwwrmswll user-21=wwwresourcehunte user-22=keralaholi user-23=ugotscom user-24=travelboniface user-25=wwwpmcresource user-26=laundryboniface user-27=dartsimp user-28=a2zgroup user-29=cochintaxi user-30=wwwkaretakers feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  1 11:21:52 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  1 11:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 11:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 11:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  1 11:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 11:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 11:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-zus4VvPR7M5aTT7Q.~
Jan  1 11:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 11:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 11:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-zus4VvPR7M5aTT7Q.~'
Jan  1 11:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 11:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 11:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-zus4VvPR7M5aTT7Q.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  1 11:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 11:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 11:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  1 11:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 11:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 11:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  1 11:21:53 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  1 11:21:53 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  1 11:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  1 11:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 11:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 11:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  1 11:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 11:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 11:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  1 11:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 11:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 11:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  1 11:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 11:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 11:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  1 11:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 11:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 11:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  1 11:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  1 11:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  1 11:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  1 11:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  1 11:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  1 11:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  1 11:21:57 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  1 11:21:59 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  1 11:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  1 11:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  1 11:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  1 11:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  1 11:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  1 11:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  1 11:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  1 11:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  1 11:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  1 11:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  1 11:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  1 11:22:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  1 11:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  1 11:22:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  1 11:22:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  1 11:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  1 11:22:09 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  1 11:22:13 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  1 11:27:50 host sshd[30445]: Invalid user user from 162.218.126.136 port 59910
Jan  1 11:27:50 host sshd[30445]: input_userauth_request: invalid user user [preauth]
Jan  1 11:27:50 host sshd[30445]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 11:27:50 host sshd[30445]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136
Jan  1 11:27:52 host sshd[30445]: Failed password for invalid user user from 162.218.126.136 port 59910 ssh2
Jan  1 11:27:53 host sshd[30445]: Connection closed by 162.218.126.136 port 59910 [preauth]
Jan  1 11:28:06 host sshd[30488]: User root from 45.66.230.87 not allowed because not listed in AllowUsers
Jan  1 11:28:06 host sshd[30488]: input_userauth_request: invalid user root [preauth]
Jan  1 11:28:06 host unix_chkpwd[30491]: password check failed for user (root)
Jan  1 11:28:06 host sshd[30488]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.66.230.87  user=root
Jan  1 11:28:06 host sshd[30488]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 11:28:09 host sshd[30488]: Failed password for invalid user root from 45.66.230.87 port 44492 ssh2
Jan  1 11:28:09 host sshd[30488]: Received disconnect from 45.66.230.87 port 44492:11: Bye Bye [preauth]
Jan  1 11:28:09 host sshd[30488]: Disconnected from 45.66.230.87 port 44492 [preauth]
Jan  1 11:28:10 host sshd[30495]: Invalid user admin from 45.66.230.87 port 48390
Jan  1 11:28:10 host sshd[30495]: input_userauth_request: invalid user admin [preauth]
Jan  1 11:28:10 host sshd[30495]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 11:28:10 host sshd[30495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.66.230.87
Jan  1 11:28:11 host sshd[30495]: Failed password for invalid user admin from 45.66.230.87 port 48390 ssh2
Jan  1 11:28:12 host sshd[30495]: Received disconnect from 45.66.230.87 port 48390:11: Bye Bye [preauth]
Jan  1 11:28:12 host sshd[30495]: Disconnected from 45.66.230.87 port 48390 [preauth]
Jan  1 11:28:13 host sshd[30499]: Invalid user admin from 45.66.230.87 port 51684
Jan  1 11:28:13 host sshd[30499]: input_userauth_request: invalid user admin [preauth]
Jan  1 11:28:13 host sshd[30499]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 11:28:13 host sshd[30499]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.66.230.87
Jan  1 11:28:15 host sshd[30499]: Failed password for invalid user admin from 45.66.230.87 port 51684 ssh2
Jan  1 11:28:15 host sshd[30499]: Received disconnect from 45.66.230.87 port 51684:11: Bye Bye [preauth]
Jan  1 11:28:15 host sshd[30499]: Disconnected from 45.66.230.87 port 51684 [preauth]
Jan  1 11:31:01 host sshd[30934]: Invalid user brian from 209.141.56.48 port 43980
Jan  1 11:31:01 host sshd[30934]: input_userauth_request: invalid user brian [preauth]
Jan  1 11:31:01 host sshd[30934]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 11:31:01 host sshd[30934]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48
Jan  1 11:31:03 host sshd[30934]: Failed password for invalid user brian from 209.141.56.48 port 43980 ssh2
Jan  1 11:31:04 host sshd[30934]: Connection closed by 209.141.56.48 port 43980 [preauth]
Jan  1 11:46:42 host sshd[996]: Did not receive identification string from 52.139.183.239 port 40398
Jan  1 11:51:12 host sshd[1644]: Invalid user pi from 82.65.33.144 port 45938
Jan  1 11:51:12 host sshd[1644]: input_userauth_request: invalid user pi [preauth]
Jan  1 11:51:12 host sshd[1645]: Invalid user pi from 82.65.33.144 port 45946
Jan  1 11:51:12 host sshd[1645]: input_userauth_request: invalid user pi [preauth]
Jan  1 11:51:12 host sshd[1644]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 11:51:12 host sshd[1644]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.65.33.144
Jan  1 11:51:12 host sshd[1645]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 11:51:12 host sshd[1645]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.65.33.144
Jan  1 11:51:14 host sshd[1644]: Failed password for invalid user pi from 82.65.33.144 port 45938 ssh2
Jan  1 11:51:14 host sshd[1645]: Failed password for invalid user pi from 82.65.33.144 port 45946 ssh2
Jan  1 11:51:14 host sshd[1644]: Connection closed by 82.65.33.144 port 45938 [preauth]
Jan  1 11:51:14 host sshd[1645]: Connection closed by 82.65.33.144 port 45946 [preauth]
Jan  1 12:01:37 host sshd[3226]: Did not receive identification string from 149.202.74.37 port 35572
Jan  1 12:01:38 host sshd[3227]: Invalid user test from 149.202.74.37 port 39988
Jan  1 12:01:38 host sshd[3227]: input_userauth_request: invalid user test [preauth]
Jan  1 12:01:38 host sshd[3229]: Invalid user emqx from 149.202.74.37 port 39970
Jan  1 12:01:38 host sshd[3229]: input_userauth_request: invalid user emqx [preauth]
Jan  1 12:01:38 host sshd[3228]: Invalid user web from 149.202.74.37 port 39944
Jan  1 12:01:38 host sshd[3228]: input_userauth_request: invalid user web [preauth]
Jan  1 12:01:38 host sshd[3234]: Invalid user user from 149.202.74.37 port 39984
Jan  1 12:01:38 host sshd[3234]: input_userauth_request: invalid user user [preauth]
Jan  1 12:01:38 host sshd[3231]: Invalid user oracle from 149.202.74.37 port 39940
Jan  1 12:01:38 host sshd[3231]: input_userauth_request: invalid user oracle [preauth]
Jan  1 12:01:38 host sshd[3238]: Invalid user admin from 149.202.74.37 port 39980
Jan  1 12:01:38 host sshd[3235]: Invalid user ansible from 149.202.74.37 port 39958
Jan  1 12:01:38 host sshd[3239]: Invalid user ubuntu from 149.202.74.37 port 40004
Jan  1 12:01:38 host sshd[3235]: input_userauth_request: invalid user ansible [preauth]
Jan  1 12:01:38 host sshd[3238]: input_userauth_request: invalid user admin [preauth]
Jan  1 12:01:38 host sshd[3237]: Invalid user vagrant from 149.202.74.37 port 40010
Jan  1 12:01:38 host sshd[3239]: input_userauth_request: invalid user ubuntu [preauth]
Jan  1 12:01:38 host sshd[3230]: Invalid user postgres from 149.202.74.37 port 40002
Jan  1 12:01:38 host sshd[3230]: input_userauth_request: invalid user postgres [preauth]
Jan  1 12:01:38 host sshd[3237]: input_userauth_request: invalid user vagrant [preauth]
Jan  1 12:01:38 host sshd[3236]: Invalid user ec2-user from 149.202.74.37 port 40006
Jan  1 12:01:38 host sshd[3236]: input_userauth_request: invalid user ec2-user [preauth]
Jan  1 12:01:38 host sshd[3232]: Invalid user ansadmin from 149.202.74.37 port 39996
Jan  1 12:01:38 host sshd[3232]: input_userauth_request: invalid user ansadmin [preauth]
Jan  1 12:01:38 host sshd[3233]: Invalid user user from 149.202.74.37 port 39992
Jan  1 12:01:38 host sshd[3233]: input_userauth_request: invalid user user [preauth]
Jan  1 12:01:38 host sshd[3241]: Invalid user ubuntu from 149.202.74.37 port 39972
Jan  1 12:01:38 host sshd[3241]: input_userauth_request: invalid user ubuntu [preauth]
Jan  1 12:01:38 host sshd[3240]: Invalid user dmdba from 149.202.74.37 port 39942
Jan  1 12:01:38 host sshd[3240]: input_userauth_request: invalid user dmdba [preauth]
Jan  1 12:01:38 host sshd[3242]: Invalid user test from 149.202.74.37 port 39934
Jan  1 12:01:38 host sshd[3242]: input_userauth_request: invalid user test [preauth]
Jan  1 12:01:38 host sshd[3227]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 12:01:38 host sshd[3227]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.74.37
Jan  1 12:01:38 host sshd[3234]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 12:01:38 host sshd[3228]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 12:01:38 host sshd[3228]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.74.37
Jan  1 12:01:38 host sshd[3234]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.74.37
Jan  1 12:01:38 host sshd[3229]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 12:01:38 host sshd[3229]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.74.37
Jan  1 12:01:38 host sshd[3238]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 12:01:38 host sshd[3238]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.74.37
Jan  1 12:01:38 host sshd[3231]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 12:01:38 host sshd[3235]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 12:01:38 host sshd[3231]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.74.37
Jan  1 12:01:38 host sshd[3235]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.74.37
Jan  1 12:01:38 host sshd[3230]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 12:01:38 host sshd[3230]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.74.37
Jan  1 12:01:38 host sshd[3239]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 12:01:38 host sshd[3239]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.74.37
Jan  1 12:01:38 host sshd[3237]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 12:01:38 host sshd[3237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.74.37
Jan  1 12:01:38 host sshd[3236]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 12:01:38 host sshd[3236]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.74.37
Jan  1 12:01:38 host sshd[3232]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 12:01:38 host sshd[3232]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.74.37
Jan  1 12:01:38 host sshd[3233]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 12:01:38 host sshd[3233]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.74.37
Jan  1 12:01:38 host sshd[3240]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 12:01:38 host sshd[3240]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.74.37
Jan  1 12:01:38 host sshd[3241]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 12:01:38 host sshd[3241]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.74.37
Jan  1 12:01:38 host sshd[3242]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 12:01:38 host sshd[3242]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.74.37
Jan  1 12:01:39 host sshd[3262]: Invalid user hadoop from 149.202.74.37 port 39998
Jan  1 12:01:39 host sshd[3262]: input_userauth_request: invalid user hadoop [preauth]
Jan  1 12:01:39 host sshd[3261]: Invalid user hadoop from 149.202.74.37 port 39966
Jan  1 12:01:39 host sshd[3261]: input_userauth_request: invalid user hadoop [preauth]
Jan  1 12:01:39 host sshd[3260]: Invalid user ftpuser from 149.202.74.37 port 39956
Jan  1 12:01:39 host sshd[3260]: input_userauth_request: invalid user ftpuser [preauth]
Jan  1 12:01:39 host sshd[3266]: Invalid user vagrant from 149.202.74.37 port 40008
Jan  1 12:01:39 host sshd[3266]: input_userauth_request: invalid user vagrant [preauth]
Jan  1 12:01:39 host sshd[3262]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 12:01:39 host sshd[3262]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.74.37
Jan  1 12:01:39 host sshd[3261]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 12:01:39 host sshd[3261]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.74.37
Jan  1 12:01:39 host sshd[3260]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 12:01:39 host sshd[3260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.74.37
Jan  1 12:01:39 host sshd[3266]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 12:01:39 host sshd[3266]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.74.37
Jan  1 12:01:40 host sshd[3227]: Failed password for invalid user test from 149.202.74.37 port 39988 ssh2
Jan  1 12:01:40 host sshd[3234]: Failed password for invalid user user from 149.202.74.37 port 39984 ssh2
Jan  1 12:01:40 host sshd[3228]: Failed password for invalid user web from 149.202.74.37 port 39944 ssh2
Jan  1 12:01:40 host sshd[3229]: Failed password for invalid user emqx from 149.202.74.37 port 39970 ssh2
Jan  1 12:01:40 host sshd[3238]: Failed password for invalid user admin from 149.202.74.37 port 39980 ssh2
Jan  1 12:01:40 host sshd[3231]: Failed password for invalid user oracle from 149.202.74.37 port 39940 ssh2
Jan  1 12:01:40 host sshd[3235]: Failed password for invalid user ansible from 149.202.74.37 port 39958 ssh2
Jan  1 12:01:40 host sshd[3230]: Failed password for invalid user postgres from 149.202.74.37 port 40002 ssh2
Jan  1 12:01:40 host sshd[3239]: Failed password for invalid user ubuntu from 149.202.74.37 port 40004 ssh2
Jan  1 12:01:40 host sshd[3237]: Failed password for invalid user vagrant from 149.202.74.37 port 40010 ssh2
Jan  1 12:01:40 host sshd[3236]: Failed password for invalid user ec2-user from 149.202.74.37 port 40006 ssh2
Jan  1 12:01:41 host sshd[3232]: Failed password for invalid user ansadmin from 149.202.74.37 port 39996 ssh2
Jan  1 12:01:41 host sshd[3233]: Failed password for invalid user user from 149.202.74.37 port 39992 ssh2
Jan  1 12:01:41 host sshd[3240]: Failed password for invalid user dmdba from 149.202.74.37 port 39942 ssh2
Jan  1 12:01:41 host sshd[3241]: Failed password for invalid user ubuntu from 149.202.74.37 port 39972 ssh2
Jan  1 12:01:41 host sshd[3242]: Failed password for invalid user test from 149.202.74.37 port 39934 ssh2
Jan  1 12:01:41 host sshd[3262]: Failed password for invalid user hadoop from 149.202.74.37 port 39998 ssh2
Jan  1 12:01:41 host sshd[3227]: Connection closed by 149.202.74.37 port 39988 [preauth]
Jan  1 12:01:41 host sshd[3261]: Failed password for invalid user hadoop from 149.202.74.37 port 39966 ssh2
Jan  1 12:01:41 host sshd[3260]: Failed password for invalid user ftpuser from 149.202.74.37 port 39956 ssh2
Jan  1 12:01:41 host sshd[3228]: Connection closed by 149.202.74.37 port 39944 [preauth]
Jan  1 12:01:41 host sshd[3234]: Connection closed by 149.202.74.37 port 39984 [preauth]
Jan  1 12:01:41 host sshd[3229]: Connection closed by 149.202.74.37 port 39970 [preauth]
Jan  1 12:01:41 host sshd[3238]: Connection closed by 149.202.74.37 port 39980 [preauth]
Jan  1 12:01:41 host sshd[3231]: Connection closed by 149.202.74.37 port 39940 [preauth]
Jan  1 12:01:41 host sshd[3230]: Connection closed by 149.202.74.37 port 40002 [preauth]
Jan  1 12:01:41 host sshd[3237]: Connection closed by 149.202.74.37 port 40010 [preauth]
Jan  1 12:01:41 host sshd[3235]: Connection closed by 149.202.74.37 port 39958 [preauth]
Jan  1 12:01:41 host sshd[3239]: Connection closed by 149.202.74.37 port 40004 [preauth]
Jan  1 12:01:41 host sshd[3236]: Connection closed by 149.202.74.37 port 40006 [preauth]
Jan  1 12:01:41 host sshd[3232]: Connection closed by 149.202.74.37 port 39996 [preauth]
Jan  1 12:01:41 host sshd[3233]: Connection closed by 149.202.74.37 port 39992 [preauth]
Jan  1 12:01:41 host sshd[3266]: Failed password for invalid user vagrant from 149.202.74.37 port 40008 ssh2
Jan  1 12:01:41 host sshd[3240]: Connection closed by 149.202.74.37 port 39942 [preauth]
Jan  1 12:01:41 host sshd[3241]: Connection closed by 149.202.74.37 port 39972 [preauth]
Jan  1 12:01:41 host sshd[3242]: Connection closed by 149.202.74.37 port 39934 [preauth]
Jan  1 12:01:41 host sshd[3262]: Connection closed by 149.202.74.37 port 39998 [preauth]
Jan  1 12:01:41 host sshd[3261]: Connection closed by 149.202.74.37 port 39966 [preauth]
Jan  1 12:01:41 host sshd[3260]: Connection closed by 149.202.74.37 port 39956 [preauth]
Jan  1 12:01:41 host sshd[3266]: Connection closed by 149.202.74.37 port 40008 [preauth]
Jan  1 12:01:41 host sshd[3270]: Invalid user user from 149.202.74.37 port 39978
Jan  1 12:01:41 host sshd[3270]: input_userauth_request: invalid user user [preauth]
Jan  1 12:01:41 host sshd[3271]: Invalid user user from 149.202.74.37 port 39952
Jan  1 12:01:41 host sshd[3271]: input_userauth_request: invalid user user [preauth]
Jan  1 12:01:41 host sshd[3270]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 12:01:41 host sshd[3270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.74.37
Jan  1 12:01:41 host sshd[3271]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 12:01:41 host sshd[3271]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.74.37
Jan  1 12:01:42 host sshd[3276]: User root from 106.10.122.53 not allowed because not listed in AllowUsers
Jan  1 12:01:42 host sshd[3276]: input_userauth_request: invalid user root [preauth]
Jan  1 12:01:42 host unix_chkpwd[3299]: password check failed for user (root)
Jan  1 12:01:42 host sshd[3276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53  user=root
Jan  1 12:01:42 host sshd[3276]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 12:01:43 host sshd[3270]: Failed password for invalid user user from 149.202.74.37 port 39978 ssh2
Jan  1 12:01:43 host sshd[3271]: Failed password for invalid user user from 149.202.74.37 port 39952 ssh2
Jan  1 12:01:43 host sshd[3276]: Failed password for invalid user root from 106.10.122.53 port 42540 ssh2
Jan  1 12:01:44 host sshd[3276]: Connection closed by 106.10.122.53 port 42540 [preauth]
Jan  1 12:07:26 host sshd[4393]: Invalid user  from 64.62.197.198 port 50371
Jan  1 12:07:26 host sshd[4393]: input_userauth_request: invalid user  [preauth]
Jan  1 12:07:29 host sshd[4393]: Connection closed by 64.62.197.198 port 50371 [preauth]
Jan  1 12:09:01 host sshd[4593]: Invalid user support from 45.93.201.90 port 39568
Jan  1 12:09:01 host sshd[4593]: input_userauth_request: invalid user support [preauth]
Jan  1 12:09:01 host sshd[4593]: Failed none for invalid user support from 45.93.201.90 port 39568 ssh2
Jan  1 12:09:04 host sshd[4593]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 12:09:04 host sshd[4593]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90
Jan  1 12:09:05 host sshd[4593]: Failed password for invalid user support from 45.93.201.90 port 39568 ssh2
Jan  1 12:09:09 host sshd[4593]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 12:09:11 host sshd[4593]: Failed password for invalid user support from 45.93.201.90 port 39568 ssh2
Jan  1 12:09:14 host sshd[4593]: Connection closed by 45.93.201.90 port 39568 [preauth]
Jan  1 12:09:14 host sshd[4593]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90
Jan  1 12:12:15 host sshd[5087]: User root from 103.13.40.2 not allowed because not listed in AllowUsers
Jan  1 12:12:15 host sshd[5087]: input_userauth_request: invalid user root [preauth]
Jan  1 12:12:15 host unix_chkpwd[5090]: password check failed for user (root)
Jan  1 12:12:15 host sshd[5087]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2  user=root
Jan  1 12:12:15 host sshd[5087]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 12:12:17 host sshd[5087]: Failed password for invalid user root from 103.13.40.2 port 41142 ssh2
Jan  1 12:12:18 host sshd[5087]: Connection closed by 103.13.40.2 port 41142 [preauth]
Jan  1 12:16:55 host sshd[6209]: Connection closed by 45.79.181.223 port 43898 [preauth]
Jan  1 12:16:57 host sshd[6215]: Connection closed by 45.79.181.223 port 43904 [preauth]
Jan  1 12:16:59 host sshd[6220]: Connection closed by 45.79.181.223 port 27350 [preauth]
Jan  1 12:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  1 12:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 12:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 12:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  1 12:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 12:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 12:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  1 12:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 12:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 12:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  1 12:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 12:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 12:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  1 12:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 12:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 12:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  1 12:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 12:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 12:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  1 12:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 12:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 12:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  1 12:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 12:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 12:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  1 12:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 12:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 12:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  1 12:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 12:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 12:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  1 12:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 12:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 12:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  1 12:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 12:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 12:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  1 12:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 12:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 12:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=travelboniface user-3=keralaholi user-4=wwwresourcehunte user-5=wwwrmswll user-6=ugotscom user-7=wwwkaretakers user-8=cochintaxi user-9=a2zgroup user-10=dartsimp user-11=laundryboniface user-12=bonifacegroup user-13=wwwevmhonda user-14=straightcurve user-15=wwwletsstalkfood user-16=palco123 user-17=gifterman user-18=kottayamcalldriv user-19=phmetals user-20=mrsclean user-21=wwwnexidigital user-22=disposeat user-23=wwwkmaorg user-24=remysagr user-25=woodpeck user-26=wwwkapin user-27=vfmassets user-28=shalinijames user-29=wwwtestugo user-30=pmcresources feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  1 12:21:51 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  1 12:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 12:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 12:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  1 12:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 12:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 12:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-5ZWiG0vUsq8rhEGa.~
Jan  1 12:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 12:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 12:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-5ZWiG0vUsq8rhEGa.~'
Jan  1 12:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 12:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 12:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-5ZWiG0vUsq8rhEGa.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  1 12:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 12:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 12:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  1 12:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 12:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 12:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  1 12:21:52 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  1 12:21:52 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  1 12:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  1 12:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 12:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 12:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  1 12:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 12:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 12:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  1 12:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 12:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 12:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  1 12:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 12:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 12:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  1 12:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 12:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 12:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  1 12:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  1 12:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  1 12:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  1 12:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  1 12:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  1 12:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  1 12:21:57 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  1 12:21:59 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  1 12:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  1 12:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  1 12:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  1 12:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  1 12:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  1 12:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  1 12:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  1 12:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  1 12:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  1 12:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  1 12:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  1 12:22:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  1 12:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  1 12:22:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  1 12:22:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  1 12:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  1 12:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  1 12:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  1 12:25:59 host sshd[8049]: Invalid user user from 92.46.108.20 port 53232
Jan  1 12:25:59 host sshd[8049]: input_userauth_request: invalid user user [preauth]
Jan  1 12:25:59 host sshd[8049]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 12:25:59 host sshd[8049]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20
Jan  1 12:26:01 host sshd[8049]: Failed password for invalid user user from 92.46.108.20 port 53232 ssh2
Jan  1 12:26:02 host sshd[8049]: Connection closed by 92.46.108.20 port 53232 [preauth]
Jan  1 12:26:57 host sshd[8150]: Invalid user upload from 121.7.31.13 port 58443
Jan  1 12:26:57 host sshd[8150]: input_userauth_request: invalid user upload [preauth]
Jan  1 12:26:57 host sshd[8150]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 12:26:57 host sshd[8150]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.7.31.13
Jan  1 12:26:59 host sshd[8150]: Failed password for invalid user upload from 121.7.31.13 port 58443 ssh2
Jan  1 12:26:59 host sshd[8150]: Received disconnect from 121.7.31.13 port 58443:11: Bye Bye [preauth]
Jan  1 12:26:59 host sshd[8150]: Disconnected from 121.7.31.13 port 58443 [preauth]
Jan  1 12:27:32 host sshd[8218]: User root from 132.248.65.8 not allowed because not listed in AllowUsers
Jan  1 12:27:32 host sshd[8218]: input_userauth_request: invalid user root [preauth]
Jan  1 12:27:32 host unix_chkpwd[8222]: password check failed for user (root)
Jan  1 12:27:32 host sshd[8218]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.248.65.8  user=root
Jan  1 12:27:32 host sshd[8218]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 12:27:34 host sshd[8218]: Failed password for invalid user root from 132.248.65.8 port 52920 ssh2
Jan  1 12:27:34 host sshd[8218]: Received disconnect from 132.248.65.8 port 52920:11: Bye Bye [preauth]
Jan  1 12:27:34 host sshd[8218]: Disconnected from 132.248.65.8 port 52920 [preauth]
Jan  1 12:27:40 host sshd[8239]: Invalid user steam from 49.12.77.56 port 47198
Jan  1 12:27:40 host sshd[8239]: input_userauth_request: invalid user steam [preauth]
Jan  1 12:27:40 host sshd[8239]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 12:27:40 host sshd[8239]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.12.77.56
Jan  1 12:27:40 host sshd[8236]: User root from 191.9.118.69 not allowed because not listed in AllowUsers
Jan  1 12:27:40 host sshd[8236]: input_userauth_request: invalid user root [preauth]
Jan  1 12:27:40 host unix_chkpwd[8241]: password check failed for user (root)
Jan  1 12:27:40 host sshd[8236]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.9.118.69  user=root
Jan  1 12:27:40 host sshd[8236]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 12:27:41 host sshd[8239]: Failed password for invalid user steam from 49.12.77.56 port 47198 ssh2
Jan  1 12:27:41 host sshd[8239]: Received disconnect from 49.12.77.56 port 47198:11: Bye Bye [preauth]
Jan  1 12:27:41 host sshd[8239]: Disconnected from 49.12.77.56 port 47198 [preauth]
Jan  1 12:27:41 host sshd[8236]: Failed password for invalid user root from 191.9.118.69 port 43711 ssh2
Jan  1 12:27:42 host sshd[8236]: Received disconnect from 191.9.118.69 port 43711:11: Bye Bye [preauth]
Jan  1 12:27:42 host sshd[8236]: Disconnected from 191.9.118.69 port 43711 [preauth]
Jan  1 12:27:52 host sshd[8249]: User root from 140.148.227.28 not allowed because not listed in AllowUsers
Jan  1 12:27:52 host sshd[8249]: input_userauth_request: invalid user root [preauth]
Jan  1 12:27:52 host unix_chkpwd[8254]: password check failed for user (root)
Jan  1 12:27:52 host sshd[8249]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.148.227.28  user=root
Jan  1 12:27:52 host sshd[8249]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 12:27:54 host sshd[8249]: Failed password for invalid user root from 140.148.227.28 port 37266 ssh2
Jan  1 12:27:54 host sshd[8249]: Received disconnect from 140.148.227.28 port 37266:11: Bye Bye [preauth]
Jan  1 12:27:54 host sshd[8249]: Disconnected from 140.148.227.28 port 37266 [preauth]
Jan  1 12:28:19 host sshd[8300]: Invalid user nagios from 138.197.32.150 port 39624
Jan  1 12:28:19 host sshd[8300]: input_userauth_request: invalid user nagios [preauth]
Jan  1 12:28:19 host sshd[8300]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 12:28:19 host sshd[8300]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.32.150
Jan  1 12:28:21 host sshd[8300]: Failed password for invalid user nagios from 138.197.32.150 port 39624 ssh2
Jan  1 12:28:21 host sshd[8300]: Received disconnect from 138.197.32.150 port 39624:11: Bye Bye [preauth]
Jan  1 12:28:21 host sshd[8300]: Disconnected from 138.197.32.150 port 39624 [preauth]
Jan  1 12:28:40 host sshd[8347]: User root from 51.15.130.203 not allowed because not listed in AllowUsers
Jan  1 12:28:40 host sshd[8347]: input_userauth_request: invalid user root [preauth]
Jan  1 12:28:40 host unix_chkpwd[8349]: password check failed for user (root)
Jan  1 12:28:40 host sshd[8347]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.130.203  user=root
Jan  1 12:28:40 host sshd[8347]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 12:28:43 host sshd[8347]: Failed password for invalid user root from 51.15.130.203 port 49238 ssh2
Jan  1 12:28:43 host sshd[8347]: Received disconnect from 51.15.130.203 port 49238:11: Bye Bye [preauth]
Jan  1 12:28:43 host sshd[8347]: Disconnected from 51.15.130.203 port 49238 [preauth]
Jan  1 12:28:50 host sshd[8351]: User root from 140.148.227.28 not allowed because not listed in AllowUsers
Jan  1 12:28:50 host sshd[8351]: input_userauth_request: invalid user root [preauth]
Jan  1 12:28:50 host unix_chkpwd[8361]: password check failed for user (root)
Jan  1 12:28:50 host sshd[8351]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.148.227.28  user=root
Jan  1 12:28:50 host sshd[8351]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 12:28:52 host sshd[8351]: Failed password for invalid user root from 140.148.227.28 port 65376 ssh2
Jan  1 12:28:52 host sshd[8351]: Received disconnect from 140.148.227.28 port 65376:11: Bye Bye [preauth]
Jan  1 12:28:52 host sshd[8351]: Disconnected from 140.148.227.28 port 65376 [preauth]
Jan  1 12:30:41 host sshd[8743]: User root from 157.230.245.64 not allowed because not listed in AllowUsers
Jan  1 12:30:41 host sshd[8743]: input_userauth_request: invalid user root [preauth]
Jan  1 12:30:41 host unix_chkpwd[8745]: password check failed for user (root)
Jan  1 12:30:41 host sshd[8743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.245.64  user=root
Jan  1 12:30:41 host sshd[8743]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 12:30:42 host sshd[8746]: User root from 95.85.27.201 not allowed because not listed in AllowUsers
Jan  1 12:30:42 host sshd[8746]: input_userauth_request: invalid user root [preauth]
Jan  1 12:30:42 host unix_chkpwd[8749]: password check failed for user (root)
Jan  1 12:30:42 host sshd[8746]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.85.27.201  user=root
Jan  1 12:30:42 host sshd[8746]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 12:30:43 host sshd[8743]: Failed password for invalid user root from 157.230.245.64 port 34222 ssh2
Jan  1 12:30:43 host sshd[8743]: Received disconnect from 157.230.245.64 port 34222:11: Bye Bye [preauth]
Jan  1 12:30:43 host sshd[8743]: Disconnected from 157.230.245.64 port 34222 [preauth]
Jan  1 12:30:44 host sshd[8746]: Failed password for invalid user root from 95.85.27.201 port 45054 ssh2
Jan  1 12:30:44 host sshd[8746]: Received disconnect from 95.85.27.201 port 45054:11: Bye Bye [preauth]
Jan  1 12:30:44 host sshd[8746]: Disconnected from 95.85.27.201 port 45054 [preauth]
Jan  1 12:30:57 host sshd[8763]: User root from 188.166.208.174 not allowed because not listed in AllowUsers
Jan  1 12:30:57 host sshd[8763]: input_userauth_request: invalid user root [preauth]
Jan  1 12:30:57 host unix_chkpwd[8765]: password check failed for user (root)
Jan  1 12:30:57 host sshd[8763]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.208.174  user=root
Jan  1 12:30:57 host sshd[8763]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 12:30:59 host sshd[8763]: Failed password for invalid user root from 188.166.208.174 port 52068 ssh2
Jan  1 12:30:59 host sshd[8763]: Received disconnect from 188.166.208.174 port 52068:11: Bye Bye [preauth]
Jan  1 12:30:59 host sshd[8763]: Disconnected from 188.166.208.174 port 52068 [preauth]
Jan  1 12:31:59 host sshd[8888]: Invalid user mas from 41.197.31.178 port 36586
Jan  1 12:31:59 host sshd[8888]: input_userauth_request: invalid user mas [preauth]
Jan  1 12:31:59 host sshd[8888]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 12:31:59 host sshd[8888]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178
Jan  1 12:32:01 host sshd[8888]: Failed password for invalid user mas from 41.197.31.178 port 36586 ssh2
Jan  1 12:32:02 host sshd[8888]: Connection closed by 41.197.31.178 port 36586 [preauth]
Jan  1 12:32:05 host sshd[8906]: User root from 81.250.169.128 not allowed because not listed in AllowUsers
Jan  1 12:32:05 host sshd[8906]: input_userauth_request: invalid user root [preauth]
Jan  1 12:32:05 host unix_chkpwd[8909]: password check failed for user (root)
Jan  1 12:32:05 host sshd[8906]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.250.169.128  user=root
Jan  1 12:32:05 host sshd[8906]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 12:32:07 host sshd[8906]: Failed password for invalid user root from 81.250.169.128 port 33472 ssh2
Jan  1 12:32:07 host sshd[8906]: Received disconnect from 81.250.169.128 port 33472:11: Bye Bye [preauth]
Jan  1 12:32:07 host sshd[8906]: Disconnected from 81.250.169.128 port 33472 [preauth]
Jan  1 12:32:31 host sshd[8956]: Invalid user ubuntu from 86.39.11.143 port 53744
Jan  1 12:32:31 host sshd[8956]: input_userauth_request: invalid user ubuntu [preauth]
Jan  1 12:32:31 host sshd[8956]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 12:32:31 host sshd[8956]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.39.11.143
Jan  1 12:32:33 host sshd[8956]: Failed password for invalid user ubuntu from 86.39.11.143 port 53744 ssh2
Jan  1 12:32:33 host sshd[8956]: Received disconnect from 86.39.11.143 port 53744:11: Bye Bye [preauth]
Jan  1 12:32:33 host sshd[8956]: Disconnected from 86.39.11.143 port 53744 [preauth]
Jan  1 12:32:40 host sshd[8978]: User root from 49.12.77.56 not allowed because not listed in AllowUsers
Jan  1 12:32:40 host sshd[8978]: input_userauth_request: invalid user root [preauth]
Jan  1 12:32:40 host unix_chkpwd[8980]: password check failed for user (root)
Jan  1 12:32:40 host sshd[8978]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.12.77.56  user=root
Jan  1 12:32:40 host sshd[8978]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 12:32:40 host sshd[8975]: User root from 138.197.32.150 not allowed because not listed in AllowUsers
Jan  1 12:32:40 host sshd[8975]: input_userauth_request: invalid user root [preauth]
Jan  1 12:32:40 host unix_chkpwd[8981]: password check failed for user (root)
Jan  1 12:32:40 host sshd[8975]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.32.150  user=root
Jan  1 12:32:40 host sshd[8975]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 12:32:42 host sshd[8978]: Failed password for invalid user root from 49.12.77.56 port 49026 ssh2
Jan  1 12:32:42 host sshd[8975]: Failed password for invalid user root from 138.197.32.150 port 33746 ssh2
Jan  1 12:32:42 host sshd[8978]: Received disconnect from 49.12.77.56 port 49026:11: Bye Bye [preauth]
Jan  1 12:32:42 host sshd[8978]: Disconnected from 49.12.77.56 port 49026 [preauth]
Jan  1 12:32:42 host sshd[8975]: Received disconnect from 138.197.32.150 port 33746:11: Bye Bye [preauth]
Jan  1 12:32:42 host sshd[8975]: Disconnected from 138.197.32.150 port 33746 [preauth]
Jan  1 12:33:07 host sshd[9075]: Invalid user user1 from 162.218.126.136 port 36532
Jan  1 12:33:07 host sshd[9075]: input_userauth_request: invalid user user1 [preauth]
Jan  1 12:33:07 host sshd[9075]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 12:33:07 host sshd[9075]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136
Jan  1 12:33:09 host sshd[9075]: Failed password for invalid user user1 from 162.218.126.136 port 36532 ssh2
Jan  1 12:33:09 host sshd[9075]: Connection closed by 162.218.126.136 port 36532 [preauth]
Jan  1 12:33:12 host sshd[9104]: User root from 95.85.27.201 not allowed because not listed in AllowUsers
Jan  1 12:33:12 host sshd[9104]: input_userauth_request: invalid user root [preauth]
Jan  1 12:33:12 host unix_chkpwd[9109]: password check failed for user (root)
Jan  1 12:33:12 host sshd[9104]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.85.27.201  user=root
Jan  1 12:33:12 host sshd[9104]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 12:33:13 host sshd[9107]: User root from 121.7.31.13 not allowed because not listed in AllowUsers
Jan  1 12:33:13 host sshd[9107]: input_userauth_request: invalid user root [preauth]
Jan  1 12:33:13 host unix_chkpwd[9111]: password check failed for user (root)
Jan  1 12:33:13 host sshd[9107]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.7.31.13  user=root
Jan  1 12:33:13 host sshd[9107]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 12:33:15 host sshd[9104]: Failed password for invalid user root from 95.85.27.201 port 53530 ssh2
Jan  1 12:33:15 host sshd[9107]: Failed password for invalid user root from 121.7.31.13 port 44701 ssh2
Jan  1 12:33:15 host sshd[9107]: Received disconnect from 121.7.31.13 port 44701:11: Bye Bye [preauth]
Jan  1 12:33:15 host sshd[9107]: Disconnected from 121.7.31.13 port 44701 [preauth]
Jan  1 12:33:15 host sshd[9104]: Received disconnect from 95.85.27.201 port 53530:11: Bye Bye [preauth]
Jan  1 12:33:15 host sshd[9104]: Disconnected from 95.85.27.201 port 53530 [preauth]
Jan  1 12:33:36 host sshd[9220]: User root from 132.248.65.8 not allowed because not listed in AllowUsers
Jan  1 12:33:36 host sshd[9220]: input_userauth_request: invalid user root [preauth]
Jan  1 12:33:36 host unix_chkpwd[9223]: password check failed for user (root)
Jan  1 12:33:36 host sshd[9220]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.248.65.8  user=root
Jan  1 12:33:36 host sshd[9220]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 12:33:38 host sshd[9220]: Failed password for invalid user root from 132.248.65.8 port 47350 ssh2
Jan  1 12:33:44 host sshd[9265]: User root from 51.15.130.203 not allowed because not listed in AllowUsers
Jan  1 12:33:44 host sshd[9265]: input_userauth_request: invalid user root [preauth]
Jan  1 12:33:44 host unix_chkpwd[9268]: password check failed for user (root)
Jan  1 12:33:44 host sshd[9265]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.130.203  user=root
Jan  1 12:33:44 host sshd[9265]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 12:33:46 host sshd[9265]: Failed password for invalid user root from 51.15.130.203 port 39608 ssh2
Jan  1 12:33:46 host sshd[9265]: Received disconnect from 51.15.130.203 port 39608:11: Bye Bye [preauth]
Jan  1 12:33:46 host sshd[9265]: Disconnected from 51.15.130.203 port 39608 [preauth]
Jan  1 12:33:58 host sshd[9318]: Invalid user www-data from 188.166.208.174 port 33852
Jan  1 12:33:58 host sshd[9318]: input_userauth_request: invalid user www-data [preauth]
Jan  1 12:33:58 host sshd[9318]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 12:33:58 host sshd[9318]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.208.174
Jan  1 12:34:01 host sshd[9318]: Failed password for invalid user www-data from 188.166.208.174 port 33852 ssh2
Jan  1 12:34:01 host sshd[9318]: Received disconnect from 188.166.208.174 port 33852:11: Bye Bye [preauth]
Jan  1 12:34:01 host sshd[9318]: Disconnected from 188.166.208.174 port 33852 [preauth]
Jan  1 12:34:13 host sshd[9480]: User root from 86.39.11.143 not allowed because not listed in AllowUsers
Jan  1 12:34:13 host sshd[9480]: input_userauth_request: invalid user root [preauth]
Jan  1 12:34:13 host unix_chkpwd[9484]: password check failed for user (root)
Jan  1 12:34:13 host sshd[9480]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.39.11.143  user=root
Jan  1 12:34:13 host sshd[9480]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 12:34:15 host sshd[9480]: Failed password for invalid user root from 86.39.11.143 port 53848 ssh2
Jan  1 12:34:15 host sshd[9480]: Received disconnect from 86.39.11.143 port 53848:11: Bye Bye [preauth]
Jan  1 12:34:15 host sshd[9480]: Disconnected from 86.39.11.143 port 53848 [preauth]
Jan  1 12:34:20 host sshd[9523]: User root from 191.9.118.69 not allowed because not listed in AllowUsers
Jan  1 12:34:20 host sshd[9523]: input_userauth_request: invalid user root [preauth]
Jan  1 12:34:20 host unix_chkpwd[9530]: password check failed for user (root)
Jan  1 12:34:20 host sshd[9523]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.9.118.69  user=root
Jan  1 12:34:20 host sshd[9523]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 12:34:23 host sshd[9523]: Failed password for invalid user root from 191.9.118.69 port 38746 ssh2
Jan  1 12:34:35 host sshd[9607]: User root from 157.230.245.64 not allowed because not listed in AllowUsers
Jan  1 12:34:35 host sshd[9607]: input_userauth_request: invalid user root [preauth]
Jan  1 12:34:35 host unix_chkpwd[9610]: password check failed for user (root)
Jan  1 12:34:35 host sshd[9607]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.245.64  user=root
Jan  1 12:34:35 host sshd[9607]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 12:34:36 host sshd[9607]: Failed password for invalid user root from 157.230.245.64 port 45442 ssh2
Jan  1 12:34:36 host sshd[9607]: Received disconnect from 157.230.245.64 port 45442:11: Bye Bye [preauth]
Jan  1 12:34:36 host sshd[9607]: Disconnected from 157.230.245.64 port 45442 [preauth]
Jan  1 12:34:41 host sshd[9649]: User root from 81.250.169.128 not allowed because not listed in AllowUsers
Jan  1 12:34:41 host sshd[9649]: input_userauth_request: invalid user root [preauth]
Jan  1 12:34:41 host unix_chkpwd[9652]: password check failed for user (root)
Jan  1 12:34:41 host sshd[9649]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.250.169.128  user=root
Jan  1 12:34:41 host sshd[9649]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 12:34:43 host sshd[9649]: Failed password for invalid user root from 81.250.169.128 port 60030 ssh2
Jan  1 12:34:43 host sshd[9649]: Received disconnect from 81.250.169.128 port 60030:11: Bye Bye [preauth]
Jan  1 12:34:43 host sshd[9649]: Disconnected from 81.250.169.128 port 60030 [preauth]
Jan  1 13:01:48 host sshd[13455]: Invalid user worker from 65.109.140.161 port 48846
Jan  1 13:01:48 host sshd[13455]: input_userauth_request: invalid user worker [preauth]
Jan  1 13:01:48 host sshd[13455]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 13:01:48 host sshd[13455]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.109.140.161
Jan  1 13:01:50 host sshd[13455]: Failed password for invalid user worker from 65.109.140.161 port 48846 ssh2
Jan  1 13:01:50 host sshd[13455]: Received disconnect from 65.109.140.161 port 48846:11: Bye Bye [preauth]
Jan  1 13:01:50 host sshd[13455]: Disconnected from 65.109.140.161 port 48846 [preauth]
Jan  1 13:02:57 host sshd[13720]: User root from 84.201.158.231 not allowed because not listed in AllowUsers
Jan  1 13:02:57 host sshd[13720]: input_userauth_request: invalid user root [preauth]
Jan  1 13:02:57 host unix_chkpwd[13724]: password check failed for user (root)
Jan  1 13:02:57 host sshd[13720]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.201.158.231  user=root
Jan  1 13:02:57 host sshd[13720]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 13:02:59 host sshd[13720]: Failed password for invalid user root from 84.201.158.231 port 39664 ssh2
Jan  1 13:03:00 host sshd[13720]: Received disconnect from 84.201.158.231 port 39664:11: Bye Bye [preauth]
Jan  1 13:03:00 host sshd[13720]: Disconnected from 84.201.158.231 port 39664 [preauth]
Jan  1 13:03:04 host sshd[13748]: Invalid user usrsosgi from 139.59.98.121 port 49648
Jan  1 13:03:04 host sshd[13748]: input_userauth_request: invalid user usrsosgi [preauth]
Jan  1 13:03:04 host sshd[13748]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 13:03:04 host sshd[13748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.98.121
Jan  1 13:03:07 host sshd[13748]: Failed password for invalid user usrsosgi from 139.59.98.121 port 49648 ssh2
Jan  1 13:03:07 host sshd[13748]: Received disconnect from 139.59.98.121 port 49648:11: Bye Bye [preauth]
Jan  1 13:03:07 host sshd[13748]: Disconnected from 139.59.98.121 port 49648 [preauth]
Jan  1 13:03:57 host sshd[13897]: User root from 165.154.253.81 not allowed because not listed in AllowUsers
Jan  1 13:03:57 host sshd[13897]: input_userauth_request: invalid user root [preauth]
Jan  1 13:03:57 host unix_chkpwd[13904]: password check failed for user (root)
Jan  1 13:03:57 host sshd[13897]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.154.253.81  user=root
Jan  1 13:03:57 host sshd[13897]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 13:03:59 host sshd[13905]: User root from 191.243.56.178 not allowed because not listed in AllowUsers
Jan  1 13:03:59 host sshd[13905]: input_userauth_request: invalid user root [preauth]
Jan  1 13:03:59 host unix_chkpwd[13931]: password check failed for user (root)
Jan  1 13:03:59 host sshd[13905]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.243.56.178  user=root
Jan  1 13:03:59 host sshd[13905]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 13:03:59 host sshd[13897]: Failed password for invalid user root from 165.154.253.81 port 56076 ssh2
Jan  1 13:03:59 host sshd[13897]: Received disconnect from 165.154.253.81 port 56076:11: Bye Bye [preauth]
Jan  1 13:03:59 host sshd[13897]: Disconnected from 165.154.253.81 port 56076 [preauth]
Jan  1 13:04:00 host sshd[13928]: User root from 212.49.70.200 not allowed because not listed in AllowUsers
Jan  1 13:04:00 host sshd[13928]: input_userauth_request: invalid user root [preauth]
Jan  1 13:04:00 host unix_chkpwd[13941]: password check failed for user (root)
Jan  1 13:04:00 host sshd[13928]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.49.70.200  user=root
Jan  1 13:04:00 host sshd[13928]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 13:04:01 host sshd[13905]: Failed password for invalid user root from 191.243.56.178 port 57368 ssh2
Jan  1 13:04:01 host sshd[13905]: Received disconnect from 191.243.56.178 port 57368:11: Bye Bye [preauth]
Jan  1 13:04:01 host sshd[13905]: Disconnected from 191.243.56.178 port 57368 [preauth]
Jan  1 13:04:02 host sshd[13928]: Failed password for invalid user root from 212.49.70.200 port 44272 ssh2
Jan  1 13:04:02 host sshd[13928]: Received disconnect from 212.49.70.200 port 44272:11: Bye Bye [preauth]
Jan  1 13:04:02 host sshd[13928]: Disconnected from 212.49.70.200 port 44272 [preauth]
Jan  1 13:05:36 host sshd[14203]: User root from 84.201.158.231 not allowed because not listed in AllowUsers
Jan  1 13:05:36 host sshd[14203]: input_userauth_request: invalid user root [preauth]
Jan  1 13:05:36 host unix_chkpwd[14207]: password check failed for user (root)
Jan  1 13:05:36 host sshd[14203]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.201.158.231  user=root
Jan  1 13:05:36 host sshd[14203]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 13:05:38 host sshd[14203]: Failed password for invalid user root from 84.201.158.231 port 40118 ssh2
Jan  1 13:05:39 host sshd[14203]: Received disconnect from 84.201.158.231 port 40118:11: Bye Bye [preauth]
Jan  1 13:05:39 host sshd[14203]: Disconnected from 84.201.158.231 port 40118 [preauth]
Jan  1 13:05:49 host sshd[14262]: User root from 43.133.39.46 not allowed because not listed in AllowUsers
Jan  1 13:05:49 host sshd[14262]: input_userauth_request: invalid user root [preauth]
Jan  1 13:05:49 host unix_chkpwd[14266]: password check failed for user (root)
Jan  1 13:05:49 host sshd[14262]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.133.39.46  user=root
Jan  1 13:05:49 host sshd[14262]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 13:05:51 host sshd[14262]: Failed password for invalid user root from 43.133.39.46 port 46040 ssh2
Jan  1 13:05:51 host sshd[14262]: Received disconnect from 43.133.39.46 port 46040:11: Bye Bye [preauth]
Jan  1 13:05:51 host sshd[14262]: Disconnected from 43.133.39.46 port 46040 [preauth]
Jan  1 13:06:52 host sshd[14384]: User root from 46.127.176.19 not allowed because not listed in AllowUsers
Jan  1 13:06:52 host sshd[14384]: input_userauth_request: invalid user root [preauth]
Jan  1 13:06:52 host unix_chkpwd[14386]: password check failed for user (root)
Jan  1 13:06:52 host sshd[14384]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.127.176.19  user=root
Jan  1 13:06:52 host sshd[14384]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 13:06:54 host sshd[14384]: Failed password for invalid user root from 46.127.176.19 port 37216 ssh2
Jan  1 13:06:54 host sshd[14384]: Received disconnect from 46.127.176.19 port 37216:11: Bye Bye [preauth]
Jan  1 13:06:54 host sshd[14384]: Disconnected from 46.127.176.19 port 37216 [preauth]
Jan  1 13:07:05 host sshd[14412]: User root from 201.213.164.189 not allowed because not listed in AllowUsers
Jan  1 13:07:05 host sshd[14412]: input_userauth_request: invalid user root [preauth]
Jan  1 13:07:05 host unix_chkpwd[14419]: password check failed for user (root)
Jan  1 13:07:05 host sshd[14412]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.213.164.189  user=root
Jan  1 13:07:05 host sshd[14412]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 13:07:06 host sshd[14417]: User root from 81.16.126.12 not allowed because not listed in AllowUsers
Jan  1 13:07:06 host sshd[14417]: input_userauth_request: invalid user root [preauth]
Jan  1 13:07:06 host unix_chkpwd[14421]: password check failed for user (root)
Jan  1 13:07:06 host sshd[14417]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.16.126.12  user=root
Jan  1 13:07:06 host sshd[14417]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 13:07:08 host sshd[14417]: Failed password for invalid user root from 81.16.126.12 port 37030 ssh2
Jan  1 13:07:08 host sshd[14412]: Failed password for invalid user root from 201.213.164.189 port 34666 ssh2
Jan  1 13:07:08 host sshd[14417]: Received disconnect from 81.16.126.12 port 37030:11: Bye Bye [preauth]
Jan  1 13:07:08 host sshd[14417]: Disconnected from 81.16.126.12 port 37030 [preauth]
Jan  1 13:07:08 host sshd[14412]: Received disconnect from 201.213.164.189 port 34666:11: Bye Bye [preauth]
Jan  1 13:07:08 host sshd[14412]: Disconnected from 201.213.164.189 port 34666 [preauth]
Jan  1 13:07:45 host sshd[14508]: User root from 123.231.238.147 not allowed because not listed in AllowUsers
Jan  1 13:07:45 host sshd[14508]: input_userauth_request: invalid user root [preauth]
Jan  1 13:07:45 host unix_chkpwd[14511]: password check failed for user (root)
Jan  1 13:07:45 host sshd[14508]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.231.238.147  user=root
Jan  1 13:07:45 host sshd[14508]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 13:07:47 host sshd[14508]: Failed password for invalid user root from 123.231.238.147 port 52732 ssh2
Jan  1 13:07:47 host sshd[14508]: Received disconnect from 123.231.238.147 port 52732:11: Bye Bye [preauth]
Jan  1 13:07:47 host sshd[14508]: Disconnected from 123.231.238.147 port 52732 [preauth]
Jan  1 13:08:17 host sshd[14550]: Invalid user deploy from 165.154.253.81 port 48108
Jan  1 13:08:17 host sshd[14550]: input_userauth_request: invalid user deploy [preauth]
Jan  1 13:08:17 host sshd[14550]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 13:08:17 host sshd[14550]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.154.253.81
Jan  1 13:08:18 host sshd[14554]: User root from 65.109.140.161 not allowed because not listed in AllowUsers
Jan  1 13:08:18 host sshd[14554]: input_userauth_request: invalid user root [preauth]
Jan  1 13:08:18 host unix_chkpwd[14556]: password check failed for user (root)
Jan  1 13:08:18 host sshd[14554]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.109.140.161  user=root
Jan  1 13:08:18 host sshd[14554]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 13:08:19 host sshd[14550]: Failed password for invalid user deploy from 165.154.253.81 port 48108 ssh2
Jan  1 13:08:19 host sshd[14550]: Received disconnect from 165.154.253.81 port 48108:11: Bye Bye [preauth]
Jan  1 13:08:19 host sshd[14550]: Disconnected from 165.154.253.81 port 48108 [preauth]
Jan  1 13:08:21 host sshd[14554]: Failed password for invalid user root from 65.109.140.161 port 39368 ssh2
Jan  1 13:08:21 host sshd[14554]: Received disconnect from 65.109.140.161 port 39368:11: Bye Bye [preauth]
Jan  1 13:08:21 host sshd[14554]: Disconnected from 65.109.140.161 port 39368 [preauth]
Jan  1 13:08:49 host sshd[14781]: User root from 46.127.176.19 not allowed because not listed in AllowUsers
Jan  1 13:08:49 host sshd[14781]: input_userauth_request: invalid user root [preauth]
Jan  1 13:08:49 host unix_chkpwd[14784]: password check failed for user (root)
Jan  1 13:08:49 host sshd[14781]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.127.176.19  user=root
Jan  1 13:08:49 host sshd[14781]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 13:08:51 host sshd[14781]: Failed password for invalid user root from 46.127.176.19 port 37392 ssh2
Jan  1 13:08:51 host sshd[14781]: Received disconnect from 46.127.176.19 port 37392:11: Bye Bye [preauth]
Jan  1 13:08:51 host sshd[14781]: Disconnected from 46.127.176.19 port 37392 [preauth]
Jan  1 13:09:00 host sshd[14828]: User root from 43.133.39.46 not allowed because not listed in AllowUsers
Jan  1 13:09:00 host sshd[14828]: input_userauth_request: invalid user root [preauth]
Jan  1 13:09:00 host unix_chkpwd[14830]: password check failed for user (root)
Jan  1 13:09:00 host sshd[14828]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.133.39.46  user=root
Jan  1 13:09:00 host sshd[14828]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 13:09:02 host sshd[14828]: Failed password for invalid user root from 43.133.39.46 port 53890 ssh2
Jan  1 13:09:02 host sshd[14828]: Received disconnect from 43.133.39.46 port 53890:11: Bye Bye [preauth]
Jan  1 13:09:02 host sshd[14828]: Disconnected from 43.133.39.46 port 53890 [preauth]
Jan  1 13:09:14 host sshd[14917]: User root from 212.49.70.200 not allowed because not listed in AllowUsers
Jan  1 13:09:14 host sshd[14917]: input_userauth_request: invalid user root [preauth]
Jan  1 13:09:14 host unix_chkpwd[14924]: password check failed for user (root)
Jan  1 13:09:14 host sshd[14917]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.49.70.200  user=root
Jan  1 13:09:14 host sshd[14917]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 13:09:16 host sshd[14917]: Failed password for invalid user root from 212.49.70.200 port 36858 ssh2
Jan  1 13:09:16 host sshd[14917]: Received disconnect from 212.49.70.200 port 36858:11: Bye Bye [preauth]
Jan  1 13:09:16 host sshd[14917]: Disconnected from 212.49.70.200 port 36858 [preauth]
Jan  1 13:09:16 host sshd[14927]: User root from 201.213.164.189 not allowed because not listed in AllowUsers
Jan  1 13:09:16 host sshd[14927]: input_userauth_request: invalid user root [preauth]
Jan  1 13:09:16 host unix_chkpwd[14931]: password check failed for user (root)
Jan  1 13:09:16 host sshd[14927]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.213.164.189  user=root
Jan  1 13:09:16 host sshd[14927]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 13:09:18 host sshd[14927]: Failed password for invalid user root from 201.213.164.189 port 38802 ssh2
Jan  1 13:09:19 host sshd[14927]: Received disconnect from 201.213.164.189 port 38802:11: Bye Bye [preauth]
Jan  1 13:09:19 host sshd[14927]: Disconnected from 201.213.164.189 port 38802 [preauth]
Jan  1 13:09:42 host sshd[15048]: Invalid user dev from 139.59.98.121 port 46838
Jan  1 13:09:42 host sshd[15048]: input_userauth_request: invalid user dev [preauth]
Jan  1 13:09:42 host sshd[15048]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 13:09:42 host sshd[15048]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.98.121
Jan  1 13:09:44 host sshd[15048]: Failed password for invalid user dev from 139.59.98.121 port 46838 ssh2
Jan  1 13:09:44 host sshd[15048]: Received disconnect from 139.59.98.121 port 46838:11: Bye Bye [preauth]
Jan  1 13:09:44 host sshd[15048]: Disconnected from 139.59.98.121 port 46838 [preauth]
Jan  1 13:10:00 host sshd[15068]: User root from 191.243.56.178 not allowed because not listed in AllowUsers
Jan  1 13:10:00 host sshd[15068]: input_userauth_request: invalid user root [preauth]
Jan  1 13:10:00 host unix_chkpwd[15072]: password check failed for user (root)
Jan  1 13:10:00 host sshd[15068]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.243.56.178  user=root
Jan  1 13:10:00 host sshd[15068]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 13:10:02 host sshd[15068]: Failed password for invalid user root from 191.243.56.178 port 50630 ssh2
Jan  1 13:10:02 host sshd[15068]: Received disconnect from 191.243.56.178 port 50630:11: Bye Bye [preauth]
Jan  1 13:10:02 host sshd[15068]: Disconnected from 191.243.56.178 port 50630 [preauth]
Jan  1 13:10:25 host sshd[15159]: Invalid user username from 81.16.126.12 port 46138
Jan  1 13:10:25 host sshd[15159]: input_userauth_request: invalid user username [preauth]
Jan  1 13:10:25 host sshd[15159]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 13:10:25 host sshd[15159]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.16.126.12
Jan  1 13:10:28 host sshd[15159]: Failed password for invalid user username from 81.16.126.12 port 46138 ssh2
Jan  1 13:10:28 host sshd[15159]: Received disconnect from 81.16.126.12 port 46138:11: Bye Bye [preauth]
Jan  1 13:10:28 host sshd[15159]: Disconnected from 81.16.126.12 port 46138 [preauth]
Jan  1 13:10:36 host sshd[15237]: User root from 123.231.238.147 not allowed because not listed in AllowUsers
Jan  1 13:10:36 host sshd[15237]: input_userauth_request: invalid user root [preauth]
Jan  1 13:10:36 host unix_chkpwd[15241]: password check failed for user (root)
Jan  1 13:10:36 host sshd[15237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.231.238.147  user=root
Jan  1 13:10:36 host sshd[15237]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 13:10:39 host sshd[15237]: Failed password for invalid user root from 123.231.238.147 port 55914 ssh2
Jan  1 13:10:39 host sshd[15237]: Received disconnect from 123.231.238.147 port 55914:11: Bye Bye [preauth]
Jan  1 13:10:39 host sshd[15237]: Disconnected from 123.231.238.147 port 55914 [preauth]
Jan  1 13:11:26 host sshd[15363]: User root from 139.59.98.121 not allowed because not listed in AllowUsers
Jan  1 13:11:26 host sshd[15363]: input_userauth_request: invalid user root [preauth]
Jan  1 13:11:26 host unix_chkpwd[15365]: password check failed for user (root)
Jan  1 13:11:26 host sshd[15363]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.98.121  user=root
Jan  1 13:11:26 host sshd[15363]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 13:11:28 host sshd[15363]: Failed password for invalid user root from 139.59.98.121 port 44362 ssh2
Jan  1 13:11:28 host sshd[15363]: Received disconnect from 139.59.98.121 port 44362:11: Bye Bye [preauth]
Jan  1 13:11:28 host sshd[15363]: Disconnected from 139.59.98.121 port 44362 [preauth]
Jan  1 13:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  1 13:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 13:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 13:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  1 13:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 13:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 13:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  1 13:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 13:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 13:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  1 13:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 13:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 13:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  1 13:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 13:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 13:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  1 13:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 13:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 13:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  1 13:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 13:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 13:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  1 13:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 13:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 13:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  1 13:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 13:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 13:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  1 13:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 13:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 13:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  1 13:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 13:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 13:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  1 13:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 13:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 13:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  1 13:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 13:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 13:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=phmetals user-2=kottayamcalldriv user-3=gifterman user-4=palco123 user-5=mrsclean user-6=wwwnexidigital user-7=wwwevmhonda user-8=bonifacegroup user-9=wwwletsstalkfood user-10=straightcurve user-11=wwwtestugo user-12=shalinijames user-13=vfmassets user-14=pmcresources user-15=disposeat user-16=remysagr user-17=wwwkmaorg user-18=woodpeck user-19=wwwkapin user-20=travelboniface user-21=ugotscom user-22=wwwrmswll user-23=wwwresourcehunte user-24=keralaholi user-25=wwwpmcresource user-26=dartsimp user-27=a2zgroup user-28=laundryboniface user-29=cochintaxi user-30=wwwkaretakers feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  1 13:21:52 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  1 13:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 13:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 13:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  1 13:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 13:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 13:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-o88a5dyNBOrEYvxr.~
Jan  1 13:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 13:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 13:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-o88a5dyNBOrEYvxr.~'
Jan  1 13:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 13:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 13:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-o88a5dyNBOrEYvxr.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  1 13:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 13:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 13:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  1 13:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 13:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 13:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  1 13:21:52 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  1 13:21:52 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  1 13:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  1 13:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 13:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 13:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  1 13:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 13:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 13:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  1 13:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 13:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 13:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  1 13:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 13:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 13:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  1 13:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 13:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 13:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  1 13:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  1 13:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  1 13:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  1 13:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  1 13:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  1 13:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  1 13:22:00 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  1 13:22:02 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  1 13:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  1 13:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  1 13:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  1 13:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  1 13:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  1 13:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  1 13:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  1 13:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  1 13:22:10 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  1 13:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  1 13:22:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  1 13:22:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  1 13:22:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  1 13:22:12 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  1 13:22:13 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  1 13:22:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  1 13:22:14 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  1 13:22:20 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  1 13:25:07 host sshd[17356]: Invalid user user from 106.10.122.53 port 37435
Jan  1 13:25:07 host sshd[17356]: input_userauth_request: invalid user user [preauth]
Jan  1 13:25:07 host sshd[17356]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 13:25:07 host sshd[17356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53
Jan  1 13:25:09 host sshd[17356]: Failed password for invalid user user from 106.10.122.53 port 37435 ssh2
Jan  1 13:25:09 host sshd[17356]: Connection closed by 106.10.122.53 port 37435 [preauth]
Jan  1 13:25:39 host sshd[17525]: Invalid user andrew from 107.189.30.59 port 58220
Jan  1 13:25:39 host sshd[17525]: input_userauth_request: invalid user andrew [preauth]
Jan  1 13:25:39 host sshd[17525]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 13:25:39 host sshd[17525]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59
Jan  1 13:25:41 host sshd[17525]: Failed password for invalid user andrew from 107.189.30.59 port 58220 ssh2
Jan  1 13:25:42 host sshd[17525]: Connection closed by 107.189.30.59 port 58220 [preauth]
Jan  1 13:34:18 host sshd[18655]: Invalid user zq from 103.13.40.2 port 41580
Jan  1 13:34:18 host sshd[18655]: input_userauth_request: invalid user zq [preauth]
Jan  1 13:34:18 host sshd[18655]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 13:34:18 host sshd[18655]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2
Jan  1 13:34:20 host sshd[18655]: Failed password for invalid user zq from 103.13.40.2 port 41580 ssh2
Jan  1 13:34:20 host sshd[18655]: Connection closed by 103.13.40.2 port 41580 [preauth]
Jan  1 13:39:36 host sshd[19426]: Invalid user hadoop from 162.218.126.136 port 41468
Jan  1 13:39:36 host sshd[19426]: input_userauth_request: invalid user hadoop [preauth]
Jan  1 13:39:36 host sshd[19426]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 13:39:36 host sshd[19426]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136
Jan  1 13:39:38 host sshd[19426]: Failed password for invalid user hadoop from 162.218.126.136 port 41468 ssh2
Jan  1 13:39:38 host sshd[19426]: Connection closed by 162.218.126.136 port 41468 [preauth]
Jan  1 14:08:44 host sshd[23742]: Invalid user ronald from 209.141.56.48 port 55608
Jan  1 14:08:44 host sshd[23742]: input_userauth_request: invalid user ronald [preauth]
Jan  1 14:08:44 host sshd[23742]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 14:08:44 host sshd[23742]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48
Jan  1 14:08:47 host sshd[23742]: Failed password for invalid user ronald from 209.141.56.48 port 55608 ssh2
Jan  1 14:08:47 host sshd[23742]: Connection closed by 209.141.56.48 port 55608 [preauth]
Jan  1 14:15:32 host sshd[24616]: User root from 41.197.31.178 not allowed because not listed in AllowUsers
Jan  1 14:15:32 host sshd[24616]: input_userauth_request: invalid user root [preauth]
Jan  1 14:15:32 host unix_chkpwd[24619]: password check failed for user (root)
Jan  1 14:15:32 host sshd[24616]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178  user=root
Jan  1 14:15:32 host sshd[24616]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 14:15:35 host sshd[24616]: Failed password for invalid user root from 41.197.31.178 port 55430 ssh2
Jan  1 14:15:35 host sshd[24616]: Connection closed by 41.197.31.178 port 55430 [preauth]
Jan  1 14:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  1 14:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 14:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 14:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  1 14:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 14:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 14:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  1 14:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 14:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 14:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  1 14:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 14:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 14:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  1 14:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 14:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 14:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  1 14:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 14:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 14:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  1 14:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 14:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 14:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  1 14:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 14:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 14:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  1 14:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 14:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 14:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  1 14:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 14:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 14:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  1 14:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 14:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 14:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  1 14:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 14:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 14:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  1 14:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 14:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 14:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=mrsclean user-2=wwwnexidigital user-3=gifterman user-4=palco123 user-5=phmetals user-6=kottayamcalldriv user-7=wwwletsstalkfood user-8=straightcurve user-9=bonifacegroup user-10=wwwevmhonda user-11=pmcresources user-12=vfmassets user-13=wwwtestugo user-14=shalinijames user-15=wwwkapin user-16=woodpeck user-17=wwwkmaorg user-18=disposeat user-19=remysagr user-20=wwwrmswll user-21=keralaholi user-22=wwwresourcehunte user-23=ugotscom user-24=travelboniface user-25=wwwpmcresource user-26=laundryboniface user-27=dartsimp user-28=a2zgroup user-29=cochintaxi user-30=wwwkaretakers feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  1 14:21:51 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  1 14:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 14:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 14:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  1 14:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 14:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 14:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-O3OIf9HmsnfumWqc.~
Jan  1 14:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 14:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 14:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-O3OIf9HmsnfumWqc.~'
Jan  1 14:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 14:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 14:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-O3OIf9HmsnfumWqc.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  1 14:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 14:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 14:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  1 14:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 14:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 14:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  1 14:21:52 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  1 14:21:52 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  1 14:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  1 14:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 14:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 14:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  1 14:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 14:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 14:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  1 14:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 14:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 14:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  1 14:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 14:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 14:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  1 14:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 14:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 14:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  1 14:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  1 14:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  1 14:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  1 14:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  1 14:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  1 14:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  1 14:21:57 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  1 14:21:58 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  1 14:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  1 14:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  1 14:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  1 14:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  1 14:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  1 14:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  1 14:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  1 14:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  1 14:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  1 14:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  1 14:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  1 14:22:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  1 14:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  1 14:22:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  1 14:22:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  1 14:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  1 14:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  1 14:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  1 14:44:55 host sshd[28912]: Invalid user aaa from 162.218.126.136 port 35214
Jan  1 14:44:55 host sshd[28912]: input_userauth_request: invalid user aaa [preauth]
Jan  1 14:44:55 host sshd[28912]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 14:44:55 host sshd[28912]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136
Jan  1 14:44:57 host sshd[28912]: Failed password for invalid user aaa from 162.218.126.136 port 35214 ssh2
Jan  1 14:44:57 host sshd[28912]: Connection closed by 162.218.126.136 port 35214 [preauth]
Jan  1 14:48:13 host sshd[29417]: Invalid user nesus from 106.10.122.53 port 57220
Jan  1 14:48:13 host sshd[29417]: input_userauth_request: invalid user nesus [preauth]
Jan  1 14:48:13 host sshd[29417]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 14:48:13 host sshd[29417]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53
Jan  1 14:48:15 host sshd[29417]: Failed password for invalid user nesus from 106.10.122.53 port 57220 ssh2
Jan  1 14:48:15 host sshd[29417]: Connection closed by 106.10.122.53 port 57220 [preauth]
Jan  1 14:56:25 host sshd[30504]: Invalid user iptv from 103.13.40.2 port 54648
Jan  1 14:56:25 host sshd[30504]: input_userauth_request: invalid user iptv [preauth]
Jan  1 14:56:25 host sshd[30504]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 14:56:25 host sshd[30504]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2
Jan  1 14:56:26 host sshd[30504]: Failed password for invalid user iptv from 103.13.40.2 port 54648 ssh2
Jan  1 14:56:26 host sshd[30504]: Connection closed by 103.13.40.2 port 54648 [preauth]
Jan  1 15:02:57 host sshd[31381]: Invalid user user from 92.46.108.20 port 38018
Jan  1 15:02:57 host sshd[31381]: input_userauth_request: invalid user user [preauth]
Jan  1 15:02:58 host sshd[31381]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 15:02:58 host sshd[31381]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20
Jan  1 15:03:00 host sshd[31381]: Failed password for invalid user user from 92.46.108.20 port 38018 ssh2
Jan  1 15:03:00 host sshd[31381]: Connection closed by 92.46.108.20 port 38018 [preauth]
Jan  1 15:10:58 host sshd[32550]: Invalid user test from 45.93.201.90 port 33824
Jan  1 15:10:58 host sshd[32550]: input_userauth_request: invalid user test [preauth]
Jan  1 15:10:58 host sshd[32550]: Failed none for invalid user test from 45.93.201.90 port 33824 ssh2
Jan  1 15:11:01 host sshd[32550]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 15:11:01 host sshd[32550]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90
Jan  1 15:11:03 host sshd[32550]: Failed password for invalid user test from 45.93.201.90 port 33824 ssh2
Jan  1 15:11:06 host sshd[32550]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 15:11:07 host sshd[32550]: Failed password for invalid user test from 45.93.201.90 port 33824 ssh2
Jan  1 15:11:11 host sshd[32550]: Connection closed by 45.93.201.90 port 33824 [preauth]
Jan  1 15:11:11 host sshd[32550]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90
Jan  1 15:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  1 15:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 15:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 15:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  1 15:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 15:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 15:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  1 15:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 15:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 15:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  1 15:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 15:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 15:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  1 15:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 15:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 15:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  1 15:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 15:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 15:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  1 15:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 15:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 15:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  1 15:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 15:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 15:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  1 15:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 15:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 15:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  1 15:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 15:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 15:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  1 15:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 15:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 15:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  1 15:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 15:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 15:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  1 15:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 15:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 15:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwresourcehunte user-2=keralaholi user-3=wwwrmswll user-4=ugotscom user-5=travelboniface user-6=wwwpmcresource user-7=laundryboniface user-8=a2zgroup user-9=dartsimp user-10=cochintaxi user-11=wwwkaretakers user-12=wwwnexidigital user-13=mrsclean user-14=palco123 user-15=gifterman user-16=kottayamcalldriv user-17=phmetals user-18=straightcurve user-19=wwwletsstalkfood user-20=bonifacegroup user-21=wwwevmhonda user-22=pmcresources user-23=vfmassets user-24=shalinijames user-25=wwwtestugo user-26=woodpeck user-27=wwwkapin user-28=remysagr user-29=disposeat user-30=wwwkmaorg feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  1 15:21:51 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  1 15:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 15:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 15:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  1 15:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 15:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 15:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-PdSncKvr2nIdf5I2.~
Jan  1 15:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 15:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 15:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-PdSncKvr2nIdf5I2.~'
Jan  1 15:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 15:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 15:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-PdSncKvr2nIdf5I2.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  1 15:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 15:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 15:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  1 15:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 15:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 15:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  1 15:21:53 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  1 15:21:53 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  1 15:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  1 15:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 15:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 15:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  1 15:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 15:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 15:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  1 15:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 15:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 15:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  1 15:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 15:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 15:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  1 15:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 15:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 15:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  1 15:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  1 15:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  1 15:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  1 15:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  1 15:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  1 15:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  1 15:21:57 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  1 15:21:59 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  1 15:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  1 15:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  1 15:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  1 15:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  1 15:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  1 15:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  1 15:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  1 15:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  1 15:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  1 15:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  1 15:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  1 15:22:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  1 15:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  1 15:22:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  1 15:22:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  1 15:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  1 15:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  1 15:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  1 15:46:18 host sshd[5542]: Invalid user admin from 194.169.175.102 port 59620
Jan  1 15:46:18 host sshd[5542]: input_userauth_request: invalid user admin [preauth]
Jan  1 15:46:18 host sshd[5542]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 15:46:18 host sshd[5542]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.169.175.102
Jan  1 15:46:20 host sshd[5542]: Failed password for invalid user admin from 194.169.175.102 port 59620 ssh2
Jan  1 15:46:20 host sshd[5542]: Received disconnect from 194.169.175.102 port 59620:11: Client disconnecting normally [preauth]
Jan  1 15:46:20 host sshd[5542]: Disconnected from 194.169.175.102 port 59620 [preauth]
Jan  1 15:49:13 host sshd[5922]: User root from 186.7.60.209 not allowed because not listed in AllowUsers
Jan  1 15:49:13 host sshd[5922]: input_userauth_request: invalid user root [preauth]
Jan  1 15:49:13 host unix_chkpwd[5936]: password check failed for user (root)
Jan  1 15:49:13 host sshd[5922]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.7.60.209  user=root
Jan  1 15:49:13 host sshd[5922]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 15:49:15 host sshd[5922]: Failed password for invalid user root from 186.7.60.209 port 48397 ssh2
Jan  1 15:49:16 host sshd[5922]: Received disconnect from 186.7.60.209 port 48397:11: Bye Bye [preauth]
Jan  1 15:49:16 host sshd[5922]: Disconnected from 186.7.60.209 port 48397 [preauth]
Jan  1 15:49:35 host sshd[5982]: Invalid user ps from 41.197.31.178 port 57406
Jan  1 15:49:35 host sshd[5982]: input_userauth_request: invalid user ps [preauth]
Jan  1 15:49:35 host sshd[5982]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 15:49:35 host sshd[5982]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178
Jan  1 15:49:37 host sshd[5982]: Failed password for invalid user ps from 41.197.31.178 port 57406 ssh2
Jan  1 15:49:37 host sshd[5982]: Connection closed by 41.197.31.178 port 57406 [preauth]
Jan  1 15:50:35 host sshd[6142]: User root from 162.218.126.136 not allowed because not listed in AllowUsers
Jan  1 15:50:35 host sshd[6142]: input_userauth_request: invalid user root [preauth]
Jan  1 15:50:35 host unix_chkpwd[6147]: password check failed for user (root)
Jan  1 15:50:35 host sshd[6142]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136  user=root
Jan  1 15:50:35 host sshd[6142]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 15:50:38 host sshd[6142]: Failed password for invalid user root from 162.218.126.136 port 51126 ssh2
Jan  1 15:50:38 host sshd[6142]: Connection closed by 162.218.126.136 port 51126 [preauth]
Jan  1 15:57:17 host sshd[7115]: User root from 186.7.60.209 not allowed because not listed in AllowUsers
Jan  1 15:57:17 host sshd[7115]: input_userauth_request: invalid user root [preauth]
Jan  1 15:57:17 host unix_chkpwd[7122]: password check failed for user (root)
Jan  1 15:57:17 host sshd[7115]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.7.60.209  user=root
Jan  1 15:57:17 host sshd[7115]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 15:57:19 host sshd[7115]: Failed password for invalid user root from 186.7.60.209 port 21629 ssh2
Jan  1 15:57:19 host sshd[7115]: Received disconnect from 186.7.60.209 port 21629:11: Bye Bye [preauth]
Jan  1 15:57:19 host sshd[7115]: Disconnected from 186.7.60.209 port 21629 [preauth]
Jan  1 16:11:13 host sshd[9003]: User root from 106.10.122.53 not allowed because not listed in AllowUsers
Jan  1 16:11:13 host sshd[9003]: input_userauth_request: invalid user root [preauth]
Jan  1 16:11:14 host unix_chkpwd[9007]: password check failed for user (root)
Jan  1 16:11:14 host sshd[9003]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53  user=root
Jan  1 16:11:14 host sshd[9003]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 16:11:16 host sshd[9003]: Failed password for invalid user root from 106.10.122.53 port 60116 ssh2
Jan  1 16:11:16 host sshd[9003]: Connection closed by 106.10.122.53 port 60116 [preauth]
Jan  1 16:18:28 host sshd[10039]: Invalid user lenovo from 103.13.40.2 port 36308
Jan  1 16:18:28 host sshd[10039]: input_userauth_request: invalid user lenovo [preauth]
Jan  1 16:18:28 host sshd[10039]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 16:18:28 host sshd[10039]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2
Jan  1 16:18:30 host sshd[10039]: Failed password for invalid user lenovo from 103.13.40.2 port 36308 ssh2
Jan  1 16:18:30 host sshd[10039]: Connection closed by 103.13.40.2 port 36308 [preauth]
Jan  1 16:21:25 host sshd[10385]: Invalid user ibm from 96.93.162.57 port 44656
Jan  1 16:21:25 host sshd[10385]: input_userauth_request: invalid user ibm [preauth]
Jan  1 16:21:25 host sshd[10385]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 16:21:25 host sshd[10385]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.93.162.57
Jan  1 16:21:27 host sshd[10385]: Failed password for invalid user ibm from 96.93.162.57 port 44656 ssh2
Jan  1 16:21:28 host sshd[10385]: Received disconnect from 96.93.162.57 port 44656:11: Bye Bye [preauth]
Jan  1 16:21:28 host sshd[10385]: Disconnected from 96.93.162.57 port 44656 [preauth]
Jan  1 16:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  1 16:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 16:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 16:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  1 16:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 16:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 16:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  1 16:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 16:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 16:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  1 16:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 16:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 16:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  1 16:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 16:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 16:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  1 16:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 16:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 16:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  1 16:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 16:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 16:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  1 16:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 16:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 16:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  1 16:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 16:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 16:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  1 16:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 16:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 16:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  1 16:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 16:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 16:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  1 16:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 16:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 16:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  1 16:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 16:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 16:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=disposeat user-2=wwwkmaorg user-3=remysagr user-4=woodpeck user-5=wwwkapin user-6=vfmassets user-7=wwwtestugo user-8=shalinijames user-9=pmcresources user-10=bonifacegroup user-11=wwwevmhonda user-12=wwwletsstalkfood user-13=straightcurve user-14=gifterman user-15=palco123 user-16=kottayamcalldriv user-17=phmetals user-18=wwwnexidigital user-19=mrsclean user-20=wwwkaretakers user-21=cochintaxi user-22=dartsimp user-23=a2zgroup user-24=laundryboniface user-25=wwwpmcresource user-26=travelboniface user-27=wwwrmswll user-28=wwwresourcehunte user-29=keralaholi user-30=ugotscom feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  1 16:21:51 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  1 16:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 16:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 16:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  1 16:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 16:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 16:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-EOEhq7EJjT2hB45X.~
Jan  1 16:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 16:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 16:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-EOEhq7EJjT2hB45X.~'
Jan  1 16:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 16:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 16:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-EOEhq7EJjT2hB45X.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  1 16:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 16:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 16:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  1 16:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 16:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 16:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  1 16:21:51 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  1 16:21:51 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  1 16:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  1 16:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 16:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 16:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  1 16:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 16:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 16:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  1 16:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 16:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 16:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  1 16:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 16:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 16:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  1 16:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 16:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 16:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  1 16:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  1 16:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  1 16:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  1 16:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  1 16:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  1 16:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  1 16:21:56 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  1 16:22:03 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  1 16:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  1 16:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  1 16:22:10 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  1 16:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  1 16:22:10 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  1 16:22:11 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  1 16:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  1 16:22:11 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  1 16:22:13 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  1 16:22:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  1 16:22:13 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  1 16:22:14 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  1 16:22:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  1 16:22:15 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  1 16:22:21 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  1 16:22:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  1 16:22:22 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  1 16:22:23 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  1 16:24:17 host sshd[10937]: Did not receive identification string from 58.72.18.130 port 51422
Jan  1 16:26:41 host sshd[11320]: User adm from 96.93.162.57 not allowed because not listed in AllowUsers
Jan  1 16:26:41 host sshd[11320]: input_userauth_request: invalid user adm [preauth]
Jan  1 16:26:41 host unix_chkpwd[11323]: password check failed for user (adm)
Jan  1 16:26:41 host sshd[11320]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.93.162.57  user=adm
Jan  1 16:26:41 host sshd[11320]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "adm"
Jan  1 16:26:42 host sshd[11320]: Failed password for invalid user adm from 96.93.162.57 port 44172 ssh2
Jan  1 16:26:43 host sshd[11320]: Received disconnect from 96.93.162.57 port 44172:11: Bye Bye [preauth]
Jan  1 16:26:43 host sshd[11320]: Disconnected from 96.93.162.57 port 44172 [preauth]
Jan  1 16:34:06 host sshd[12281]: User root from 179.52.18.86 not allowed because not listed in AllowUsers
Jan  1 16:34:06 host sshd[12281]: input_userauth_request: invalid user root [preauth]
Jan  1 16:34:06 host unix_chkpwd[12299]: password check failed for user (root)
Jan  1 16:34:06 host sshd[12281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.52.18.86  user=root
Jan  1 16:34:06 host sshd[12281]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 16:34:07 host sshd[12281]: Failed password for invalid user root from 179.52.18.86 port 45729 ssh2
Jan  1 16:34:08 host sshd[12281]: Received disconnect from 179.52.18.86 port 45729:11: Bye Bye [preauth]
Jan  1 16:34:08 host sshd[12281]: Disconnected from 179.52.18.86 port 45729 [preauth]
Jan  1 16:37:57 host sshd[12804]: Invalid user alan from 179.52.18.86 port 38653
Jan  1 16:37:57 host sshd[12804]: input_userauth_request: invalid user alan [preauth]
Jan  1 16:37:57 host sshd[12804]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 16:37:57 host sshd[12804]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.52.18.86
Jan  1 16:37:59 host sshd[12804]: Failed password for invalid user alan from 179.52.18.86 port 38653 ssh2
Jan  1 16:38:00 host sshd[12804]: Received disconnect from 179.52.18.86 port 38653:11: Bye Bye [preauth]
Jan  1 16:38:00 host sshd[12804]: Disconnected from 179.52.18.86 port 38653 [preauth]
Jan  1 16:45:48 host sshd[13851]: User root from 164.92.186.90 not allowed because not listed in AllowUsers
Jan  1 16:45:48 host sshd[13851]: input_userauth_request: invalid user root [preauth]
Jan  1 16:45:48 host unix_chkpwd[13855]: password check failed for user (root)
Jan  1 16:45:48 host sshd[13851]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.186.90  user=root
Jan  1 16:45:48 host sshd[13851]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 16:45:50 host sshd[13851]: Failed password for invalid user root from 164.92.186.90 port 59054 ssh2
Jan  1 16:45:50 host sshd[13856]: User root from 43.153.38.135 not allowed because not listed in AllowUsers
Jan  1 16:45:50 host sshd[13856]: input_userauth_request: invalid user root [preauth]
Jan  1 16:45:50 host unix_chkpwd[13859]: password check failed for user (root)
Jan  1 16:45:50 host sshd[13856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.38.135  user=root
Jan  1 16:45:50 host sshd[13856]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 16:45:51 host sshd[13851]: Received disconnect from 164.92.186.90 port 59054:11: Bye Bye [preauth]
Jan  1 16:45:51 host sshd[13851]: Disconnected from 164.92.186.90 port 59054 [preauth]
Jan  1 16:45:53 host sshd[13856]: Failed password for invalid user root from 43.153.38.135 port 44206 ssh2
Jan  1 16:45:53 host sshd[13856]: Received disconnect from 43.153.38.135 port 44206:11: Bye Bye [preauth]
Jan  1 16:45:53 host sshd[13856]: Disconnected from 43.153.38.135 port 44206 [preauth]
Jan  1 16:46:22 host sshd[13903]: User root from 46.101.116.214 not allowed because not listed in AllowUsers
Jan  1 16:46:22 host sshd[13903]: input_userauth_request: invalid user root [preauth]
Jan  1 16:46:22 host unix_chkpwd[13906]: password check failed for user (root)
Jan  1 16:46:22 host sshd[13903]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.116.214  user=root
Jan  1 16:46:22 host sshd[13903]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 16:46:24 host sshd[13903]: Failed password for invalid user root from 46.101.116.214 port 54236 ssh2
Jan  1 16:46:24 host sshd[13903]: Received disconnect from 46.101.116.214 port 54236:11: Bye Bye [preauth]
Jan  1 16:46:24 host sshd[13903]: Disconnected from 46.101.116.214 port 54236 [preauth]
Jan  1 16:49:08 host sshd[14308]: Invalid user guest from 170.81.145.59 port 60183
Jan  1 16:49:08 host sshd[14308]: input_userauth_request: invalid user guest [preauth]
Jan  1 16:49:08 host sshd[14308]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 16:49:08 host sshd[14308]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.81.145.59
Jan  1 16:49:09 host sshd[14308]: Failed password for invalid user guest from 170.81.145.59 port 60183 ssh2
Jan  1 16:49:10 host sshd[14308]: Received disconnect from 170.81.145.59 port 60183:11: Bye Bye [preauth]
Jan  1 16:49:10 host sshd[14308]: Disconnected from 170.81.145.59 port 60183 [preauth]
Jan  1 16:49:35 host sshd[14386]: User root from 106.245.234.10 not allowed because not listed in AllowUsers
Jan  1 16:49:35 host sshd[14386]: input_userauth_request: invalid user root [preauth]
Jan  1 16:49:36 host unix_chkpwd[14390]: password check failed for user (root)
Jan  1 16:49:36 host sshd[14386]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.245.234.10  user=root
Jan  1 16:49:36 host sshd[14386]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 16:49:38 host sshd[14386]: Failed password for invalid user root from 106.245.234.10 port 37134 ssh2
Jan  1 16:49:38 host sshd[14386]: Received disconnect from 106.245.234.10 port 37134:11: Bye Bye [preauth]
Jan  1 16:49:38 host sshd[14386]: Disconnected from 106.245.234.10 port 37134 [preauth]
Jan  1 16:49:47 host sshd[14407]: User root from 157.245.81.154 not allowed because not listed in AllowUsers
Jan  1 16:49:47 host sshd[14407]: input_userauth_request: invalid user root [preauth]
Jan  1 16:49:47 host unix_chkpwd[14411]: password check failed for user (root)
Jan  1 16:49:47 host sshd[14407]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.81.154  user=root
Jan  1 16:49:47 host sshd[14407]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 16:49:49 host sshd[14407]: Failed password for invalid user root from 157.245.81.154 port 48774 ssh2
Jan  1 16:49:49 host sshd[14407]: Received disconnect from 157.245.81.154 port 48774:11: Bye Bye [preauth]
Jan  1 16:49:49 host sshd[14407]: Disconnected from 157.245.81.154 port 48774 [preauth]
Jan  1 16:50:08 host sshd[14483]: User root from 164.92.85.159 not allowed because not listed in AllowUsers
Jan  1 16:50:08 host sshd[14483]: input_userauth_request: invalid user root [preauth]
Jan  1 16:50:08 host unix_chkpwd[14488]: password check failed for user (root)
Jan  1 16:50:08 host sshd[14483]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.85.159  user=root
Jan  1 16:50:08 host sshd[14483]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 16:50:09 host sshd[14483]: Failed password for invalid user root from 164.92.85.159 port 59056 ssh2
Jan  1 16:50:10 host sshd[14483]: Received disconnect from 164.92.85.159 port 59056:11: Bye Bye [preauth]
Jan  1 16:50:10 host sshd[14483]: Disconnected from 164.92.85.159 port 59056 [preauth]
Jan  1 16:51:09 host sshd[14616]: User root from 46.101.116.214 not allowed because not listed in AllowUsers
Jan  1 16:51:09 host sshd[14616]: input_userauth_request: invalid user root [preauth]
Jan  1 16:51:09 host unix_chkpwd[14619]: password check failed for user (root)
Jan  1 16:51:09 host sshd[14616]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.116.214  user=root
Jan  1 16:51:09 host sshd[14616]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 16:51:12 host sshd[14616]: Failed password for invalid user root from 46.101.116.214 port 59582 ssh2
Jan  1 16:51:12 host sshd[14616]: Received disconnect from 46.101.116.214 port 59582:11: Bye Bye [preauth]
Jan  1 16:51:12 host sshd[14616]: Disconnected from 46.101.116.214 port 59582 [preauth]
Jan  1 16:51:30 host sshd[14697]: User root from 43.153.38.135 not allowed because not listed in AllowUsers
Jan  1 16:51:30 host sshd[14697]: input_userauth_request: invalid user root [preauth]
Jan  1 16:51:31 host unix_chkpwd[14701]: password check failed for user (root)
Jan  1 16:51:31 host sshd[14697]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.38.135  user=root
Jan  1 16:51:31 host sshd[14697]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 16:51:33 host sshd[14697]: Failed password for invalid user root from 43.153.38.135 port 60426 ssh2
Jan  1 16:51:51 host sshd[14757]: User root from 157.245.81.154 not allowed because not listed in AllowUsers
Jan  1 16:51:51 host sshd[14757]: input_userauth_request: invalid user root [preauth]
Jan  1 16:51:51 host unix_chkpwd[14761]: password check failed for user (root)
Jan  1 16:51:51 host sshd[14757]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.81.154  user=root
Jan  1 16:51:51 host sshd[14757]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 16:51:53 host sshd[14757]: Failed password for invalid user root from 157.245.81.154 port 36784 ssh2
Jan  1 16:52:00 host sshd[14800]: User root from 164.92.186.90 not allowed because not listed in AllowUsers
Jan  1 16:52:00 host sshd[14800]: input_userauth_request: invalid user root [preauth]
Jan  1 16:52:00 host unix_chkpwd[14803]: password check failed for user (root)
Jan  1 16:52:00 host sshd[14800]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.186.90  user=root
Jan  1 16:52:00 host sshd[14800]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 16:52:02 host sshd[14800]: Failed password for invalid user root from 164.92.186.90 port 58808 ssh2
Jan  1 16:52:02 host sshd[14800]: Received disconnect from 164.92.186.90 port 58808:11: Bye Bye [preauth]
Jan  1 16:52:02 host sshd[14800]: Disconnected from 164.92.186.90 port 58808 [preauth]
Jan  1 16:52:04 host sshd[14847]: User root from 164.92.85.159 not allowed because not listed in AllowUsers
Jan  1 16:52:04 host sshd[14847]: input_userauth_request: invalid user root [preauth]
Jan  1 16:52:04 host unix_chkpwd[14853]: password check failed for user (root)
Jan  1 16:52:04 host sshd[14847]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.85.159  user=root
Jan  1 16:52:04 host sshd[14847]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 16:52:05 host sshd[14851]: Invalid user ronald from 209.141.56.48 port 33542
Jan  1 16:52:05 host sshd[14851]: input_userauth_request: invalid user ronald [preauth]
Jan  1 16:52:05 host sshd[14851]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 16:52:05 host sshd[14851]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48
Jan  1 16:52:06 host sshd[14847]: Failed password for invalid user root from 164.92.85.159 port 35718 ssh2
Jan  1 16:52:06 host sshd[14847]: Received disconnect from 164.92.85.159 port 35718:11: Bye Bye [preauth]
Jan  1 16:52:06 host sshd[14847]: Disconnected from 164.92.85.159 port 35718 [preauth]
Jan  1 16:52:07 host sshd[14851]: Failed password for invalid user ronald from 209.141.56.48 port 33542 ssh2
Jan  1 16:52:07 host sshd[14851]: Connection closed by 209.141.56.48 port 33542 [preauth]
Jan  1 16:52:22 host sshd[14908]: Invalid user worker from 170.81.145.59 port 48559
Jan  1 16:52:22 host sshd[14908]: input_userauth_request: invalid user worker [preauth]
Jan  1 16:52:22 host sshd[14908]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 16:52:22 host sshd[14908]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.81.145.59
Jan  1 16:52:24 host sshd[14908]: Failed password for invalid user worker from 170.81.145.59 port 48559 ssh2
Jan  1 16:52:24 host sshd[14908]: Received disconnect from 170.81.145.59 port 48559:11: Bye Bye [preauth]
Jan  1 16:52:24 host sshd[14908]: Disconnected from 170.81.145.59 port 48559 [preauth]
Jan  1 16:52:26 host sshd[14920]: User root from 152.171.143.196 not allowed because not listed in AllowUsers
Jan  1 16:52:26 host sshd[14920]: input_userauth_request: invalid user root [preauth]
Jan  1 16:52:26 host unix_chkpwd[14947]: password check failed for user (root)
Jan  1 16:52:26 host sshd[14920]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.171.143.196  user=root
Jan  1 16:52:26 host sshd[14920]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 16:52:28 host sshd[14920]: Failed password for invalid user root from 152.171.143.196 port 42868 ssh2
Jan  1 16:52:28 host sshd[14920]: Received disconnect from 152.171.143.196 port 42868:11: Bye Bye [preauth]
Jan  1 16:52:28 host sshd[14920]: Disconnected from 152.171.143.196 port 42868 [preauth]
Jan  1 16:52:56 host sshd[15002]: User root from 106.245.234.10 not allowed because not listed in AllowUsers
Jan  1 16:52:56 host sshd[15002]: input_userauth_request: invalid user root [preauth]
Jan  1 16:52:56 host unix_chkpwd[15005]: password check failed for user (root)
Jan  1 16:52:56 host sshd[15002]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.245.234.10  user=root
Jan  1 16:52:56 host sshd[15002]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 16:52:58 host sshd[15002]: Failed password for invalid user root from 106.245.234.10 port 46634 ssh2
Jan  1 16:53:59 host sshd[15251]: User root from 170.81.145.59 not allowed because not listed in AllowUsers
Jan  1 16:53:59 host sshd[15251]: input_userauth_request: invalid user root [preauth]
Jan  1 16:53:59 host unix_chkpwd[15254]: password check failed for user (root)
Jan  1 16:53:59 host sshd[15251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.81.145.59  user=root
Jan  1 16:53:59 host sshd[15251]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 16:54:01 host sshd[15251]: Failed password for invalid user root from 170.81.145.59 port 59236 ssh2
Jan  1 16:54:01 host sshd[15251]: Received disconnect from 170.81.145.59 port 59236:11: Bye Bye [preauth]
Jan  1 16:54:01 host sshd[15251]: Disconnected from 170.81.145.59 port 59236 [preauth]
Jan  1 16:54:52 host sshd[15394]: User root from 152.171.143.196 not allowed because not listed in AllowUsers
Jan  1 16:54:52 host sshd[15394]: input_userauth_request: invalid user root [preauth]
Jan  1 16:54:52 host unix_chkpwd[15399]: password check failed for user (root)
Jan  1 16:54:52 host sshd[15394]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.171.143.196  user=root
Jan  1 16:54:52 host sshd[15394]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 16:54:54 host sshd[15394]: Failed password for invalid user root from 152.171.143.196 port 44058 ssh2
Jan  1 16:54:54 host sshd[15394]: Received disconnect from 152.171.143.196 port 44058:11: Bye Bye [preauth]
Jan  1 16:54:54 host sshd[15394]: Disconnected from 152.171.143.196 port 44058 [preauth]
Jan  1 16:55:56 host sshd[15552]: Invalid user user1 from 162.218.126.136 port 60104
Jan  1 16:55:56 host sshd[15552]: input_userauth_request: invalid user user1 [preauth]
Jan  1 16:55:57 host sshd[15552]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 16:55:57 host sshd[15552]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136
Jan  1 16:55:59 host sshd[15552]: Failed password for invalid user user1 from 162.218.126.136 port 60104 ssh2
Jan  1 16:55:59 host sshd[15552]: Connection closed by 162.218.126.136 port 60104 [preauth]
Jan  1 17:02:31 host sshd[16424]: Invalid user postgres from 152.0.30.37 port 51952
Jan  1 17:02:31 host sshd[16424]: input_userauth_request: invalid user postgres [preauth]
Jan  1 17:02:31 host sshd[16424]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 17:02:31 host sshd[16424]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.0.30.37
Jan  1 17:02:32 host sshd[16424]: Failed password for invalid user postgres from 152.0.30.37 port 51952 ssh2
Jan  1 17:02:35 host sshd[16424]: Received disconnect from 152.0.30.37 port 51952:11: Bye Bye [preauth]
Jan  1 17:02:35 host sshd[16424]: Disconnected from 152.0.30.37 port 51952 [preauth]
Jan  1 17:06:15 host sshd[16951]: Invalid user oracle from 190.166.177.86 port 58098
Jan  1 17:06:15 host sshd[16951]: input_userauth_request: invalid user oracle [preauth]
Jan  1 17:06:15 host sshd[16951]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 17:06:15 host sshd[16951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.166.177.86
Jan  1 17:06:17 host sshd[16951]: Failed password for invalid user oracle from 190.166.177.86 port 58098 ssh2
Jan  1 17:06:20 host sshd[16951]: Received disconnect from 190.166.177.86 port 58098:11: Bye Bye [preauth]
Jan  1 17:06:20 host sshd[16951]: Disconnected from 190.166.177.86 port 58098 [preauth]
Jan  1 17:07:59 host sshd[17122]: User root from 223.197.151.55 not allowed because not listed in AllowUsers
Jan  1 17:07:59 host sshd[17122]: input_userauth_request: invalid user root [preauth]
Jan  1 17:07:59 host unix_chkpwd[17125]: password check failed for user (root)
Jan  1 17:07:59 host sshd[17122]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.197.151.55  user=root
Jan  1 17:07:59 host sshd[17122]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 17:08:01 host sshd[17126]: User root from 41.33.118.92 not allowed because not listed in AllowUsers
Jan  1 17:08:01 host sshd[17126]: input_userauth_request: invalid user root [preauth]
Jan  1 17:08:01 host unix_chkpwd[17137]: password check failed for user (root)
Jan  1 17:08:01 host sshd[17126]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.33.118.92  user=root
Jan  1 17:08:01 host sshd[17126]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 17:08:01 host sshd[17122]: Failed password for invalid user root from 223.197.151.55 port 57779 ssh2
Jan  1 17:08:01 host sshd[17122]: Received disconnect from 223.197.151.55 port 57779:11: Bye Bye [preauth]
Jan  1 17:08:01 host sshd[17122]: Disconnected from 223.197.151.55 port 57779 [preauth]
Jan  1 17:08:03 host sshd[17126]: Failed password for invalid user root from 41.33.118.92 port 49786 ssh2
Jan  1 17:08:03 host sshd[17126]: Received disconnect from 41.33.118.92 port 49786:11: Bye Bye [preauth]
Jan  1 17:08:03 host sshd[17126]: Disconnected from 41.33.118.92 port 49786 [preauth]
Jan  1 17:08:45 host sshd[17220]: User root from 43.132.187.94 not allowed because not listed in AllowUsers
Jan  1 17:08:45 host sshd[17220]: input_userauth_request: invalid user root [preauth]
Jan  1 17:08:45 host unix_chkpwd[17222]: password check failed for user (root)
Jan  1 17:08:45 host sshd[17220]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.132.187.94  user=root
Jan  1 17:08:45 host sshd[17220]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 17:08:47 host sshd[17220]: Failed password for invalid user root from 43.132.187.94 port 57024 ssh2
Jan  1 17:08:47 host sshd[17220]: Received disconnect from 43.132.187.94 port 57024:11: Bye Bye [preauth]
Jan  1 17:08:47 host sshd[17220]: Disconnected from 43.132.187.94 port 57024 [preauth]
Jan  1 17:08:58 host sshd[17260]: User root from 152.32.150.45 not allowed because not listed in AllowUsers
Jan  1 17:08:58 host sshd[17260]: input_userauth_request: invalid user root [preauth]
Jan  1 17:08:58 host unix_chkpwd[17264]: password check failed for user (root)
Jan  1 17:08:58 host sshd[17260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.150.45  user=root
Jan  1 17:08:58 host sshd[17260]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 17:09:00 host sshd[17260]: Failed password for invalid user root from 152.32.150.45 port 60960 ssh2
Jan  1 17:09:00 host sshd[17260]: Received disconnect from 152.32.150.45 port 60960:11: Bye Bye [preauth]
Jan  1 17:09:00 host sshd[17260]: Disconnected from 152.32.150.45 port 60960 [preauth]
Jan  1 17:09:31 host sshd[17358]: User root from 23.94.0.113 not allowed because not listed in AllowUsers
Jan  1 17:09:31 host sshd[17358]: input_userauth_request: invalid user root [preauth]
Jan  1 17:09:31 host unix_chkpwd[17363]: password check failed for user (root)
Jan  1 17:09:31 host sshd[17358]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.94.0.113  user=root
Jan  1 17:09:31 host sshd[17358]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 17:09:32 host sshd[17329]: User root from 190.166.177.86 not allowed because not listed in AllowUsers
Jan  1 17:09:32 host sshd[17329]: input_userauth_request: invalid user root [preauth]
Jan  1 17:09:32 host unix_chkpwd[17365]: password check failed for user (root)
Jan  1 17:09:32 host sshd[17329]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.166.177.86  user=root
Jan  1 17:09:32 host sshd[17329]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 17:09:33 host sshd[17358]: Failed password for invalid user root from 23.94.0.113 port 59752 ssh2
Jan  1 17:09:33 host sshd[17358]: Received disconnect from 23.94.0.113 port 59752:11: Bye Bye [preauth]
Jan  1 17:09:33 host sshd[17358]: Disconnected from 23.94.0.113 port 59752 [preauth]
Jan  1 17:09:34 host sshd[17329]: Failed password for invalid user root from 190.166.177.86 port 15084 ssh2
Jan  1 17:09:34 host sshd[17329]: Received disconnect from 190.166.177.86 port 15084:11: Bye Bye [preauth]
Jan  1 17:09:34 host sshd[17329]: Disconnected from 190.166.177.86 port 15084 [preauth]
Jan  1 17:11:51 host sshd[17748]: User root from 212.231.194.68 not allowed because not listed in AllowUsers
Jan  1 17:11:51 host sshd[17748]: input_userauth_request: invalid user root [preauth]
Jan  1 17:11:51 host unix_chkpwd[17754]: password check failed for user (root)
Jan  1 17:11:51 host sshd[17748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.231.194.68  user=root
Jan  1 17:11:51 host sshd[17748]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 17:11:53 host sshd[17748]: Failed password for invalid user root from 212.231.194.68 port 43592 ssh2
Jan  1 17:11:53 host sshd[17748]: Received disconnect from 212.231.194.68 port 43592:11: Bye Bye [preauth]
Jan  1 17:11:53 host sshd[17748]: Disconnected from 212.231.194.68 port 43592 [preauth]
Jan  1 17:12:37 host sshd[17862]: User root from 103.174.115.243 not allowed because not listed in AllowUsers
Jan  1 17:12:37 host sshd[17862]: input_userauth_request: invalid user root [preauth]
Jan  1 17:12:37 host unix_chkpwd[17864]: password check failed for user (root)
Jan  1 17:12:37 host sshd[17862]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.174.115.243  user=root
Jan  1 17:12:37 host sshd[17862]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 17:12:39 host sshd[17862]: Failed password for invalid user root from 103.174.115.243 port 42616 ssh2
Jan  1 17:12:39 host sshd[17862]: Received disconnect from 103.174.115.243 port 42616:11: Bye Bye [preauth]
Jan  1 17:12:39 host sshd[17862]: Disconnected from 103.174.115.243 port 42616 [preauth]
Jan  1 17:13:22 host sshd[17969]: Invalid user backuppc from 41.33.118.92 port 50366
Jan  1 17:13:22 host sshd[17969]: input_userauth_request: invalid user backuppc [preauth]
Jan  1 17:13:22 host sshd[17969]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 17:13:22 host sshd[17969]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.33.118.92
Jan  1 17:13:25 host sshd[17969]: Failed password for invalid user backuppc from 41.33.118.92 port 50366 ssh2
Jan  1 17:13:25 host sshd[17969]: Received disconnect from 41.33.118.92 port 50366:11: Bye Bye [preauth]
Jan  1 17:13:25 host sshd[17969]: Disconnected from 41.33.118.92 port 50366 [preauth]
Jan  1 17:13:34 host sshd[18043]: Invalid user admin from 115.70.219.46 port 32489
Jan  1 17:13:34 host sshd[18043]: input_userauth_request: invalid user admin [preauth]
Jan  1 17:13:34 host sshd[18043]: Failed none for invalid user admin from 115.70.219.46 port 32489 ssh2
Jan  1 17:13:34 host sshd[18043]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 17:13:34 host sshd[18043]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.70.219.46
Jan  1 17:13:35 host sshd[18055]: User root from 223.197.151.55 not allowed because not listed in AllowUsers
Jan  1 17:13:35 host sshd[18055]: input_userauth_request: invalid user root [preauth]
Jan  1 17:13:35 host unix_chkpwd[18057]: password check failed for user (root)
Jan  1 17:13:35 host sshd[18055]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.197.151.55  user=root
Jan  1 17:13:35 host sshd[18055]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 17:13:35 host sshd[18052]: User root from 23.94.0.113 not allowed because not listed in AllowUsers
Jan  1 17:13:35 host sshd[18052]: input_userauth_request: invalid user root [preauth]
Jan  1 17:13:35 host unix_chkpwd[18058]: password check failed for user (root)
Jan  1 17:13:35 host sshd[18052]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.94.0.113  user=root
Jan  1 17:13:35 host sshd[18052]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 17:13:36 host sshd[18043]: Failed password for invalid user admin from 115.70.219.46 port 32489 ssh2
Jan  1 17:13:37 host sshd[18043]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 17:13:37 host sshd[18055]: Failed password for invalid user root from 223.197.151.55 port 58549 ssh2
Jan  1 17:13:37 host sshd[18055]: Received disconnect from 223.197.151.55 port 58549:11: Bye Bye [preauth]
Jan  1 17:13:37 host sshd[18055]: Disconnected from 223.197.151.55 port 58549 [preauth]
Jan  1 17:13:37 host sshd[18052]: Failed password for invalid user root from 23.94.0.113 port 51374 ssh2
Jan  1 17:13:38 host sshd[18052]: Received disconnect from 23.94.0.113 port 51374:11: Bye Bye [preauth]
Jan  1 17:13:38 host sshd[18052]: Disconnected from 23.94.0.113 port 51374 [preauth]
Jan  1 17:13:39 host sshd[18043]: Failed password for invalid user admin from 115.70.219.46 port 32489 ssh2
Jan  1 17:13:39 host sshd[18043]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 17:13:39 host sshd[18048]: User root from 106.74.26.73 not allowed because not listed in AllowUsers
Jan  1 17:13:39 host sshd[18048]: input_userauth_request: invalid user root [preauth]
Jan  1 17:13:39 host unix_chkpwd[18123]: password check failed for user (root)
Jan  1 17:13:39 host sshd[18048]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.74.26.73  user=root
Jan  1 17:13:39 host sshd[18048]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 17:13:41 host sshd[18043]: Failed password for invalid user admin from 115.70.219.46 port 32489 ssh2
Jan  1 17:13:41 host sshd[18048]: Failed password for invalid user root from 106.74.26.73 port 34176 ssh2
Jan  1 17:13:41 host sshd[18043]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 17:13:42 host sshd[18048]: Received disconnect from 106.74.26.73 port 34176:11: Bye Bye [preauth]
Jan  1 17:13:42 host sshd[18048]: Disconnected from 106.74.26.73 port 34176 [preauth]
Jan  1 17:13:43 host sshd[18043]: Failed password for invalid user admin from 115.70.219.46 port 32489 ssh2
Jan  1 17:13:44 host sshd[18043]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 17:13:46 host sshd[18043]: Failed password for invalid user admin from 115.70.219.46 port 32489 ssh2
Jan  1 17:13:46 host sshd[18043]: error: maximum authentication attempts exceeded for invalid user admin from 115.70.219.46 port 32489 ssh2 [preauth]
Jan  1 17:13:46 host sshd[18043]: Disconnecting: Too many authentication failures [preauth]
Jan  1 17:13:46 host sshd[18043]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.70.219.46
Jan  1 17:13:46 host sshd[18043]: PAM service(sshd) ignoring max retries; 5 > 3
Jan  1 17:13:56 host sshd[18174]: Connection closed by 152.32.150.45 port 55708 [preauth]
Jan  1 17:14:15 host sshd[18216]: User root from 182.71.142.252 not allowed because not listed in AllowUsers
Jan  1 17:14:15 host sshd[18216]: input_userauth_request: invalid user root [preauth]
Jan  1 17:14:15 host unix_chkpwd[18218]: password check failed for user (root)
Jan  1 17:14:15 host sshd[18216]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.71.142.252  user=root
Jan  1 17:14:15 host sshd[18216]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 17:14:16 host sshd[18216]: Failed password for invalid user root from 182.71.142.252 port 53304 ssh2
Jan  1 17:14:17 host sshd[18216]: Received disconnect from 182.71.142.252 port 53304:11: Bye Bye [preauth]
Jan  1 17:14:17 host sshd[18216]: Disconnected from 182.71.142.252 port 53304 [preauth]
Jan  1 17:14:23 host sshd[18230]: User root from 212.231.194.68 not allowed because not listed in AllowUsers
Jan  1 17:14:23 host sshd[18230]: input_userauth_request: invalid user root [preauth]
Jan  1 17:14:23 host unix_chkpwd[18234]: password check failed for user (root)
Jan  1 17:14:23 host sshd[18230]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.231.194.68  user=root
Jan  1 17:14:23 host sshd[18230]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 17:14:26 host sshd[18230]: Failed password for invalid user root from 212.231.194.68 port 47944 ssh2
Jan  1 17:14:26 host sshd[18230]: Received disconnect from 212.231.194.68 port 47944:11: Bye Bye [preauth]
Jan  1 17:14:26 host sshd[18230]: Disconnected from 212.231.194.68 port 47944 [preauth]
Jan  1 17:14:43 host sshd[18305]: Invalid user prueba from 157.7.67.198 port 49378
Jan  1 17:14:43 host sshd[18305]: input_userauth_request: invalid user prueba [preauth]
Jan  1 17:14:43 host sshd[18305]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 17:14:43 host sshd[18305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.7.67.198
Jan  1 17:14:45 host sshd[18305]: Failed password for invalid user prueba from 157.7.67.198 port 49378 ssh2
Jan  1 17:14:45 host sshd[18305]: Received disconnect from 157.7.67.198 port 49378:11: Bye Bye [preauth]
Jan  1 17:14:45 host sshd[18305]: Disconnected from 157.7.67.198 port 49378 [preauth]
Jan  1 17:15:39 host sshd[18445]: User root from 103.174.115.243 not allowed because not listed in AllowUsers
Jan  1 17:15:39 host sshd[18445]: input_userauth_request: invalid user root [preauth]
Jan  1 17:15:39 host unix_chkpwd[18448]: password check failed for user (root)
Jan  1 17:15:39 host sshd[18445]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.174.115.243  user=root
Jan  1 17:15:39 host sshd[18445]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 17:15:41 host sshd[18445]: Failed password for invalid user root from 103.174.115.243 port 60648 ssh2
Jan  1 17:15:41 host sshd[18445]: Received disconnect from 103.174.115.243 port 60648:11: Bye Bye [preauth]
Jan  1 17:15:41 host sshd[18445]: Disconnected from 103.174.115.243 port 60648 [preauth]
Jan  1 17:16:07 host sshd[18535]: User root from 182.71.142.252 not allowed because not listed in AllowUsers
Jan  1 17:16:07 host sshd[18535]: input_userauth_request: invalid user root [preauth]
Jan  1 17:16:07 host unix_chkpwd[18537]: password check failed for user (root)
Jan  1 17:16:07 host sshd[18535]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.71.142.252  user=root
Jan  1 17:16:07 host sshd[18535]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 17:16:09 host sshd[18535]: Failed password for invalid user root from 182.71.142.252 port 39502 ssh2
Jan  1 17:17:34 host sshd[18815]: User root from 157.7.67.198 not allowed because not listed in AllowUsers
Jan  1 17:17:34 host sshd[18815]: input_userauth_request: invalid user root [preauth]
Jan  1 17:17:34 host unix_chkpwd[18818]: password check failed for user (root)
Jan  1 17:17:34 host sshd[18815]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.7.67.198  user=root
Jan  1 17:17:34 host sshd[18815]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 17:17:37 host sshd[18815]: Failed password for invalid user root from 157.7.67.198 port 51234 ssh2
Jan  1 17:17:37 host sshd[18815]: Received disconnect from 157.7.67.198 port 51234:11: Bye Bye [preauth]
Jan  1 17:17:37 host sshd[18815]: Disconnected from 157.7.67.198 port 51234 [preauth]
Jan  1 17:17:54 host sshd[18887]: User root from 106.74.26.73 not allowed because not listed in AllowUsers
Jan  1 17:17:54 host sshd[18887]: input_userauth_request: invalid user root [preauth]
Jan  1 17:17:54 host unix_chkpwd[18894]: password check failed for user (root)
Jan  1 17:17:54 host sshd[18887]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.74.26.73  user=root
Jan  1 17:17:54 host sshd[18887]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 17:17:56 host sshd[18887]: Failed password for invalid user root from 106.74.26.73 port 37332 ssh2
Jan  1 17:17:57 host sshd[18887]: Received disconnect from 106.74.26.73 port 37332:11: Bye Bye [preauth]
Jan  1 17:17:57 host sshd[18887]: Disconnected from 106.74.26.73 port 37332 [preauth]
Jan  1 17:19:16 host sshd[19071]: Invalid user irc from 152.32.150.45 port 55894
Jan  1 17:19:16 host sshd[19071]: input_userauth_request: invalid user irc [preauth]
Jan  1 17:19:16 host sshd[19071]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 17:19:16 host sshd[19071]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.150.45
Jan  1 17:19:18 host sshd[19071]: Failed password for invalid user irc from 152.32.150.45 port 55894 ssh2
Jan  1 17:19:18 host sshd[19071]: Received disconnect from 152.32.150.45 port 55894:11: Bye Bye [preauth]
Jan  1 17:19:18 host sshd[19071]: Disconnected from 152.32.150.45 port 55894 [preauth]
Jan  1 17:20:58 host sshd[19329]: Invalid user apache from 43.132.187.94 port 58432
Jan  1 17:20:58 host sshd[19329]: input_userauth_request: invalid user apache [preauth]
Jan  1 17:20:58 host sshd[19329]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 17:20:58 host sshd[19329]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.132.187.94
Jan  1 17:21:00 host sshd[19329]: Failed password for invalid user apache from 43.132.187.94 port 58432 ssh2
Jan  1 17:21:01 host sshd[19329]: Received disconnect from 43.132.187.94 port 58432:11: Bye Bye [preauth]
Jan  1 17:21:01 host sshd[19329]: Disconnected from 43.132.187.94 port 58432 [preauth]
Jan  1 17:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  1 17:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 17:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 17:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  1 17:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 17:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 17:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  1 17:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 17:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 17:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  1 17:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 17:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 17:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  1 17:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 17:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 17:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  1 17:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 17:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 17:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  1 17:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 17:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 17:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  1 17:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 17:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 17:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  1 17:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 17:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 17:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  1 17:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 17:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 17:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  1 17:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 17:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 17:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  1 17:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 17:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 17:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  1 17:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 17:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 17:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkmaorg user-2=disposeat user-3=remysagr user-4=woodpeck user-5=wwwkapin user-6=vfmassets user-7=shalinijames user-8=wwwtestugo user-9=pmcresources user-10=bonifacegroup user-11=wwwevmhonda user-12=straightcurve user-13=wwwletsstalkfood user-14=palco123 user-15=gifterman user-16=phmetals user-17=kottayamcalldriv user-18=wwwnexidigital user-19=mrsclean user-20=cochintaxi user-21=wwwkaretakers user-22=a2zgroup user-23=dartsimp user-24=laundryboniface user-25=wwwpmcresource user-26=travelboniface user-27=wwwresourcehunte user-28=keralaholi user-29=wwwrmswll user-30=ugotscom feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  1 17:21:51 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  1 17:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 17:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 17:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  1 17:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 17:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 17:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-hINThnrR66e3S3nY.~
Jan  1 17:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 17:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 17:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-hINThnrR66e3S3nY.~'
Jan  1 17:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 17:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 17:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-hINThnrR66e3S3nY.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  1 17:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 17:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 17:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  1 17:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 17:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 17:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  1 17:21:51 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  1 17:21:51 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  1 17:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  1 17:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 17:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 17:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  1 17:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 17:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 17:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  1 17:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 17:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 17:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  1 17:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 17:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 17:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  1 17:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 17:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 17:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  1 17:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  1 17:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  1 17:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  1 17:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  1 17:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  1 17:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  1 17:22:04 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  1 17:22:06 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  1 17:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  1 17:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  1 17:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  1 17:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  1 17:22:08 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  1 17:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  1 17:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  1 17:22:08 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  1 17:22:13 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  1 17:22:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  1 17:22:13 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  1 17:22:15 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  1 17:22:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  1 17:22:15 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  1 17:22:16 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  1 17:22:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  1 17:22:17 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  1 17:22:21 host sshd[19854]: Invalid user ronald from 209.141.56.48 port 38364
Jan  1 17:22:21 host sshd[19854]: input_userauth_request: invalid user ronald [preauth]
Jan  1 17:22:21 host sshd[19854]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 17:22:21 host sshd[19854]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48
Jan  1 17:22:23 host sshd[19854]: Failed password for invalid user ronald from 209.141.56.48 port 38364 ssh2
Jan  1 17:22:23 host sshd[19854]: Connection closed by 209.141.56.48 port 38364 [preauth]
Jan  1 17:22:23 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  1 17:27:00 host sshd[20446]: Did not receive identification string from 103.203.57.11 port 41606
Jan  1 17:27:33 host sshd[20483]: User root from 179.52.9.181 not allowed because not listed in AllowUsers
Jan  1 17:27:33 host sshd[20483]: input_userauth_request: invalid user root [preauth]
Jan  1 17:27:33 host unix_chkpwd[20524]: password check failed for user (root)
Jan  1 17:27:33 host sshd[20483]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.52.9.181  user=root
Jan  1 17:27:33 host sshd[20483]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 17:27:35 host sshd[20483]: Failed password for invalid user root from 179.52.9.181 port 56374 ssh2
Jan  1 17:27:35 host sshd[20483]: Received disconnect from 179.52.9.181 port 56374:11: Bye Bye [preauth]
Jan  1 17:27:35 host sshd[20483]: Disconnected from 179.52.9.181 port 56374 [preauth]
Jan  1 17:31:14 host sshd[21138]: User root from 186.7.122.32 not allowed because not listed in AllowUsers
Jan  1 17:31:14 host sshd[21138]: input_userauth_request: invalid user root [preauth]
Jan  1 17:31:14 host unix_chkpwd[21159]: password check failed for user (root)
Jan  1 17:31:14 host sshd[21138]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.7.122.32  user=root
Jan  1 17:31:14 host sshd[21138]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 17:31:17 host sshd[21138]: Failed password for invalid user root from 186.7.122.32 port 33317 ssh2
Jan  1 17:31:18 host sshd[21138]: Received disconnect from 186.7.122.32 port 33317:11: Bye Bye [preauth]
Jan  1 17:31:18 host sshd[21138]: Disconnected from 186.7.122.32 port 33317 [preauth]
Jan  1 17:33:54 host sshd[21484]: Invalid user yuanhaoqi from 106.10.122.53 port 41618
Jan  1 17:33:54 host sshd[21484]: input_userauth_request: invalid user yuanhaoqi [preauth]
Jan  1 17:33:54 host sshd[21484]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 17:33:54 host sshd[21484]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53
Jan  1 17:33:56 host sshd[21484]: Failed password for invalid user yuanhaoqi from 106.10.122.53 port 41618 ssh2
Jan  1 17:33:56 host sshd[21484]: Connection closed by 106.10.122.53 port 41618 [preauth]
Jan  1 17:39:09 host sshd[22338]: Connection closed by 186.7.58.34 port 43030 [preauth]
Jan  1 17:39:58 host sshd[22520]: Invalid user customer from 103.13.40.2 port 48334
Jan  1 17:39:58 host sshd[22520]: input_userauth_request: invalid user customer [preauth]
Jan  1 17:39:58 host sshd[22520]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 17:39:58 host sshd[22520]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2
Jan  1 17:40:00 host sshd[22520]: Failed password for invalid user customer from 103.13.40.2 port 48334 ssh2
Jan  1 17:40:00 host sshd[22520]: Connection closed by 103.13.40.2 port 48334 [preauth]
Jan  1 17:41:11 host sshd[22827]: Invalid user user1 from 92.46.108.20 port 39162
Jan  1 17:41:11 host sshd[22827]: input_userauth_request: invalid user user1 [preauth]
Jan  1 17:41:12 host sshd[22827]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 17:41:12 host sshd[22827]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20
Jan  1 17:41:13 host sshd[22827]: Failed password for invalid user user1 from 92.46.108.20 port 39162 ssh2
Jan  1 17:41:14 host sshd[22827]: Connection closed by 92.46.108.20 port 39162 [preauth]
Jan  1 17:41:39 host sshd[22909]: Invalid user guest from 193.169.255.30 port 39318
Jan  1 17:41:39 host sshd[22909]: input_userauth_request: invalid user guest [preauth]
Jan  1 17:41:39 host sshd[22909]: Failed none for invalid user guest from 193.169.255.30 port 39318 ssh2
Jan  1 17:41:42 host sshd[22909]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 17:41:42 host sshd[22909]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.169.255.30
Jan  1 17:41:44 host sshd[22909]: Failed password for invalid user guest from 193.169.255.30 port 39318 ssh2
Jan  1 17:41:47 host sshd[22909]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 17:41:48 host sshd[22909]: Failed password for invalid user guest from 193.169.255.30 port 39318 ssh2
Jan  1 17:41:51 host sshd[22909]: Connection closed by 193.169.255.30 port 39318 [preauth]
Jan  1 17:41:51 host sshd[22909]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.169.255.30
Jan  1 18:00:57 host sshd[25659]: Invalid user ps from 162.218.126.136 port 58688
Jan  1 18:00:57 host sshd[25659]: input_userauth_request: invalid user ps [preauth]
Jan  1 18:00:57 host sshd[25659]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 18:00:57 host sshd[25659]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136
Jan  1 18:00:59 host sshd[25659]: Failed password for invalid user ps from 162.218.126.136 port 58688 ssh2
Jan  1 18:01:00 host sshd[25659]: Connection closed by 162.218.126.136 port 58688 [preauth]
Jan  1 18:03:43 host sshd[26215]: Invalid user ronald from 209.141.56.48 port 56982
Jan  1 18:03:43 host sshd[26215]: input_userauth_request: invalid user ronald [preauth]
Jan  1 18:03:43 host sshd[26215]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 18:03:43 host sshd[26215]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48
Jan  1 18:03:45 host sshd[26215]: Failed password for invalid user ronald from 209.141.56.48 port 56982 ssh2
Jan  1 18:03:45 host sshd[26215]: Connection closed by 209.141.56.48 port 56982 [preauth]
Jan  1 18:08:59 host sshd[27025]: Connection closed by 45.79.181.104 port 65352 [preauth]
Jan  1 18:09:01 host sshd[27030]: Connection closed by 45.79.181.104 port 6500 [preauth]
Jan  1 18:09:04 host sshd[27052]: Connection closed by 45.79.181.104 port 6516 [preauth]
Jan  1 18:17:42 host sshd[28558]: Invalid user user from 45.93.201.90 port 54082
Jan  1 18:17:42 host sshd[28558]: input_userauth_request: invalid user user [preauth]
Jan  1 18:17:42 host sshd[28558]: Failed none for invalid user user from 45.93.201.90 port 54082 ssh2
Jan  1 18:17:45 host sshd[28558]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 18:17:45 host sshd[28558]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90
Jan  1 18:17:47 host sshd[28558]: Failed password for invalid user user from 45.93.201.90 port 54082 ssh2
Jan  1 18:17:51 host sshd[28558]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 18:17:52 host sshd[28558]: Failed password for invalid user user from 45.93.201.90 port 54082 ssh2
Jan  1 18:17:56 host sshd[28558]: Connection closed by 45.93.201.90 port 54082 [preauth]
Jan  1 18:17:56 host sshd[28558]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90
Jan  1 18:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  1 18:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 18:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 18:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  1 18:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 18:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 18:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  1 18:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 18:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 18:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  1 18:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 18:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 18:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  1 18:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 18:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 18:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  1 18:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 18:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 18:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  1 18:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 18:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 18:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  1 18:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 18:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 18:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  1 18:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 18:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 18:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  1 18:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 18:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 18:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  1 18:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 18:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 18:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  1 18:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 18:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 18:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  1 18:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 18:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 18:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=bonifacegroup user-2=wwwevmhonda user-3=straightcurve user-4=wwwletsstalkfood user-5=gifterman user-6=palco123 user-7=phmetals user-8=kottayamcalldriv user-9=wwwnexidigital user-10=mrsclean user-11=disposeat user-12=wwwkmaorg user-13=remysagr user-14=wwwkapin user-15=woodpeck user-16=vfmassets user-17=wwwtestugo user-18=shalinijames user-19=pmcresources user-20=wwwpmcresource user-21=travelboniface user-22=wwwrmswll user-23=wwwresourcehunte user-24=keralaholi user-25=ugotscom user-26=wwwkaretakers user-27=cochintaxi user-28=dartsimp user-29=a2zgroup user-30=laundryboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  1 18:21:51 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  1 18:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 18:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 18:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  1 18:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 18:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 18:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-L3Z9ssOyDdnEi0LS.~
Jan  1 18:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 18:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 18:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-L3Z9ssOyDdnEi0LS.~'
Jan  1 18:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 18:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 18:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-L3Z9ssOyDdnEi0LS.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  1 18:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 18:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 18:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  1 18:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 18:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 18:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  1 18:21:51 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  1 18:21:51 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  1 18:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  1 18:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 18:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 18:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  1 18:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 18:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 18:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  1 18:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 18:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 18:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  1 18:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 18:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 18:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  1 18:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 18:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 18:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  1 18:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  1 18:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  1 18:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  1 18:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  1 18:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  1 18:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  1 18:21:58 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  1 18:22:00 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  1 18:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  1 18:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  1 18:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  1 18:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  1 18:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  1 18:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  1 18:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  1 18:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  1 18:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  1 18:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  1 18:22:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  1 18:22:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  1 18:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  1 18:22:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  1 18:22:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  1 18:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  1 18:22:08 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  1 18:22:10 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  1 18:25:00 host sshd[29630]: Invalid user raymond from 107.189.30.59 port 44680
Jan  1 18:25:00 host sshd[29630]: input_userauth_request: invalid user raymond [preauth]
Jan  1 18:25:00 host sshd[29630]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 18:25:00 host sshd[29630]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59
Jan  1 18:25:01 host sshd[29630]: Failed password for invalid user raymond from 107.189.30.59 port 44680 ssh2
Jan  1 18:25:02 host sshd[29630]: Connection closed by 107.189.30.59 port 44680 [preauth]
Jan  1 18:28:53 host sshd[30209]: User root from 45.128.234.151 not allowed because not listed in AllowUsers
Jan  1 18:28:53 host sshd[30209]: input_userauth_request: invalid user root [preauth]
Jan  1 18:28:53 host unix_chkpwd[30212]: password check failed for user (root)
Jan  1 18:28:53 host sshd[30209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.128.234.151  user=root
Jan  1 18:28:53 host sshd[30209]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 18:28:56 host sshd[30209]: Failed password for invalid user root from 45.128.234.151 port 48138 ssh2
Jan  1 18:28:56 host sshd[30209]: Connection closed by 45.128.234.151 port 48138 [preauth]
Jan  1 18:29:11 host sshd[30260]: Invalid user ronald from 209.141.56.48 port 56144
Jan  1 18:29:11 host sshd[30260]: input_userauth_request: invalid user ronald [preauth]
Jan  1 18:29:11 host sshd[30260]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 18:29:11 host sshd[30260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48
Jan  1 18:29:13 host sshd[30260]: Failed password for invalid user ronald from 209.141.56.48 port 56144 ssh2
Jan  1 18:29:14 host sshd[30260]: Connection closed by 209.141.56.48 port 56144 [preauth]
Jan  1 18:32:52 host sshd[30665]: User root from 45.128.234.151 not allowed because not listed in AllowUsers
Jan  1 18:32:52 host sshd[30665]: input_userauth_request: invalid user root [preauth]
Jan  1 18:32:52 host unix_chkpwd[30668]: password check failed for user (root)
Jan  1 18:32:52 host sshd[30665]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.128.234.151  user=root
Jan  1 18:32:52 host sshd[30665]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 18:32:54 host sshd[30665]: Failed password for invalid user root from 45.128.234.151 port 49474 ssh2
Jan  1 18:32:54 host sshd[30665]: Connection closed by 45.128.234.151 port 49474 [preauth]
Jan  1 18:37:23 host sshd[31289]: Invalid user ronald from 209.141.56.48 port 35052
Jan  1 18:37:23 host sshd[31289]: input_userauth_request: invalid user ronald [preauth]
Jan  1 18:37:23 host sshd[31289]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 18:37:23 host sshd[31289]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48
Jan  1 18:37:25 host sshd[31289]: Failed password for invalid user ronald from 209.141.56.48 port 35052 ssh2
Jan  1 18:37:25 host sshd[31289]: Connection closed by 209.141.56.48 port 35052 [preauth]
Jan  1 18:56:31 host sshd[1466]: User root from 106.10.122.53 not allowed because not listed in AllowUsers
Jan  1 18:56:31 host sshd[1466]: input_userauth_request: invalid user root [preauth]
Jan  1 18:56:32 host unix_chkpwd[1478]: password check failed for user (root)
Jan  1 18:56:32 host sshd[1466]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53  user=root
Jan  1 18:56:32 host sshd[1466]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 18:56:34 host sshd[1466]: Failed password for invalid user root from 106.10.122.53 port 37946 ssh2
Jan  1 18:56:34 host sshd[1466]: Connection closed by 106.10.122.53 port 37946 [preauth]
Jan  1 19:01:13 host sshd[2083]: User root from 103.13.40.2 not allowed because not listed in AllowUsers
Jan  1 19:01:13 host sshd[2083]: input_userauth_request: invalid user root [preauth]
Jan  1 19:01:14 host unix_chkpwd[2085]: password check failed for user (root)
Jan  1 19:01:14 host sshd[2083]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2  user=root
Jan  1 19:01:14 host sshd[2083]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 19:01:15 host sshd[2083]: Failed password for invalid user root from 103.13.40.2 port 48440 ssh2
Jan  1 19:01:15 host sshd[2083]: Connection closed by 103.13.40.2 port 48440 [preauth]
Jan  1 19:02:31 host sshd[2327]: User root from 79.188.52.121 not allowed because not listed in AllowUsers
Jan  1 19:02:31 host sshd[2327]: input_userauth_request: invalid user root [preauth]
Jan  1 19:02:31 host unix_chkpwd[2330]: password check failed for user (root)
Jan  1 19:02:31 host sshd[2327]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.188.52.121  user=root
Jan  1 19:02:31 host sshd[2327]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 19:02:32 host sshd[2327]: Failed password for invalid user root from 79.188.52.121 port 54000 ssh2
Jan  1 19:02:33 host sshd[2327]: Received disconnect from 79.188.52.121 port 54000:11: Bye Bye [preauth]
Jan  1 19:02:33 host sshd[2327]: Disconnected from 79.188.52.121 port 54000 [preauth]
Jan  1 19:05:43 host sshd[2674]: Invalid user user from 162.218.126.136 port 50912
Jan  1 19:05:43 host sshd[2674]: input_userauth_request: invalid user user [preauth]
Jan  1 19:05:43 host sshd[2674]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 19:05:43 host sshd[2674]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136
Jan  1 19:05:45 host sshd[2674]: Failed password for invalid user user from 162.218.126.136 port 50912 ssh2
Jan  1 19:05:45 host sshd[2674]: Connection closed by 162.218.126.136 port 50912 [preauth]
Jan  1 19:06:36 host sshd[2779]: User root from 170.245.132.7 not allowed because not listed in AllowUsers
Jan  1 19:06:36 host sshd[2779]: input_userauth_request: invalid user root [preauth]
Jan  1 19:06:36 host unix_chkpwd[2783]: password check failed for user (root)
Jan  1 19:06:36 host sshd[2779]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.245.132.7  user=root
Jan  1 19:06:36 host sshd[2779]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 19:06:37 host sshd[2779]: Failed password for invalid user root from 170.245.132.7 port 47472 ssh2
Jan  1 19:06:38 host sshd[2779]: Received disconnect from 170.245.132.7 port 47472:11: Bye Bye [preauth]
Jan  1 19:06:38 host sshd[2779]: Disconnected from 170.245.132.7 port 47472 [preauth]
Jan  1 19:08:13 host sshd[2946]: User root from 79.188.52.121 not allowed because not listed in AllowUsers
Jan  1 19:08:13 host sshd[2946]: input_userauth_request: invalid user root [preauth]
Jan  1 19:08:13 host unix_chkpwd[2949]: password check failed for user (root)
Jan  1 19:08:13 host sshd[2946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.188.52.121  user=root
Jan  1 19:08:13 host sshd[2946]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 19:08:15 host sshd[2946]: Failed password for invalid user root from 79.188.52.121 port 52798 ssh2
Jan  1 19:08:15 host sshd[2946]: Received disconnect from 79.188.52.121 port 52798:11: Bye Bye [preauth]
Jan  1 19:08:15 host sshd[2946]: Disconnected from 79.188.52.121 port 52798 [preauth]
Jan  1 19:09:49 host sshd[3246]: User root from 179.131.12.120 not allowed because not listed in AllowUsers
Jan  1 19:09:49 host sshd[3246]: input_userauth_request: invalid user root [preauth]
Jan  1 19:09:49 host unix_chkpwd[3250]: password check failed for user (root)
Jan  1 19:09:49 host sshd[3246]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.131.12.120  user=root
Jan  1 19:09:49 host sshd[3246]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 19:09:50 host sshd[3246]: Failed password for invalid user root from 179.131.12.120 port 7094 ssh2
Jan  1 19:09:51 host sshd[3246]: Received disconnect from 179.131.12.120 port 7094:11: Bye Bye [preauth]
Jan  1 19:09:51 host sshd[3246]: Disconnected from 179.131.12.120 port 7094 [preauth]
Jan  1 19:10:34 host sshd[3350]: Invalid user user1 from 170.245.132.7 port 39007
Jan  1 19:10:34 host sshd[3350]: input_userauth_request: invalid user user1 [preauth]
Jan  1 19:10:34 host sshd[3350]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 19:10:34 host sshd[3350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.245.132.7
Jan  1 19:10:36 host sshd[3350]: Failed password for invalid user user1 from 170.245.132.7 port 39007 ssh2
Jan  1 19:10:36 host sshd[3350]: Received disconnect from 170.245.132.7 port 39007:11: Bye Bye [preauth]
Jan  1 19:10:36 host sshd[3350]: Disconnected from 170.245.132.7 port 39007 [preauth]
Jan  1 19:13:17 host sshd[3671]: User root from 179.131.12.120 not allowed because not listed in AllowUsers
Jan  1 19:13:17 host sshd[3671]: input_userauth_request: invalid user root [preauth]
Jan  1 19:13:17 host unix_chkpwd[3675]: password check failed for user (root)
Jan  1 19:13:17 host sshd[3671]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.131.12.120  user=root
Jan  1 19:13:17 host sshd[3671]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 19:13:19 host sshd[3671]: Failed password for invalid user root from 179.131.12.120 port 19892 ssh2
Jan  1 19:13:20 host sshd[3671]: Received disconnect from 179.131.12.120 port 19892:11: Bye Bye [preauth]
Jan  1 19:13:20 host sshd[3671]: Disconnected from 179.131.12.120 port 19892 [preauth]
Jan  1 19:19:19 host sshd[4618]: User root from 103.186.1.55 not allowed because not listed in AllowUsers
Jan  1 19:19:19 host sshd[4618]: input_userauth_request: invalid user root [preauth]
Jan  1 19:19:19 host unix_chkpwd[4620]: password check failed for user (root)
Jan  1 19:19:19 host sshd[4618]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.186.1.55  user=root
Jan  1 19:19:19 host sshd[4618]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 19:19:21 host sshd[4618]: Failed password for invalid user root from 103.186.1.55 port 53560 ssh2
Jan  1 19:19:22 host sshd[4618]: Received disconnect from 103.186.1.55 port 53560:11: Bye Bye [preauth]
Jan  1 19:19:22 host sshd[4618]: Disconnected from 103.186.1.55 port 53560 [preauth]
Jan  1 19:19:40 host sshd[4659]: Invalid user sales from 206.189.66.204 port 36000
Jan  1 19:19:40 host sshd[4659]: input_userauth_request: invalid user sales [preauth]
Jan  1 19:19:40 host sshd[4659]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 19:19:40 host sshd[4659]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.66.204
Jan  1 19:19:40 host sshd[4662]: Invalid user napporn from 20.230.98.151 port 42582
Jan  1 19:19:40 host sshd[4662]: input_userauth_request: invalid user napporn [preauth]
Jan  1 19:19:40 host sshd[4662]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 19:19:40 host sshd[4662]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.230.98.151
Jan  1 19:19:42 host sshd[4659]: Failed password for invalid user sales from 206.189.66.204 port 36000 ssh2
Jan  1 19:19:42 host sshd[4665]: User root from 201.138.29.58 not allowed because not listed in AllowUsers
Jan  1 19:19:42 host sshd[4665]: input_userauth_request: invalid user root [preauth]
Jan  1 19:19:42 host unix_chkpwd[4668]: password check failed for user (root)
Jan  1 19:19:42 host sshd[4665]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.138.29.58  user=root
Jan  1 19:19:42 host sshd[4665]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 19:19:42 host sshd[4659]: Received disconnect from 206.189.66.204 port 36000:11: Bye Bye [preauth]
Jan  1 19:19:42 host sshd[4659]: Disconnected from 206.189.66.204 port 36000 [preauth]
Jan  1 19:19:42 host sshd[4662]: Failed password for invalid user napporn from 20.230.98.151 port 42582 ssh2
Jan  1 19:19:42 host sshd[4662]: Received disconnect from 20.230.98.151 port 42582:11: Bye Bye [preauth]
Jan  1 19:19:42 host sshd[4662]: Disconnected from 20.230.98.151 port 42582 [preauth]
Jan  1 19:19:45 host sshd[4665]: Failed password for invalid user root from 201.138.29.58 port 33036 ssh2
Jan  1 19:19:45 host sshd[4665]: Received disconnect from 201.138.29.58 port 33036:11: Bye Bye [preauth]
Jan  1 19:19:45 host sshd[4665]: Disconnected from 201.138.29.58 port 33036 [preauth]
Jan  1 19:19:47 host sshd[4674]: Invalid user zookeeper from 167.99.12.43 port 48690
Jan  1 19:19:47 host sshd[4674]: input_userauth_request: invalid user zookeeper [preauth]
Jan  1 19:19:47 host sshd[4674]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 19:19:47 host sshd[4674]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.12.43
Jan  1 19:19:49 host sshd[4674]: Failed password for invalid user zookeeper from 167.99.12.43 port 48690 ssh2
Jan  1 19:19:50 host sshd[4674]: Received disconnect from 167.99.12.43 port 48690:11: Bye Bye [preauth]
Jan  1 19:19:50 host sshd[4674]: Disconnected from 167.99.12.43 port 48690 [preauth]
Jan  1 19:20:03 host sshd[4721]: User root from 88.147.166.188 not allowed because not listed in AllowUsers
Jan  1 19:20:03 host sshd[4721]: input_userauth_request: invalid user root [preauth]
Jan  1 19:20:03 host unix_chkpwd[4728]: password check failed for user (root)
Jan  1 19:20:03 host sshd[4721]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.147.166.188  user=root
Jan  1 19:20:03 host sshd[4721]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 19:20:05 host sshd[4721]: Failed password for invalid user root from 88.147.166.188 port 54130 ssh2
Jan  1 19:20:05 host sshd[4721]: Received disconnect from 88.147.166.188 port 54130:11: Bye Bye [preauth]
Jan  1 19:20:05 host sshd[4721]: Disconnected from 88.147.166.188 port 54130 [preauth]
Jan  1 19:20:05 host sshd[4734]: Invalid user www-data from 159.89.163.158 port 49662
Jan  1 19:20:05 host sshd[4734]: input_userauth_request: invalid user www-data [preauth]
Jan  1 19:20:05 host sshd[4734]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 19:20:05 host sshd[4734]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.163.158
Jan  1 19:20:08 host sshd[4734]: Failed password for invalid user www-data from 159.89.163.158 port 49662 ssh2
Jan  1 19:20:08 host sshd[4734]: Received disconnect from 159.89.163.158 port 49662:11: Bye Bye [preauth]
Jan  1 19:20:08 host sshd[4734]: Disconnected from 159.89.163.158 port 49662 [preauth]
Jan  1 19:20:18 host sshd[4755]: User root from 46.101.38.229 not allowed because not listed in AllowUsers
Jan  1 19:20:18 host sshd[4755]: input_userauth_request: invalid user root [preauth]
Jan  1 19:20:18 host unix_chkpwd[4758]: password check failed for user (root)
Jan  1 19:20:18 host sshd[4755]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.38.229  user=root
Jan  1 19:20:18 host sshd[4755]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 19:20:20 host sshd[4755]: Failed password for invalid user root from 46.101.38.229 port 60564 ssh2
Jan  1 19:20:20 host sshd[4755]: Received disconnect from 46.101.38.229 port 60564:11: Bye Bye [preauth]
Jan  1 19:20:20 host sshd[4755]: Disconnected from 46.101.38.229 port 60564 [preauth]
Jan  1 19:21:44 host sshd[4934]: User root from 1.214.245.27 not allowed because not listed in AllowUsers
Jan  1 19:21:44 host sshd[4934]: input_userauth_request: invalid user root [preauth]
Jan  1 19:21:44 host unix_chkpwd[4940]: password check failed for user (root)
Jan  1 19:21:44 host sshd[4934]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.214.245.27  user=root
Jan  1 19:21:44 host sshd[4934]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 19:21:45 host sshd[4937]: User root from 188.254.0.218 not allowed because not listed in AllowUsers
Jan  1 19:21:45 host sshd[4937]: input_userauth_request: invalid user root [preauth]
Jan  1 19:21:45 host unix_chkpwd[4945]: password check failed for user (root)
Jan  1 19:21:45 host sshd[4937]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.254.0.218  user=root
Jan  1 19:21:45 host sshd[4937]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 19:21:47 host sshd[4934]: Failed password for invalid user root from 1.214.245.27 port 57298 ssh2
Jan  1 19:21:47 host sshd[4934]: Received disconnect from 1.214.245.27 port 57298:11: Bye Bye [preauth]
Jan  1 19:21:47 host sshd[4934]: Disconnected from 1.214.245.27 port 57298 [preauth]
Jan  1 19:21:47 host sshd[4937]: Failed password for invalid user root from 188.254.0.218 port 59960 ssh2
Jan  1 19:21:47 host sshd[4937]: Received disconnect from 188.254.0.218 port 59960:11: Bye Bye [preauth]
Jan  1 19:21:47 host sshd[4937]: Disconnected from 188.254.0.218 port 59960 [preauth]
Jan  1 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  1 19:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 19:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  1 19:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 19:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  1 19:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 19:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  1 19:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 19:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  1 19:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 19:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  1 19:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 19:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  1 19:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 19:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  1 19:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 19:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  1 19:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 19:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  1 19:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 19:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  1 19:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 19:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 19:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  1 19:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 19:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 19:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  1 19:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 19:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 19:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=disposeat user-2=wwwkmaorg user-3=remysagr user-4=woodpeck user-5=wwwkapin user-6=vfmassets user-7=wwwtestugo user-8=shalinijames user-9=pmcresources user-10=bonifacegroup user-11=wwwevmhonda user-12=wwwletsstalkfood user-13=straightcurve user-14=gifterman user-15=palco123 user-16=phmetals user-17=kottayamcalldriv user-18=wwwnexidigital user-19=mrsclean user-20=wwwkaretakers user-21=cochintaxi user-22=dartsimp user-23=a2zgroup user-24=laundryboniface user-25=wwwpmcresource user-26=travelboniface user-27=wwwrmswll user-28=wwwresourcehunte user-29=keralaholi user-30=ugotscom feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  1 19:21:51 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  1 19:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 19:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 19:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  1 19:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 19:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 19:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-hRFpAxP68rEqZx2G.~
Jan  1 19:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 19:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 19:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-hRFpAxP68rEqZx2G.~'
Jan  1 19:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 19:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 19:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-hRFpAxP68rEqZx2G.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  1 19:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 19:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 19:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  1 19:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 19:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 19:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  1 19:21:51 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  1 19:21:51 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  1 19:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  1 19:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 19:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 19:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  1 19:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 19:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 19:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  1 19:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 19:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 19:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  1 19:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 19:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 19:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  1 19:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 19:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 19:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  1 19:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  1 19:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  1 19:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  1 19:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  1 19:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  1 19:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  1 19:21:56 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  1 19:21:57 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  1 19:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  1 19:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  1 19:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  1 19:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  1 19:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  1 19:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  1 19:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  1 19:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  1 19:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  1 19:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  1 19:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  1 19:22:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  1 19:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  1 19:22:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  1 19:22:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  1 19:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  1 19:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  1 19:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  1 19:22:16 host sshd[5217]: Invalid user work from 63.250.40.212 port 34710
Jan  1 19:22:16 host sshd[5217]: input_userauth_request: invalid user work [preauth]
Jan  1 19:22:16 host sshd[5217]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 19:22:16 host sshd[5217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=63.250.40.212
Jan  1 19:22:18 host sshd[5217]: Failed password for invalid user work from 63.250.40.212 port 34710 ssh2
Jan  1 19:22:18 host sshd[5217]: Received disconnect from 63.250.40.212 port 34710:11: Bye Bye [preauth]
Jan  1 19:22:18 host sshd[5217]: Disconnected from 63.250.40.212 port 34710 [preauth]
Jan  1 19:23:53 host sshd[5380]: User root from 46.101.38.229 not allowed because not listed in AllowUsers
Jan  1 19:23:53 host sshd[5380]: input_userauth_request: invalid user root [preauth]
Jan  1 19:23:53 host unix_chkpwd[5383]: password check failed for user (root)
Jan  1 19:23:53 host sshd[5380]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.38.229  user=root
Jan  1 19:23:53 host sshd[5380]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 19:23:55 host sshd[5380]: Failed password for invalid user root from 46.101.38.229 port 49428 ssh2
Jan  1 19:23:56 host sshd[5380]: Received disconnect from 46.101.38.229 port 49428:11: Bye Bye [preauth]
Jan  1 19:23:56 host sshd[5380]: Disconnected from 46.101.38.229 port 49428 [preauth]
Jan  1 19:24:20 host sshd[5557]: Invalid user huawei from 20.228.192.73 port 50206
Jan  1 19:24:20 host sshd[5557]: input_userauth_request: invalid user huawei [preauth]
Jan  1 19:24:20 host sshd[5557]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 19:24:20 host sshd[5557]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.228.192.73
Jan  1 19:24:23 host sshd[5557]: Failed password for invalid user huawei from 20.228.192.73 port 50206 ssh2
Jan  1 19:24:23 host sshd[5557]: Received disconnect from 20.228.192.73 port 50206:11: Bye Bye [preauth]
Jan  1 19:24:23 host sshd[5557]: Disconnected from 20.228.192.73 port 50206 [preauth]
Jan  1 19:24:44 host sshd[5609]: User root from 103.186.1.55 not allowed because not listed in AllowUsers
Jan  1 19:24:44 host sshd[5609]: input_userauth_request: invalid user root [preauth]
Jan  1 19:24:44 host unix_chkpwd[5611]: password check failed for user (root)
Jan  1 19:24:44 host sshd[5609]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.186.1.55  user=root
Jan  1 19:24:44 host sshd[5609]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 19:24:45 host sshd[5609]: Failed password for invalid user root from 103.186.1.55 port 57874 ssh2
Jan  1 19:24:46 host sshd[5609]: Received disconnect from 103.186.1.55 port 57874:11: Bye Bye [preauth]
Jan  1 19:24:46 host sshd[5609]: Disconnected from 103.186.1.55 port 57874 [preauth]
Jan  1 19:24:54 host sshd[5663]: User root from 159.89.163.158 not allowed because not listed in AllowUsers
Jan  1 19:24:54 host sshd[5663]: input_userauth_request: invalid user root [preauth]
Jan  1 19:24:54 host unix_chkpwd[5665]: password check failed for user (root)
Jan  1 19:24:54 host sshd[5663]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.163.158  user=root
Jan  1 19:24:54 host sshd[5663]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 19:24:57 host sshd[5663]: Failed password for invalid user root from 159.89.163.158 port 44316 ssh2
Jan  1 19:24:57 host sshd[5663]: Received disconnect from 159.89.163.158 port 44316:11: Bye Bye [preauth]
Jan  1 19:24:57 host sshd[5663]: Disconnected from 159.89.163.158 port 44316 [preauth]
Jan  1 19:25:00 host sshd[5700]: User root from 43.154.64.184 not allowed because not listed in AllowUsers
Jan  1 19:25:00 host sshd[5700]: input_userauth_request: invalid user root [preauth]
Jan  1 19:25:00 host unix_chkpwd[5702]: password check failed for user (root)
Jan  1 19:25:00 host sshd[5700]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.154.64.184  user=root
Jan  1 19:25:00 host sshd[5700]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 19:25:01 host sshd[5704]: Invalid user wwwlogs from 20.230.98.151 port 45714
Jan  1 19:25:01 host sshd[5704]: input_userauth_request: invalid user wwwlogs [preauth]
Jan  1 19:25:01 host sshd[5704]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 19:25:01 host sshd[5704]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.230.98.151
Jan  1 19:25:02 host sshd[5700]: Failed password for invalid user root from 43.154.64.184 port 52342 ssh2
Jan  1 19:25:02 host sshd[5700]: Received disconnect from 43.154.64.184 port 52342:11: Bye Bye [preauth]
Jan  1 19:25:02 host sshd[5700]: Disconnected from 43.154.64.184 port 52342 [preauth]
Jan  1 19:25:02 host sshd[5704]: Failed password for invalid user wwwlogs from 20.230.98.151 port 45714 ssh2
Jan  1 19:25:03 host sshd[5704]: Received disconnect from 20.230.98.151 port 45714:11: Bye Bye [preauth]
Jan  1 19:25:03 host sshd[5704]: Disconnected from 20.230.98.151 port 45714 [preauth]
Jan  1 19:25:07 host sshd[5729]: User root from 206.189.66.204 not allowed because not listed in AllowUsers
Jan  1 19:25:07 host sshd[5729]: input_userauth_request: invalid user root [preauth]
Jan  1 19:25:07 host unix_chkpwd[5732]: password check failed for user (root)
Jan  1 19:25:07 host sshd[5729]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.66.204  user=root
Jan  1 19:25:07 host sshd[5729]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 19:25:09 host sshd[5734]: Invalid user www-data from 167.99.12.43 port 51278
Jan  1 19:25:09 host sshd[5734]: input_userauth_request: invalid user www-data [preauth]
Jan  1 19:25:09 host sshd[5734]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 19:25:09 host sshd[5734]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.12.43
Jan  1 19:25:09 host sshd[5729]: Failed password for invalid user root from 206.189.66.204 port 36750 ssh2
Jan  1 19:25:09 host sshd[5729]: Received disconnect from 206.189.66.204 port 36750:11: Bye Bye [preauth]
Jan  1 19:25:09 host sshd[5729]: Disconnected from 206.189.66.204 port 36750 [preauth]
Jan  1 19:25:11 host sshd[5737]: User root from 201.138.29.58 not allowed because not listed in AllowUsers
Jan  1 19:25:11 host sshd[5737]: input_userauth_request: invalid user root [preauth]
Jan  1 19:25:11 host unix_chkpwd[5741]: password check failed for user (root)
Jan  1 19:25:11 host sshd[5737]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.138.29.58  user=root
Jan  1 19:25:11 host sshd[5737]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 19:25:11 host sshd[5734]: Failed password for invalid user www-data from 167.99.12.43 port 51278 ssh2
Jan  1 19:25:11 host sshd[5734]: Received disconnect from 167.99.12.43 port 51278:11: Bye Bye [preauth]
Jan  1 19:25:11 host sshd[5734]: Disconnected from 167.99.12.43 port 51278 [preauth]
Jan  1 19:25:13 host sshd[5737]: Failed password for invalid user root from 201.138.29.58 port 33630 ssh2
Jan  1 19:25:19 host sshd[5810]: Invalid user ossuser from 188.254.0.218 port 43056
Jan  1 19:25:19 host sshd[5810]: input_userauth_request: invalid user ossuser [preauth]
Jan  1 19:25:19 host sshd[5810]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 19:25:19 host sshd[5810]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.254.0.218
Jan  1 19:25:22 host sshd[5810]: Failed password for invalid user ossuser from 188.254.0.218 port 43056 ssh2
Jan  1 19:25:22 host sshd[5810]: Received disconnect from 188.254.0.218 port 43056:11: Bye Bye [preauth]
Jan  1 19:25:22 host sshd[5810]: Disconnected from 188.254.0.218 port 43056 [preauth]
Jan  1 19:25:26 host sshd[5875]: User root from 88.147.166.188 not allowed because not listed in AllowUsers
Jan  1 19:25:26 host sshd[5875]: input_userauth_request: invalid user root [preauth]
Jan  1 19:25:27 host unix_chkpwd[5877]: password check failed for user (root)
Jan  1 19:25:27 host sshd[5875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.147.166.188  user=root
Jan  1 19:25:27 host sshd[5875]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 19:25:28 host sshd[5875]: Failed password for invalid user root from 88.147.166.188 port 40918 ssh2
Jan  1 19:25:58 host sshd[5951]: Invalid user steam from 63.250.40.212 port 46536
Jan  1 19:25:58 host sshd[5951]: input_userauth_request: invalid user steam [preauth]
Jan  1 19:25:58 host sshd[5951]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 19:25:58 host sshd[5951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=63.250.40.212
Jan  1 19:26:00 host sshd[5951]: Failed password for invalid user steam from 63.250.40.212 port 46536 ssh2
Jan  1 19:26:00 host sshd[5951]: Received disconnect from 63.250.40.212 port 46536:11: Bye Bye [preauth]
Jan  1 19:26:00 host sshd[5951]: Disconnected from 63.250.40.212 port 46536 [preauth]
Jan  1 19:26:10 host sshd[5974]: User root from 20.230.98.151 not allowed because not listed in AllowUsers
Jan  1 19:26:10 host sshd[5974]: input_userauth_request: invalid user root [preauth]
Jan  1 19:26:10 host unix_chkpwd[5977]: password check failed for user (root)
Jan  1 19:26:10 host sshd[5974]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.230.98.151  user=root
Jan  1 19:26:10 host sshd[5974]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 19:26:12 host sshd[5974]: Failed password for invalid user root from 20.230.98.151 port 39656 ssh2
Jan  1 19:26:12 host sshd[5974]: Received disconnect from 20.230.98.151 port 39656:11: Bye Bye [preauth]
Jan  1 19:26:12 host sshd[5974]: Disconnected from 20.230.98.151 port 39656 [preauth]
Jan  1 19:26:19 host sshd[6020]: User root from 167.99.12.43 not allowed because not listed in AllowUsers
Jan  1 19:26:19 host sshd[6020]: input_userauth_request: invalid user root [preauth]
Jan  1 19:26:19 host unix_chkpwd[6023]: password check failed for user (root)
Jan  1 19:26:19 host sshd[6020]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.12.43  user=root
Jan  1 19:26:19 host sshd[6020]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 19:26:20 host sshd[6020]: Failed password for invalid user root from 167.99.12.43 port 52746 ssh2
Jan  1 19:26:21 host sshd[6020]: Received disconnect from 167.99.12.43 port 52746:11: Bye Bye [preauth]
Jan  1 19:26:21 host sshd[6020]: Disconnected from 167.99.12.43 port 52746 [preauth]
Jan  1 19:27:26 host sshd[6161]: Invalid user bill from 20.228.192.73 port 34730
Jan  1 19:27:26 host sshd[6161]: input_userauth_request: invalid user bill [preauth]
Jan  1 19:27:26 host sshd[6161]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 19:27:26 host sshd[6161]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.228.192.73
Jan  1 19:27:28 host sshd[6161]: Failed password for invalid user bill from 20.228.192.73 port 34730 ssh2
Jan  1 19:27:28 host sshd[6161]: Received disconnect from 20.228.192.73 port 34730:11: Bye Bye [preauth]
Jan  1 19:27:28 host sshd[6161]: Disconnected from 20.228.192.73 port 34730 [preauth]
Jan  1 19:27:57 host sshd[6219]: User root from 63.250.40.212 not allowed because not listed in AllowUsers
Jan  1 19:27:57 host sshd[6219]: input_userauth_request: invalid user root [preauth]
Jan  1 19:27:57 host unix_chkpwd[6222]: password check failed for user (root)
Jan  1 19:27:57 host sshd[6219]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=63.250.40.212  user=root
Jan  1 19:27:57 host sshd[6219]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 19:27:59 host sshd[6219]: Failed password for invalid user root from 63.250.40.212 port 45656 ssh2
Jan  1 19:28:04 host sshd[6275]: User root from 1.214.245.27 not allowed because not listed in AllowUsers
Jan  1 19:28:04 host sshd[6275]: input_userauth_request: invalid user root [preauth]
Jan  1 19:28:04 host unix_chkpwd[6278]: password check failed for user (root)
Jan  1 19:28:04 host sshd[6275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.214.245.27  user=root
Jan  1 19:28:04 host sshd[6275]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 19:28:05 host sshd[6275]: Failed password for invalid user root from 1.214.245.27 port 49588 ssh2
Jan  1 19:28:05 host sshd[6275]: Received disconnect from 1.214.245.27 port 49588:11: Bye Bye [preauth]
Jan  1 19:28:05 host sshd[6275]: Disconnected from 1.214.245.27 port 49588 [preauth]
Jan  1 19:28:13 host sshd[6317]: User root from 43.154.64.184 not allowed because not listed in AllowUsers
Jan  1 19:28:13 host sshd[6317]: input_userauth_request: invalid user root [preauth]
Jan  1 19:28:13 host unix_chkpwd[6320]: password check failed for user (root)
Jan  1 19:28:13 host sshd[6317]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.154.64.184  user=root
Jan  1 19:28:13 host sshd[6317]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 19:28:15 host sshd[6317]: Failed password for invalid user root from 43.154.64.184 port 56966 ssh2
Jan  1 19:28:15 host sshd[6317]: Received disconnect from 43.154.64.184 port 56966:11: Bye Bye [preauth]
Jan  1 19:28:15 host sshd[6317]: Disconnected from 43.154.64.184 port 56966 [preauth]
Jan  1 19:28:39 host sshd[6406]: User root from 20.228.192.73 not allowed because not listed in AllowUsers
Jan  1 19:28:39 host sshd[6406]: input_userauth_request: invalid user root [preauth]
Jan  1 19:28:39 host unix_chkpwd[6409]: password check failed for user (root)
Jan  1 19:28:39 host sshd[6406]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.228.192.73  user=root
Jan  1 19:28:39 host sshd[6406]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 19:28:41 host sshd[6406]: Failed password for invalid user root from 20.228.192.73 port 35144 ssh2
Jan  1 19:28:41 host sshd[6406]: Received disconnect from 20.228.192.73 port 35144:11: Bye Bye [preauth]
Jan  1 19:28:41 host sshd[6406]: Disconnected from 20.228.192.73 port 35144 [preauth]
Jan  1 19:31:33 host sshd[6861]: User root from 84.53.228.192 not allowed because not listed in AllowUsers
Jan  1 19:31:33 host sshd[6861]: input_userauth_request: invalid user root [preauth]
Jan  1 19:31:33 host unix_chkpwd[6866]: password check failed for user (root)
Jan  1 19:31:33 host sshd[6861]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.53.228.192  user=root
Jan  1 19:31:33 host sshd[6861]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 19:31:36 host sshd[6861]: Failed password for invalid user root from 84.53.228.192 port 41818 ssh2
Jan  1 19:31:36 host sshd[6861]: Received disconnect from 84.53.228.192 port 41818:11: Bye Bye [preauth]
Jan  1 19:31:36 host sshd[6861]: Disconnected from 84.53.228.192 port 41818 [preauth]
Jan  1 19:31:48 host sshd[6891]: User root from 68.183.238.182 not allowed because not listed in AllowUsers
Jan  1 19:31:48 host sshd[6891]: input_userauth_request: invalid user root [preauth]
Jan  1 19:31:48 host unix_chkpwd[6896]: password check failed for user (root)
Jan  1 19:31:48 host sshd[6891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.238.182  user=root
Jan  1 19:31:48 host sshd[6891]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 19:31:50 host sshd[6891]: Failed password for invalid user root from 68.183.238.182 port 54882 ssh2
Jan  1 19:31:50 host sshd[6891]: Received disconnect from 68.183.238.182 port 54882:11: Bye Bye [preauth]
Jan  1 19:31:50 host sshd[6891]: Disconnected from 68.183.238.182 port 54882 [preauth]
Jan  1 19:32:58 host sshd[7031]: User root from 142.93.65.9 not allowed because not listed in AllowUsers
Jan  1 19:32:58 host sshd[7031]: input_userauth_request: invalid user root [preauth]
Jan  1 19:32:58 host unix_chkpwd[7034]: password check failed for user (root)
Jan  1 19:32:58 host sshd[7031]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.65.9  user=root
Jan  1 19:32:58 host sshd[7031]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 19:33:00 host sshd[7031]: Failed password for invalid user root from 142.93.65.9 port 40834 ssh2
Jan  1 19:33:00 host sshd[7031]: Received disconnect from 142.93.65.9 port 40834:11: Bye Bye [preauth]
Jan  1 19:33:00 host sshd[7031]: Disconnected from 142.93.65.9 port 40834 [preauth]
Jan  1 19:34:46 host sshd[7214]: User root from 68.183.86.86 not allowed because not listed in AllowUsers
Jan  1 19:34:46 host sshd[7214]: input_userauth_request: invalid user root [preauth]
Jan  1 19:34:46 host unix_chkpwd[7216]: password check failed for user (root)
Jan  1 19:34:46 host sshd[7214]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.86.86  user=root
Jan  1 19:34:46 host sshd[7214]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 19:34:49 host sshd[7214]: Failed password for invalid user root from 68.183.86.86 port 33988 ssh2
Jan  1 19:34:49 host sshd[7214]: Received disconnect from 68.183.86.86 port 33988:11: Bye Bye [preauth]
Jan  1 19:34:49 host sshd[7214]: Disconnected from 68.183.86.86 port 33988 [preauth]
Jan  1 19:34:59 host sshd[7238]: User root from 192.241.210.224 not allowed because not listed in AllowUsers
Jan  1 19:34:59 host sshd[7238]: input_userauth_request: invalid user root [preauth]
Jan  1 19:34:59 host unix_chkpwd[7242]: password check failed for user (root)
Jan  1 19:34:59 host sshd[7238]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.210.224  user=root
Jan  1 19:34:59 host sshd[7238]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 19:35:01 host sshd[7238]: Failed password for invalid user root from 192.241.210.224 port 46526 ssh2
Jan  1 19:35:01 host sshd[7238]: Received disconnect from 192.241.210.224 port 46526:11: Bye Bye [preauth]
Jan  1 19:35:01 host sshd[7238]: Disconnected from 192.241.210.224 port 46526 [preauth]
Jan  1 19:35:39 host sshd[7450]: User root from 51.195.91.241 not allowed because not listed in AllowUsers
Jan  1 19:35:39 host sshd[7450]: input_userauth_request: invalid user root [preauth]
Jan  1 19:35:39 host unix_chkpwd[7453]: password check failed for user (root)
Jan  1 19:35:39 host sshd[7450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.195.91.241  user=root
Jan  1 19:35:39 host sshd[7450]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 19:35:42 host sshd[7450]: Failed password for invalid user root from 51.195.91.241 port 49012 ssh2
Jan  1 19:35:42 host sshd[7450]: Received disconnect from 51.195.91.241 port 49012:11: Bye Bye [preauth]
Jan  1 19:35:42 host sshd[7450]: Disconnected from 51.195.91.241 port 49012 [preauth]
Jan  1 19:36:07 host sshd[7508]: Invalid user tester from 189.1.156.251 port 40076
Jan  1 19:36:07 host sshd[7508]: input_userauth_request: invalid user tester [preauth]
Jan  1 19:36:07 host sshd[7508]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 19:36:07 host sshd[7508]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.1.156.251
Jan  1 19:36:09 host sshd[7508]: Failed password for invalid user tester from 189.1.156.251 port 40076 ssh2
Jan  1 19:36:09 host sshd[7508]: Received disconnect from 189.1.156.251 port 40076:11: Bye Bye [preauth]
Jan  1 19:36:09 host sshd[7508]: Disconnected from 189.1.156.251 port 40076 [preauth]
Jan  1 19:36:30 host sshd[7561]: User root from 197.5.145.30 not allowed because not listed in AllowUsers
Jan  1 19:36:30 host sshd[7561]: input_userauth_request: invalid user root [preauth]
Jan  1 19:36:30 host unix_chkpwd[7565]: password check failed for user (root)
Jan  1 19:36:30 host sshd[7561]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.5.145.30  user=root
Jan  1 19:36:30 host sshd[7561]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 19:36:32 host sshd[7561]: Failed password for invalid user root from 197.5.145.30 port 25441 ssh2
Jan  1 19:36:32 host sshd[7561]: Received disconnect from 197.5.145.30 port 25441:11: Bye Bye [preauth]
Jan  1 19:36:32 host sshd[7561]: Disconnected from 197.5.145.30 port 25441 [preauth]
Jan  1 19:36:39 host sshd[7574]: User root from 84.53.228.192 not allowed because not listed in AllowUsers
Jan  1 19:36:39 host sshd[7574]: input_userauth_request: invalid user root [preauth]
Jan  1 19:36:39 host unix_chkpwd[7577]: password check failed for user (root)
Jan  1 19:36:39 host sshd[7574]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.53.228.192  user=root
Jan  1 19:36:39 host sshd[7574]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 19:36:41 host sshd[7574]: Failed password for invalid user root from 84.53.228.192 port 38786 ssh2
Jan  1 19:36:41 host sshd[7574]: Received disconnect from 84.53.228.192 port 38786:11: Bye Bye [preauth]
Jan  1 19:36:41 host sshd[7574]: Disconnected from 84.53.228.192 port 38786 [preauth]
Jan  1 19:36:54 host sshd[7639]: User root from 68.183.238.182 not allowed because not listed in AllowUsers
Jan  1 19:36:54 host sshd[7639]: input_userauth_request: invalid user root [preauth]
Jan  1 19:36:54 host unix_chkpwd[7641]: password check failed for user (root)
Jan  1 19:36:54 host sshd[7639]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.238.182  user=root
Jan  1 19:36:54 host sshd[7639]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 19:36:56 host sshd[7639]: Failed password for invalid user root from 68.183.238.182 port 59234 ssh2
Jan  1 19:36:56 host sshd[7639]: Received disconnect from 68.183.238.182 port 59234:11: Bye Bye [preauth]
Jan  1 19:36:56 host sshd[7639]: Disconnected from 68.183.238.182 port 59234 [preauth]
Jan  1 19:37:09 host sshd[7703]: User root from 27.124.43.132 not allowed because not listed in AllowUsers
Jan  1 19:37:09 host sshd[7703]: input_userauth_request: invalid user root [preauth]
Jan  1 19:37:09 host unix_chkpwd[7705]: password check failed for user (root)
Jan  1 19:37:09 host sshd[7703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.124.43.132  user=root
Jan  1 19:37:09 host sshd[7703]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 19:37:11 host sshd[7703]: Failed password for invalid user root from 27.124.43.132 port 45204 ssh2
Jan  1 19:37:11 host sshd[7703]: Received disconnect from 27.124.43.132 port 45204:11: Bye Bye [preauth]
Jan  1 19:37:11 host sshd[7703]: Disconnected from 27.124.43.132 port 45204 [preauth]
Jan  1 19:37:14 host sshd[7711]: User root from 51.195.91.241 not allowed because not listed in AllowUsers
Jan  1 19:37:14 host sshd[7711]: input_userauth_request: invalid user root [preauth]
Jan  1 19:37:14 host unix_chkpwd[7714]: password check failed for user (root)
Jan  1 19:37:14 host sshd[7711]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.195.91.241  user=root
Jan  1 19:37:14 host sshd[7711]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 19:37:16 host sshd[7715]: Invalid user usrsosgi from 192.241.210.224 port 48088
Jan  1 19:37:16 host sshd[7715]: input_userauth_request: invalid user usrsosgi [preauth]
Jan  1 19:37:16 host sshd[7715]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 19:37:16 host sshd[7715]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.210.224
Jan  1 19:37:16 host sshd[7711]: Failed password for invalid user root from 51.195.91.241 port 51584 ssh2
Jan  1 19:37:16 host sshd[7711]: Received disconnect from 51.195.91.241 port 51584:11: Bye Bye [preauth]
Jan  1 19:37:16 host sshd[7711]: Disconnected from 51.195.91.241 port 51584 [preauth]
Jan  1 19:37:18 host sshd[7715]: Failed password for invalid user usrsosgi from 192.241.210.224 port 48088 ssh2
Jan  1 19:37:19 host sshd[7715]: Received disconnect from 192.241.210.224 port 48088:11: Bye Bye [preauth]
Jan  1 19:37:19 host sshd[7715]: Disconnected from 192.241.210.224 port 48088 [preauth]
Jan  1 19:38:04 host sshd[7860]: User root from 142.93.65.9 not allowed because not listed in AllowUsers
Jan  1 19:38:04 host sshd[7860]: input_userauth_request: invalid user root [preauth]
Jan  1 19:38:04 host unix_chkpwd[7863]: password check failed for user (root)
Jan  1 19:38:04 host sshd[7860]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.65.9  user=root
Jan  1 19:38:04 host sshd[7860]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 19:38:07 host sshd[7860]: Failed password for invalid user root from 142.93.65.9 port 59906 ssh2
Jan  1 19:38:07 host sshd[7860]: Received disconnect from 142.93.65.9 port 59906:11: Bye Bye [preauth]
Jan  1 19:38:07 host sshd[7860]: Disconnected from 142.93.65.9 port 59906 [preauth]
Jan  1 19:38:08 host sshd[7886]: User root from 68.183.86.86 not allowed because not listed in AllowUsers
Jan  1 19:38:08 host sshd[7886]: input_userauth_request: invalid user root [preauth]
Jan  1 19:38:08 host unix_chkpwd[7888]: password check failed for user (root)
Jan  1 19:38:08 host sshd[7886]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.86.86  user=root
Jan  1 19:38:08 host sshd[7886]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 19:38:10 host sshd[7886]: Failed password for invalid user root from 68.183.86.86 port 35730 ssh2
Jan  1 19:38:10 host sshd[7886]: Received disconnect from 68.183.86.86 port 35730:11: Bye Bye [preauth]
Jan  1 19:38:10 host sshd[7886]: Disconnected from 68.183.86.86 port 35730 [preauth]
Jan  1 19:38:23 host sshd[7942]: Invalid user ubuntu from 197.5.145.30 port 25442
Jan  1 19:38:23 host sshd[7942]: input_userauth_request: invalid user ubuntu [preauth]
Jan  1 19:38:23 host sshd[7942]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 19:38:23 host sshd[7942]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.5.145.30
Jan  1 19:38:25 host sshd[7942]: Failed password for invalid user ubuntu from 197.5.145.30 port 25442 ssh2
Jan  1 19:38:25 host sshd[7942]: Received disconnect from 197.5.145.30 port 25442:11: Bye Bye [preauth]
Jan  1 19:38:25 host sshd[7942]: Disconnected from 197.5.145.30 port 25442 [preauth]
Jan  1 19:38:29 host sshd[7981]: User root from 189.1.156.251 not allowed because not listed in AllowUsers
Jan  1 19:38:29 host sshd[7981]: input_userauth_request: invalid user root [preauth]
Jan  1 19:38:29 host unix_chkpwd[8009]: password check failed for user (root)
Jan  1 19:38:29 host sshd[7981]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.1.156.251  user=root
Jan  1 19:38:29 host sshd[7981]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 19:38:31 host sshd[7981]: Failed password for invalid user root from 189.1.156.251 port 41754 ssh2
Jan  1 19:38:32 host sshd[7981]: Received disconnect from 189.1.156.251 port 41754:11: Bye Bye [preauth]
Jan  1 19:38:32 host sshd[7981]: Disconnected from 189.1.156.251 port 41754 [preauth]
Jan  1 19:39:31 host sshd[8146]: User root from 27.124.43.132 not allowed because not listed in AllowUsers
Jan  1 19:39:31 host sshd[8146]: input_userauth_request: invalid user root [preauth]
Jan  1 19:39:31 host unix_chkpwd[8149]: password check failed for user (root)
Jan  1 19:39:31 host sshd[8146]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.124.43.132  user=root
Jan  1 19:39:31 host sshd[8146]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 19:39:33 host sshd[8146]: Failed password for invalid user root from 27.124.43.132 port 48122 ssh2
Jan  1 19:53:52 host sshd[10347]: Connection closed by 167.94.145.58 port 34474 [preauth]
Jan  1 19:56:42 host sshd[10680]: User centos from 41.197.31.178 not allowed because not listed in AllowUsers
Jan  1 19:56:42 host sshd[10680]: input_userauth_request: invalid user centos [preauth]
Jan  1 19:56:43 host unix_chkpwd[10683]: password check failed for user (centos)
Jan  1 19:56:43 host sshd[10680]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178  user=centos
Jan  1 19:56:45 host sshd[10680]: Failed password for invalid user centos from 41.197.31.178 port 59996 ssh2
Jan  1 19:56:45 host sshd[10680]: Connection closed by 41.197.31.178 port 59996 [preauth]
Jan  1 20:00:50 host sshd[11266]: Invalid user admin from 218.161.20.193 port 52234
Jan  1 20:00:50 host sshd[11266]: input_userauth_request: invalid user admin [preauth]
Jan  1 20:00:50 host sshd[11266]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 20:00:50 host sshd[11266]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.161.20.193
Jan  1 20:00:52 host sshd[11266]: Failed password for invalid user admin from 218.161.20.193 port 52234 ssh2
Jan  1 20:00:53 host sshd[11266]: Connection closed by 218.161.20.193 port 52234 [preauth]
Jan  1 20:10:30 host sshd[12616]: User root from 162.218.126.136 not allowed because not listed in AllowUsers
Jan  1 20:10:30 host sshd[12616]: input_userauth_request: invalid user root [preauth]
Jan  1 20:10:31 host unix_chkpwd[12619]: password check failed for user (root)
Jan  1 20:10:31 host sshd[12616]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136  user=root
Jan  1 20:10:31 host sshd[12616]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 20:10:33 host sshd[12616]: Failed password for invalid user root from 162.218.126.136 port 37128 ssh2
Jan  1 20:10:33 host sshd[12616]: Connection closed by 162.218.126.136 port 37128 [preauth]
Jan  1 20:17:20 host sshd[13494]: User root from 141.98.11.66 not allowed because not listed in AllowUsers
Jan  1 20:17:20 host sshd[13494]: input_userauth_request: invalid user root [preauth]
Jan  1 20:17:20 host unix_chkpwd[13499]: password check failed for user (root)
Jan  1 20:17:20 host sshd[13494]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.11.66  user=root
Jan  1 20:17:20 host sshd[13494]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 20:17:22 host sshd[13494]: Failed password for invalid user root from 141.98.11.66 port 37698 ssh2
Jan  1 20:17:22 host sshd[13494]: Received disconnect from 141.98.11.66 port 37698:11: Normal Shutdown, Thank you for playing [preauth]
Jan  1 20:17:22 host sshd[13494]: Disconnected from 141.98.11.66 port 37698 [preauth]
Jan  1 20:18:56 host sshd[13694]: Invalid user zl from 106.10.122.53 port 43376
Jan  1 20:18:56 host sshd[13694]: input_userauth_request: invalid user zl [preauth]
Jan  1 20:18:56 host sshd[13694]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 20:18:56 host sshd[13694]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53
Jan  1 20:18:58 host sshd[13694]: Failed password for invalid user zl from 106.10.122.53 port 43376 ssh2
Jan  1 20:18:58 host sshd[13694]: Connection closed by 106.10.122.53 port 43376 [preauth]
Jan  1 20:20:09 host sshd[13942]: User root from 92.46.108.20 not allowed because not listed in AllowUsers
Jan  1 20:20:09 host sshd[13942]: input_userauth_request: invalid user root [preauth]
Jan  1 20:20:10 host unix_chkpwd[13947]: password check failed for user (root)
Jan  1 20:20:10 host sshd[13942]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20  user=root
Jan  1 20:20:10 host sshd[13942]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 20:20:12 host sshd[13942]: Failed password for invalid user root from 92.46.108.20 port 53984 ssh2
Jan  1 20:20:13 host sshd[13942]: Connection closed by 92.46.108.20 port 53984 [preauth]
Jan  1 20:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  1 20:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 20:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 20:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  1 20:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 20:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 20:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  1 20:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 20:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 20:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  1 20:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 20:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 20:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  1 20:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 20:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 20:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  1 20:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 20:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 20:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  1 20:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 20:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 20:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  1 20:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 20:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 20:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  1 20:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 20:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 20:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  1 20:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 20:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 20:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  1 20:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 20:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 20:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  1 20:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 20:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 20:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  1 20:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 20:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 20:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwnexidigital user-2=mrsclean user-3=gifterman user-4=palco123 user-5=phmetals user-6=kottayamcalldriv user-7=wwwletsstalkfood user-8=straightcurve user-9=bonifacegroup user-10=wwwevmhonda user-11=pmcresources user-12=vfmassets user-13=wwwtestugo user-14=shalinijames user-15=woodpeck user-16=wwwkapin user-17=disposeat user-18=wwwkmaorg user-19=remysagr user-20=wwwrmswll user-21=keralaholi user-22=wwwresourcehunte user-23=ugotscom user-24=travelboniface user-25=wwwpmcresource user-26=laundryboniface user-27=dartsimp user-28=a2zgroup user-29=cochintaxi user-30=wwwkaretakers feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  1 20:21:51 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  1 20:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 20:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 20:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  1 20:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 20:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 20:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-0fxwc1YMfviKUtyY.~
Jan  1 20:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 20:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 20:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-0fxwc1YMfviKUtyY.~'
Jan  1 20:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 20:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 20:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-0fxwc1YMfviKUtyY.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  1 20:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 20:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 20:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  1 20:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 20:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 20:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  1 20:21:52 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  1 20:21:52 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  1 20:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  1 20:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 20:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 20:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  1 20:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 20:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 20:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  1 20:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 20:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 20:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  1 20:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 20:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 20:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  1 20:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 20:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 20:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  1 20:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  1 20:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  1 20:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  1 20:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  1 20:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  1 20:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  1 20:21:57 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  1 20:21:59 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  1 20:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  1 20:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  1 20:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  1 20:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  1 20:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  1 20:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  1 20:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  1 20:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  1 20:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  1 20:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  1 20:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  1 20:22:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  1 20:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  1 20:22:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  1 20:22:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  1 20:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  1 20:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  1 20:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  1 20:22:12 host sshd[14368]: Invalid user user from 103.13.40.2 port 35526
Jan  1 20:22:12 host sshd[14368]: input_userauth_request: invalid user user [preauth]
Jan  1 20:22:12 host sshd[14368]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 20:22:12 host sshd[14368]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2
Jan  1 20:22:14 host sshd[14368]: Failed password for invalid user user from 103.13.40.2 port 35526 ssh2
Jan  1 20:22:14 host sshd[14368]: Connection closed by 103.13.40.2 port 35526 [preauth]
Jan  1 20:24:10 host sshd[14686]: User root from 141.98.11.66 not allowed because not listed in AllowUsers
Jan  1 20:24:10 host sshd[14686]: input_userauth_request: invalid user root [preauth]
Jan  1 20:24:11 host unix_chkpwd[14690]: password check failed for user (root)
Jan  1 20:24:11 host sshd[14686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.11.66  user=root
Jan  1 20:24:11 host sshd[14686]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 20:24:13 host sshd[14686]: Failed password for invalid user root from 141.98.11.66 port 52998 ssh2
Jan  1 20:24:13 host sshd[14686]: Received disconnect from 141.98.11.66 port 52998:11: Normal Shutdown, Thank you for playing [preauth]
Jan  1 20:24:13 host sshd[14686]: Disconnected from 141.98.11.66 port 52998 [preauth]
Jan  1 20:55:09 host sshd[18722]: Did not receive identification string from 64.227.181.236 port 61000
Jan  1 21:15:15 host sshd[21641]: Invalid user server from 162.218.126.136 port 40220
Jan  1 21:15:15 host sshd[21641]: input_userauth_request: invalid user server [preauth]
Jan  1 21:15:15 host sshd[21641]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 21:15:15 host sshd[21641]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136
Jan  1 21:15:17 host sshd[21641]: Failed password for invalid user server from 162.218.126.136 port 40220 ssh2
Jan  1 21:15:18 host sshd[21641]: Connection closed by 162.218.126.136 port 40220 [preauth]
Jan  1 21:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  1 21:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 21:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 21:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  1 21:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 21:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 21:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  1 21:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 21:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 21:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  1 21:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 21:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 21:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  1 21:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 21:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 21:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  1 21:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 21:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 21:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  1 21:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 21:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 21:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  1 21:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 21:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 21:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  1 21:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 21:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 21:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  1 21:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 21:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 21:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  1 21:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 21:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 21:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  1 21:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 21:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 21:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  1 21:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 21:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 21:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=mrsclean user-2=wwwnexidigital user-3=gifterman user-4=palco123 user-5=phmetals user-6=kottayamcalldriv user-7=wwwletsstalkfood user-8=straightcurve user-9=bonifacegroup user-10=wwwevmhonda user-11=pmcresources user-12=vfmassets user-13=wwwtestugo user-14=shalinijames user-15=wwwkapin user-16=woodpeck user-17=disposeat user-18=wwwkmaorg user-19=remysagr user-20=wwwrmswll user-21=keralaholi user-22=wwwresourcehunte user-23=ugotscom user-24=travelboniface user-25=wwwpmcresource user-26=laundryboniface user-27=dartsimp user-28=a2zgroup user-29=wwwkaretakers user-30=cochintaxi feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  1 21:21:51 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  1 21:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 21:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 21:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  1 21:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 21:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 21:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-nw3DeG6iUYcfUZMG.~
Jan  1 21:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 21:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 21:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-nw3DeG6iUYcfUZMG.~'
Jan  1 21:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 21:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 21:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-nw3DeG6iUYcfUZMG.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  1 21:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 21:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 21:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  1 21:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 21:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 21:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  1 21:21:52 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  1 21:21:52 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  1 21:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  1 21:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 21:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 21:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  1 21:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 21:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 21:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  1 21:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 21:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 21:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  1 21:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 21:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 21:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  1 21:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 21:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 21:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  1 21:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  1 21:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  1 21:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  1 21:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  1 21:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  1 21:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  1 21:21:56 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  1 21:21:58 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  1 21:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  1 21:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  1 21:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  1 21:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  1 21:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  1 21:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  1 21:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  1 21:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  1 21:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  1 21:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  1 21:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  1 21:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  1 21:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  1 21:22:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  1 21:22:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  1 21:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  1 21:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  1 21:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  1 21:29:11 host sshd[23636]: User root from 91.249.196.10 not allowed because not listed in AllowUsers
Jan  1 21:29:11 host sshd[23636]: input_userauth_request: invalid user root [preauth]
Jan  1 21:29:11 host unix_chkpwd[23639]: password check failed for user (root)
Jan  1 21:29:11 host sshd[23636]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.249.196.10  user=root
Jan  1 21:29:11 host sshd[23636]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 21:29:13 host sshd[23636]: Failed password for invalid user root from 91.249.196.10 port 59535 ssh2
Jan  1 21:29:13 host sshd[23636]: Received disconnect from 91.249.196.10 port 59535:11: Bye Bye [preauth]
Jan  1 21:29:13 host sshd[23636]: Disconnected from 91.249.196.10 port 59535 [preauth]
Jan  1 21:30:50 host sshd[23832]: User root from 65.108.245.102 not allowed because not listed in AllowUsers
Jan  1 21:30:50 host sshd[23832]: input_userauth_request: invalid user root [preauth]
Jan  1 21:30:50 host unix_chkpwd[23834]: password check failed for user (root)
Jan  1 21:30:50 host sshd[23832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.108.245.102  user=root
Jan  1 21:30:50 host sshd[23832]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 21:30:51 host sshd[23832]: Failed password for invalid user root from 65.108.245.102 port 59240 ssh2
Jan  1 21:30:52 host sshd[23832]: Received disconnect from 65.108.245.102 port 59240:11: Bye Bye [preauth]
Jan  1 21:30:52 host sshd[23832]: Disconnected from 65.108.245.102 port 59240 [preauth]
Jan  1 21:33:30 host sshd[24213]: User root from 91.249.196.10 not allowed because not listed in AllowUsers
Jan  1 21:33:30 host sshd[24213]: input_userauth_request: invalid user root [preauth]
Jan  1 21:33:30 host unix_chkpwd[24216]: password check failed for user (root)
Jan  1 21:33:30 host sshd[24213]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.249.196.10  user=root
Jan  1 21:33:30 host sshd[24213]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 21:33:32 host sshd[24213]: Failed password for invalid user root from 91.249.196.10 port 34112 ssh2
Jan  1 21:34:03 host sshd[24290]: User root from 143.198.53.58 not allowed because not listed in AllowUsers
Jan  1 21:34:03 host sshd[24290]: input_userauth_request: invalid user root [preauth]
Jan  1 21:34:03 host unix_chkpwd[24294]: password check failed for user (root)
Jan  1 21:34:03 host sshd[24290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.53.58  user=root
Jan  1 21:34:03 host sshd[24290]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 21:34:05 host sshd[24290]: Failed password for invalid user root from 143.198.53.58 port 37928 ssh2
Jan  1 21:34:05 host sshd[24290]: Received disconnect from 143.198.53.58 port 37928:11: Bye Bye [preauth]
Jan  1 21:34:05 host sshd[24290]: Disconnected from 143.198.53.58 port 37928 [preauth]
Jan  1 21:34:33 host sshd[24375]: User root from 201.182.72.250 not allowed because not listed in AllowUsers
Jan  1 21:34:33 host sshd[24375]: input_userauth_request: invalid user root [preauth]
Jan  1 21:34:33 host unix_chkpwd[24378]: password check failed for user (root)
Jan  1 21:34:33 host sshd[24375]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.182.72.250  user=root
Jan  1 21:34:33 host sshd[24375]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 21:34:35 host sshd[24375]: Failed password for invalid user root from 201.182.72.250 port 59850 ssh2
Jan  1 21:34:35 host sshd[24375]: Received disconnect from 201.182.72.250 port 59850:11: Bye Bye [preauth]
Jan  1 21:34:35 host sshd[24375]: Disconnected from 201.182.72.250 port 59850 [preauth]
Jan  1 21:35:29 host sshd[24495]: Invalid user smg from 178.62.24.222 port 32920
Jan  1 21:35:29 host sshd[24495]: input_userauth_request: invalid user smg [preauth]
Jan  1 21:35:29 host sshd[24495]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 21:35:29 host sshd[24495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.24.222
Jan  1 21:35:31 host sshd[24499]: User root from 157.245.204.50 not allowed because not listed in AllowUsers
Jan  1 21:35:31 host sshd[24499]: input_userauth_request: invalid user root [preauth]
Jan  1 21:35:31 host unix_chkpwd[24502]: password check failed for user (root)
Jan  1 21:35:31 host sshd[24499]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.204.50  user=root
Jan  1 21:35:31 host sshd[24499]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 21:35:32 host sshd[24495]: Failed password for invalid user smg from 178.62.24.222 port 32920 ssh2
Jan  1 21:35:32 host sshd[24495]: Received disconnect from 178.62.24.222 port 32920:11: Bye Bye [preauth]
Jan  1 21:35:32 host sshd[24495]: Disconnected from 178.62.24.222 port 32920 [preauth]
Jan  1 21:35:34 host sshd[24499]: Failed password for invalid user root from 157.245.204.50 port 53844 ssh2
Jan  1 21:35:34 host sshd[24499]: Received disconnect from 157.245.204.50 port 53844:11: Bye Bye [preauth]
Jan  1 21:35:34 host sshd[24499]: Disconnected from 157.245.204.50 port 53844 [preauth]
Jan  1 21:35:40 host sshd[24512]: User root from 167.99.46.52 not allowed because not listed in AllowUsers
Jan  1 21:35:40 host sshd[24512]: input_userauth_request: invalid user root [preauth]
Jan  1 21:35:40 host unix_chkpwd[24516]: password check failed for user (root)
Jan  1 21:35:40 host sshd[24512]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.46.52  user=root
Jan  1 21:35:40 host sshd[24512]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 21:35:43 host sshd[24512]: Failed password for invalid user root from 167.99.46.52 port 56108 ssh2
Jan  1 21:35:43 host sshd[24512]: Received disconnect from 167.99.46.52 port 56108:11: Bye Bye [preauth]
Jan  1 21:35:43 host sshd[24512]: Disconnected from 167.99.46.52 port 56108 [preauth]
Jan  1 21:36:15 host sshd[24683]: Invalid user hxhttp from 212.93.191.116 port 39454
Jan  1 21:36:15 host sshd[24683]: input_userauth_request: invalid user hxhttp [preauth]
Jan  1 21:36:15 host sshd[24683]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 21:36:15 host sshd[24683]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.93.191.116
Jan  1 21:36:17 host sshd[24683]: Failed password for invalid user hxhttp from 212.93.191.116 port 39454 ssh2
Jan  1 21:36:17 host sshd[24683]: Received disconnect from 212.93.191.116 port 39454:11: Bye Bye [preauth]
Jan  1 21:36:17 host sshd[24683]: Disconnected from 212.93.191.116 port 39454 [preauth]
Jan  1 21:36:24 host sshd[24699]: User root from 103.90.224.173 not allowed because not listed in AllowUsers
Jan  1 21:36:24 host sshd[24699]: input_userauth_request: invalid user root [preauth]
Jan  1 21:36:24 host unix_chkpwd[24701]: password check failed for user (root)
Jan  1 21:36:24 host sshd[24699]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.90.224.173  user=root
Jan  1 21:36:24 host sshd[24699]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 21:36:26 host sshd[24699]: Failed password for invalid user root from 103.90.224.173 port 48432 ssh2
Jan  1 21:36:26 host sshd[24699]: Received disconnect from 103.90.224.173 port 48432:11: Bye Bye [preauth]
Jan  1 21:36:26 host sshd[24699]: Disconnected from 103.90.224.173 port 48432 [preauth]
Jan  1 21:37:09 host sshd[24783]: User root from 65.108.245.102 not allowed because not listed in AllowUsers
Jan  1 21:37:09 host sshd[24783]: input_userauth_request: invalid user root [preauth]
Jan  1 21:37:09 host unix_chkpwd[24786]: password check failed for user (root)
Jan  1 21:37:09 host sshd[24783]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.108.245.102  user=root
Jan  1 21:37:09 host sshd[24783]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 21:37:10 host sshd[24783]: Failed password for invalid user root from 65.108.245.102 port 56994 ssh2
Jan  1 21:37:10 host sshd[24783]: Received disconnect from 65.108.245.102 port 56994:11: Bye Bye [preauth]
Jan  1 21:37:10 host sshd[24783]: Disconnected from 65.108.245.102 port 56994 [preauth]
Jan  1 21:37:11 host sshd[24788]: Invalid user freddy from 211.197.205.91 port 48800
Jan  1 21:37:11 host sshd[24788]: input_userauth_request: invalid user freddy [preauth]
Jan  1 21:37:11 host sshd[24788]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 21:37:11 host sshd[24788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.197.205.91
Jan  1 21:37:14 host sshd[24788]: Failed password for invalid user freddy from 211.197.205.91 port 48800 ssh2
Jan  1 21:37:14 host sshd[24788]: Received disconnect from 211.197.205.91 port 48800:11: Bye Bye [preauth]
Jan  1 21:37:14 host sshd[24788]: Disconnected from 211.197.205.91 port 48800 [preauth]
Jan  1 21:37:23 host sshd[24832]: Invalid user nginx from 162.19.66.82 port 41914
Jan  1 21:37:23 host sshd[24832]: input_userauth_request: invalid user nginx [preauth]
Jan  1 21:37:23 host sshd[24832]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 21:37:23 host sshd[24832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.19.66.82
Jan  1 21:37:25 host sshd[24832]: Failed password for invalid user nginx from 162.19.66.82 port 41914 ssh2
Jan  1 21:37:26 host sshd[24832]: Received disconnect from 162.19.66.82 port 41914:11: Bye Bye [preauth]
Jan  1 21:37:26 host sshd[24832]: Disconnected from 162.19.66.82 port 41914 [preauth]
Jan  1 21:37:48 host sshd[24875]: User root from 178.62.24.222 not allowed because not listed in AllowUsers
Jan  1 21:37:48 host sshd[24875]: input_userauth_request: invalid user root [preauth]
Jan  1 21:37:48 host unix_chkpwd[24878]: password check failed for user (root)
Jan  1 21:37:48 host sshd[24875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.24.222  user=root
Jan  1 21:37:48 host sshd[24875]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 21:37:50 host sshd[24875]: Failed password for invalid user root from 178.62.24.222 port 36628 ssh2
Jan  1 21:37:50 host sshd[24875]: Received disconnect from 178.62.24.222 port 36628:11: Bye Bye [preauth]
Jan  1 21:37:50 host sshd[24875]: Disconnected from 178.62.24.222 port 36628 [preauth]
Jan  1 21:37:55 host sshd[24921]: Did not receive identification string from 103.215.127.5 port 34612
Jan  1 21:37:56 host sshd[24923]: User root from 103.215.127.5 not allowed because not listed in AllowUsers
Jan  1 21:37:56 host sshd[24923]: input_userauth_request: invalid user root [preauth]
Jan  1 21:37:56 host unix_chkpwd[24927]: password check failed for user (root)
Jan  1 21:37:56 host sshd[24923]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.215.127.5  user=root
Jan  1 21:37:56 host sshd[24923]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 21:37:57 host sshd[24923]: Failed password for invalid user root from 103.215.127.5 port 34618 ssh2
Jan  1 21:37:57 host sshd[24923]: Connection closed by 103.215.127.5 port 34618 [preauth]
Jan  1 21:37:58 host sshd[24925]: User root from 201.42.216.109 not allowed because not listed in AllowUsers
Jan  1 21:37:58 host sshd[24925]: input_userauth_request: invalid user root [preauth]
Jan  1 21:37:58 host unix_chkpwd[24930]: password check failed for user (root)
Jan  1 21:37:58 host sshd[24925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.42.216.109  user=root
Jan  1 21:37:58 host sshd[24925]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 21:38:00 host sshd[24925]: Failed password for invalid user root from 201.42.216.109 port 45088 ssh2
Jan  1 21:38:00 host sshd[24925]: Received disconnect from 201.42.216.109 port 45088:11: Bye Bye [preauth]
Jan  1 21:38:00 host sshd[24925]: Disconnected from 201.42.216.109 port 45088 [preauth]
Jan  1 21:38:15 host sshd[24954]: User root from 188.166.247.82 not allowed because not listed in AllowUsers
Jan  1 21:38:15 host sshd[24954]: input_userauth_request: invalid user root [preauth]
Jan  1 21:38:15 host unix_chkpwd[24957]: password check failed for user (root)
Jan  1 21:38:15 host sshd[24954]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.247.82  user=root
Jan  1 21:38:15 host sshd[24954]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 21:38:16 host sshd[24954]: Failed password for invalid user root from 188.166.247.82 port 49142 ssh2
Jan  1 21:38:16 host sshd[24954]: Received disconnect from 188.166.247.82 port 49142:11: Bye Bye [preauth]
Jan  1 21:38:16 host sshd[24954]: Disconnected from 188.166.247.82 port 49142 [preauth]
Jan  1 21:38:31 host sshd[24994]: User root from 157.245.204.50 not allowed because not listed in AllowUsers
Jan  1 21:38:31 host sshd[24994]: input_userauth_request: invalid user root [preauth]
Jan  1 21:38:31 host unix_chkpwd[24996]: password check failed for user (root)
Jan  1 21:38:31 host sshd[24994]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.204.50  user=root
Jan  1 21:38:31 host sshd[24994]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 21:38:34 host sshd[24994]: Failed password for invalid user root from 157.245.204.50 port 60344 ssh2
Jan  1 21:38:55 host sshd[25065]: Invalid user user from 143.198.53.58 port 52256
Jan  1 21:38:55 host sshd[25065]: input_userauth_request: invalid user user [preauth]
Jan  1 21:38:55 host sshd[25065]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 21:38:55 host sshd[25065]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.53.58
Jan  1 21:38:57 host sshd[25065]: Failed password for invalid user user from 143.198.53.58 port 52256 ssh2
Jan  1 21:38:57 host sshd[25065]: Received disconnect from 143.198.53.58 port 52256:11: Bye Bye [preauth]
Jan  1 21:38:57 host sshd[25065]: Disconnected from 143.198.53.58 port 52256 [preauth]
Jan  1 21:39:08 host sshd[25128]: Invalid user ubuntu from 211.197.205.91 port 43346
Jan  1 21:39:08 host sshd[25128]: input_userauth_request: invalid user ubuntu [preauth]
Jan  1 21:39:08 host sshd[25128]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 21:39:08 host sshd[25128]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.197.205.91
Jan  1 21:39:10 host sshd[25128]: Failed password for invalid user ubuntu from 211.197.205.91 port 43346 ssh2
Jan  1 21:39:10 host sshd[25128]: Received disconnect from 211.197.205.91 port 43346:11: Bye Bye [preauth]
Jan  1 21:39:10 host sshd[25128]: Disconnected from 211.197.205.91 port 43346 [preauth]
Jan  1 21:40:16 host sshd[25252]: User root from 212.93.191.116 not allowed because not listed in AllowUsers
Jan  1 21:40:16 host sshd[25252]: input_userauth_request: invalid user root [preauth]
Jan  1 21:40:16 host unix_chkpwd[25255]: password check failed for user (root)
Jan  1 21:40:16 host sshd[25252]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.93.191.116  user=root
Jan  1 21:40:16 host sshd[25252]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 21:40:18 host sshd[25252]: Failed password for invalid user root from 212.93.191.116 port 57914 ssh2
Jan  1 21:40:19 host sshd[25252]: Received disconnect from 212.93.191.116 port 57914:11: Bye Bye [preauth]
Jan  1 21:40:19 host sshd[25252]: Disconnected from 212.93.191.116 port 57914 [preauth]
Jan  1 21:40:28 host sshd[25317]: User root from 211.197.205.91 not allowed because not listed in AllowUsers
Jan  1 21:40:28 host sshd[25317]: input_userauth_request: invalid user root [preauth]
Jan  1 21:40:28 host unix_chkpwd[25320]: password check failed for user (root)
Jan  1 21:40:28 host sshd[25317]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.197.205.91  user=root
Jan  1 21:40:28 host sshd[25317]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 21:40:30 host sshd[25317]: Failed password for invalid user root from 211.197.205.91 port 56822 ssh2
Jan  1 21:40:30 host sshd[25317]: Received disconnect from 211.197.205.91 port 56822:11: Bye Bye [preauth]
Jan  1 21:40:30 host sshd[25317]: Disconnected from 211.197.205.91 port 56822 [preauth]
Jan  1 21:40:33 host sshd[25345]: User root from 162.19.66.82 not allowed because not listed in AllowUsers
Jan  1 21:40:33 host sshd[25345]: input_userauth_request: invalid user root [preauth]
Jan  1 21:40:33 host unix_chkpwd[25360]: password check failed for user (root)
Jan  1 21:40:33 host sshd[25345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.19.66.82  user=root
Jan  1 21:40:33 host sshd[25345]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 21:40:35 host sshd[25345]: Failed password for invalid user root from 162.19.66.82 port 47348 ssh2
Jan  1 21:40:36 host sshd[25345]: Received disconnect from 162.19.66.82 port 47348:11: Bye Bye [preauth]
Jan  1 21:40:36 host sshd[25345]: Disconnected from 162.19.66.82 port 47348 [preauth]
Jan  1 21:41:06 host sshd[25534]: Invalid user ubuntu from 167.99.46.52 port 56314
Jan  1 21:41:06 host sshd[25534]: input_userauth_request: invalid user ubuntu [preauth]
Jan  1 21:41:06 host sshd[25534]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 21:41:06 host sshd[25534]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.46.52
Jan  1 21:41:07 host sshd[25534]: Failed password for invalid user ubuntu from 167.99.46.52 port 56314 ssh2
Jan  1 21:41:07 host sshd[25534]: Received disconnect from 167.99.46.52 port 56314:11: Bye Bye [preauth]
Jan  1 21:41:07 host sshd[25534]: Disconnected from 167.99.46.52 port 56314 [preauth]
Jan  1 21:41:14 host sshd[25623]: Invalid user user1 from 106.10.122.53 port 51078
Jan  1 21:41:14 host sshd[25623]: input_userauth_request: invalid user user1 [preauth]
Jan  1 21:41:14 host sshd[25623]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 21:41:14 host sshd[25623]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53
Jan  1 21:41:16 host sshd[25623]: Failed password for invalid user user1 from 106.10.122.53 port 51078 ssh2
Jan  1 21:41:16 host sshd[25623]: Connection closed by 106.10.122.53 port 51078 [preauth]
Jan  1 21:41:35 host sshd[25671]: User root from 201.42.216.109 not allowed because not listed in AllowUsers
Jan  1 21:41:35 host sshd[25671]: input_userauth_request: invalid user root [preauth]
Jan  1 21:41:35 host unix_chkpwd[25674]: password check failed for user (root)
Jan  1 21:41:35 host sshd[25671]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.42.216.109  user=root
Jan  1 21:41:35 host sshd[25671]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 21:41:37 host sshd[25671]: Failed password for invalid user root from 201.42.216.109 port 60867 ssh2
Jan  1 21:41:47 host sshd[25727]: User root from 103.90.224.173 not allowed because not listed in AllowUsers
Jan  1 21:41:47 host sshd[25727]: input_userauth_request: invalid user root [preauth]
Jan  1 21:41:47 host unix_chkpwd[25730]: password check failed for user (root)
Jan  1 21:41:47 host sshd[25727]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.90.224.173  user=root
Jan  1 21:41:47 host sshd[25727]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 21:41:49 host sshd[25727]: Failed password for invalid user root from 103.90.224.173 port 42962 ssh2
Jan  1 21:41:49 host sshd[25727]: Received disconnect from 103.90.224.173 port 42962:11: Bye Bye [preauth]
Jan  1 21:41:49 host sshd[25727]: Disconnected from 103.90.224.173 port 42962 [preauth]
Jan  1 21:42:34 host sshd[25878]: Invalid user user from 188.166.247.82 port 59850
Jan  1 21:42:34 host sshd[25878]: input_userauth_request: invalid user user [preauth]
Jan  1 21:42:34 host sshd[25878]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 21:42:34 host sshd[25878]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.247.82
Jan  1 21:42:36 host sshd[25878]: Failed password for invalid user user from 188.166.247.82 port 59850 ssh2
Jan  1 21:42:36 host sshd[25878]: Received disconnect from 188.166.247.82 port 59850:11: Bye Bye [preauth]
Jan  1 21:42:36 host sshd[25878]: Disconnected from 188.166.247.82 port 59850 [preauth]
Jan  1 21:42:53 host sshd[25949]: Invalid user wangtao from 103.13.40.2 port 56240
Jan  1 21:42:53 host sshd[25949]: input_userauth_request: invalid user wangtao [preauth]
Jan  1 21:42:53 host sshd[25949]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 21:42:53 host sshd[25949]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2
Jan  1 21:42:55 host sshd[25949]: Failed password for invalid user wangtao from 103.13.40.2 port 56240 ssh2
Jan  1 21:42:55 host sshd[25949]: Connection closed by 103.13.40.2 port 56240 [preauth]
Jan  1 21:43:56 host sshd[26054]: User root from 201.182.72.250 not allowed because not listed in AllowUsers
Jan  1 21:43:56 host sshd[26054]: input_userauth_request: invalid user root [preauth]
Jan  1 21:43:56 host unix_chkpwd[26057]: password check failed for user (root)
Jan  1 21:43:56 host sshd[26054]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.182.72.250  user=root
Jan  1 21:43:56 host sshd[26054]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 21:43:57 host sshd[26054]: Failed password for invalid user root from 201.182.72.250 port 32924 ssh2
Jan  1 22:09:50 host sshd[29473]: Did not receive identification string from 27.71.231.21 port 44152
Jan  1 22:09:51 host sshd[29474]: Invalid user ftpuser from 27.71.231.21 port 44440
Jan  1 22:09:51 host sshd[29474]: input_userauth_request: invalid user ftpuser [preauth]
Jan  1 22:09:51 host sshd[29475]: Invalid user gitlab-runner from 27.71.231.21 port 44232
Jan  1 22:09:51 host sshd[29475]: input_userauth_request: invalid user gitlab-runner [preauth]
Jan  1 22:09:51 host sshd[29476]: Invalid user ansible from 27.71.231.21 port 44242
Jan  1 22:09:51 host sshd[29476]: input_userauth_request: invalid user ansible [preauth]
Jan  1 22:09:51 host sshd[29474]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 22:09:51 host sshd[29474]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  1 22:09:51 host sshd[29475]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 22:09:51 host sshd[29475]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  1 22:09:51 host sshd[29476]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 22:09:51 host sshd[29476]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  1 22:09:52 host sshd[29482]: Invalid user ansadmin from 27.71.231.21 port 44162
Jan  1 22:09:52 host sshd[29482]: input_userauth_request: invalid user ansadmin [preauth]
Jan  1 22:09:52 host sshd[29483]: Invalid user www from 27.71.231.21 port 44406
Jan  1 22:09:52 host sshd[29483]: input_userauth_request: invalid user www [preauth]
Jan  1 22:09:52 host sshd[29484]: Invalid user git from 27.71.231.21 port 44370
Jan  1 22:09:52 host sshd[29484]: input_userauth_request: invalid user git [preauth]
Jan  1 22:09:52 host sshd[29486]: Invalid user guest from 27.71.231.21 port 44348
Jan  1 22:09:52 host sshd[29485]: Invalid user user from 27.71.231.21 port 44256
Jan  1 22:09:52 host sshd[29486]: input_userauth_request: invalid user guest [preauth]
Jan  1 22:09:52 host sshd[29485]: input_userauth_request: invalid user user [preauth]
Jan  1 22:09:52 host sshd[29487]: Invalid user hello from 27.71.231.21 port 44356
Jan  1 22:09:52 host sshd[29487]: input_userauth_request: invalid user hello [preauth]
Jan  1 22:09:52 host sshd[29488]: Invalid user steam from 27.71.231.21 port 44294
Jan  1 22:09:52 host sshd[29488]: input_userauth_request: invalid user steam [preauth]
Jan  1 22:09:52 host sshd[29482]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 22:09:52 host sshd[29482]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  1 22:09:52 host sshd[29483]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 22:09:52 host sshd[29483]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  1 22:09:52 host sshd[29484]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 22:09:52 host sshd[29484]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  1 22:09:52 host sshd[29486]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 22:09:52 host sshd[29486]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  1 22:09:52 host sshd[29485]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 22:09:52 host sshd[29485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  1 22:09:52 host sshd[29487]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 22:09:52 host sshd[29487]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  1 22:09:52 host sshd[29488]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 22:09:52 host sshd[29488]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  1 22:09:53 host sshd[29474]: Failed password for invalid user ftpuser from 27.71.231.21 port 44440 ssh2
Jan  1 22:09:53 host sshd[29475]: Failed password for invalid user gitlab-runner from 27.71.231.21 port 44232 ssh2
Jan  1 22:09:53 host sshd[29476]: Failed password for invalid user ansible from 27.71.231.21 port 44242 ssh2
Jan  1 22:09:53 host sshd[29474]: Connection closed by 27.71.231.21 port 44440 [preauth]
Jan  1 22:09:53 host sshd[29475]: Connection closed by 27.71.231.21 port 44232 [preauth]
Jan  1 22:09:53 host sshd[29476]: Connection closed by 27.71.231.21 port 44242 [preauth]
Jan  1 22:09:54 host sshd[29482]: Failed password for invalid user ansadmin from 27.71.231.21 port 44162 ssh2
Jan  1 22:09:54 host sshd[29483]: Failed password for invalid user www from 27.71.231.21 port 44406 ssh2
Jan  1 22:09:54 host sshd[29486]: Failed password for invalid user guest from 27.71.231.21 port 44348 ssh2
Jan  1 22:09:54 host sshd[29484]: Failed password for invalid user git from 27.71.231.21 port 44370 ssh2
Jan  1 22:09:54 host sshd[29485]: Failed password for invalid user user from 27.71.231.21 port 44256 ssh2
Jan  1 22:09:54 host sshd[29487]: Failed password for invalid user hello from 27.71.231.21 port 44356 ssh2
Jan  1 22:09:54 host sshd[29488]: Failed password for invalid user steam from 27.71.231.21 port 44294 ssh2
Jan  1 22:19:43 host sshd[30730]: User root from 162.218.126.136 not allowed because not listed in AllowUsers
Jan  1 22:19:43 host sshd[30730]: input_userauth_request: invalid user root [preauth]
Jan  1 22:19:44 host unix_chkpwd[30733]: password check failed for user (root)
Jan  1 22:19:44 host sshd[30730]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136  user=root
Jan  1 22:19:44 host sshd[30730]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 22:19:46 host sshd[30730]: Failed password for invalid user root from 162.218.126.136 port 38822 ssh2
Jan  1 22:19:46 host sshd[30730]: Connection closed by 162.218.126.136 port 38822 [preauth]
Jan  1 22:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  1 22:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 22:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 22:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  1 22:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 22:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 22:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  1 22:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 22:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 22:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  1 22:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 22:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 22:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  1 22:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 22:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 22:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  1 22:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 22:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 22:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  1 22:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 22:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 22:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  1 22:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 22:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 22:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  1 22:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 22:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 22:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  1 22:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 22:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 22:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  1 22:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 22:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 22:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  1 22:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 22:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 22:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  1 22:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 22:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 22:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=ugotscom user-3=wwwrmswll user-4=wwwresourcehunte user-5=keralaholi user-6=travelboniface user-7=cochintaxi user-8=wwwkaretakers user-9=laundryboniface user-10=dartsimp user-11=a2zgroup user-12=wwwletsstalkfood user-13=straightcurve user-14=wwwevmhonda user-15=bonifacegroup user-16=mrsclean user-17=wwwnexidigital user-18=kottayamcalldriv user-19=phmetals user-20=gifterman user-21=palco123 user-22=woodpeck user-23=wwwkapin user-24=disposeat user-25=wwwkmaorg user-26=remysagr user-27=pmcresources user-28=wwwtestugo user-29=shalinijames user-30=vfmassets feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  1 22:21:51 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  1 22:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 22:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 22:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  1 22:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 22:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 22:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-NaJjhazOLm8ZGeLI.~
Jan  1 22:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 22:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 22:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-NaJjhazOLm8ZGeLI.~'
Jan  1 22:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 22:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 22:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-NaJjhazOLm8ZGeLI.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  1 22:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 22:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 22:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  1 22:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 22:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 22:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  1 22:21:52 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  1 22:21:52 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  1 22:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  1 22:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 22:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 22:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  1 22:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 22:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 22:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  1 22:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 22:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 22:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  1 22:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 22:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 22:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  1 22:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 22:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 22:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  1 22:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  1 22:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  1 22:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  1 22:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  1 22:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  1 22:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  1 22:21:56 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  1 22:21:58 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  1 22:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  1 22:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  1 22:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  1 22:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  1 22:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  1 22:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  1 22:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  1 22:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  1 22:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  1 22:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  1 22:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  1 22:22:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  1 22:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  1 22:22:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  1 22:22:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  1 22:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  1 22:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  1 22:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  1 22:23:13 host sshd[31472]: Invalid user admin from 220.84.234.193 port 44717
Jan  1 22:23:13 host sshd[31472]: input_userauth_request: invalid user admin [preauth]
Jan  1 22:23:13 host sshd[31472]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 22:23:13 host sshd[31472]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.84.234.193
Jan  1 22:23:15 host sshd[31472]: Failed password for invalid user admin from 220.84.234.193 port 44717 ssh2
Jan  1 22:23:15 host sshd[31472]: Connection closed by 220.84.234.193 port 44717 [preauth]
Jan  1 22:37:48 host sshd[1209]: Invalid user user from 41.197.31.178 port 43764
Jan  1 22:37:48 host sshd[1209]: input_userauth_request: invalid user user [preauth]
Jan  1 22:37:49 host sshd[1209]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 22:37:49 host sshd[1209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178
Jan  1 22:37:50 host sshd[1209]: Failed password for invalid user user from 41.197.31.178 port 43764 ssh2
Jan  1 22:37:50 host sshd[1209]: Connection closed by 41.197.31.178 port 43764 [preauth]
Jan  1 22:42:55 host sshd[2103]: Did not receive identification string from 80.66.77.83 port 65214
Jan  1 22:45:59 host sshd[2570]: Invalid user weblogic from 157.245.109.35 port 42972
Jan  1 22:45:59 host sshd[2570]: input_userauth_request: invalid user weblogic [preauth]
Jan  1 22:45:59 host sshd[2570]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 22:45:59 host sshd[2570]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.109.35
Jan  1 22:46:01 host sshd[2570]: Failed password for invalid user weblogic from 157.245.109.35 port 42972 ssh2
Jan  1 22:46:01 host sshd[2570]: Received disconnect from 157.245.109.35 port 42972:11: Bye Bye [preauth]
Jan  1 22:46:01 host sshd[2570]: Disconnected from 157.245.109.35 port 42972 [preauth]
Jan  1 22:46:03 host sshd[2584]: User root from 213.225.3.103 not allowed because not listed in AllowUsers
Jan  1 22:46:03 host sshd[2584]: input_userauth_request: invalid user root [preauth]
Jan  1 22:46:03 host unix_chkpwd[2587]: password check failed for user (root)
Jan  1 22:46:03 host sshd[2584]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.225.3.103  user=root
Jan  1 22:46:03 host sshd[2584]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 22:46:05 host sshd[2584]: Failed password for invalid user root from 213.225.3.103 port 60648 ssh2
Jan  1 22:46:05 host sshd[2584]: Received disconnect from 213.225.3.103 port 60648:11: Bye Bye [preauth]
Jan  1 22:46:05 host sshd[2584]: Disconnected from 213.225.3.103 port 60648 [preauth]
Jan  1 22:46:14 host sshd[2600]: User root from 59.93.130.122 not allowed because not listed in AllowUsers
Jan  1 22:46:14 host sshd[2600]: input_userauth_request: invalid user root [preauth]
Jan  1 22:46:14 host unix_chkpwd[2602]: password check failed for user (root)
Jan  1 22:46:14 host sshd[2600]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.93.130.122  user=root
Jan  1 22:46:14 host sshd[2600]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 22:46:16 host sshd[2600]: Failed password for invalid user root from 59.93.130.122 port 38350 ssh2
Jan  1 22:46:16 host sshd[2600]: Received disconnect from 59.93.130.122 port 38350:11: Bye Bye [preauth]
Jan  1 22:46:16 host sshd[2600]: Disconnected from 59.93.130.122 port 38350 [preauth]
Jan  1 22:46:25 host sshd[2620]: User root from 211.46.4.196 not allowed because not listed in AllowUsers
Jan  1 22:46:25 host sshd[2620]: input_userauth_request: invalid user root [preauth]
Jan  1 22:46:25 host unix_chkpwd[2622]: password check failed for user (root)
Jan  1 22:46:25 host sshd[2620]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.46.4.196  user=root
Jan  1 22:46:25 host sshd[2620]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 22:46:27 host sshd[2620]: Failed password for invalid user root from 211.46.4.196 port 50414 ssh2
Jan  1 22:46:27 host sshd[2620]: Received disconnect from 211.46.4.196 port 50414:11: Bye Bye [preauth]
Jan  1 22:46:27 host sshd[2620]: Disconnected from 211.46.4.196 port 50414 [preauth]
Jan  1 22:47:12 host sshd[2731]: User root from 164.155.229.181 not allowed because not listed in AllowUsers
Jan  1 22:47:12 host sshd[2731]: input_userauth_request: invalid user root [preauth]
Jan  1 22:47:12 host unix_chkpwd[2734]: password check failed for user (root)
Jan  1 22:47:12 host sshd[2731]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.155.229.181  user=root
Jan  1 22:47:12 host sshd[2731]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 22:47:13 host sshd[2728]: Invalid user postgres from 200.69.141.210 port 53767
Jan  1 22:47:13 host sshd[2728]: input_userauth_request: invalid user postgres [preauth]
Jan  1 22:47:13 host sshd[2728]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 22:47:13 host sshd[2728]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.69.141.210
Jan  1 22:47:15 host sshd[2731]: Failed password for invalid user root from 164.155.229.181 port 39746 ssh2
Jan  1 22:47:15 host sshd[2731]: Received disconnect from 164.155.229.181 port 39746:11: Bye Bye [preauth]
Jan  1 22:47:15 host sshd[2731]: Disconnected from 164.155.229.181 port 39746 [preauth]
Jan  1 22:47:15 host sshd[2728]: Failed password for invalid user postgres from 200.69.141.210 port 53767 ssh2
Jan  1 22:47:15 host sshd[2728]: Received disconnect from 200.69.141.210 port 53767:11: Bye Bye [preauth]
Jan  1 22:47:15 host sshd[2728]: Disconnected from 200.69.141.210 port 53767 [preauth]
Jan  1 22:47:21 host sshd[2744]: User root from 45.6.99.228 not allowed because not listed in AllowUsers
Jan  1 22:47:21 host sshd[2744]: input_userauth_request: invalid user root [preauth]
Jan  1 22:47:21 host unix_chkpwd[2747]: password check failed for user (root)
Jan  1 22:47:21 host sshd[2744]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.6.99.228  user=root
Jan  1 22:47:21 host sshd[2744]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 22:47:23 host sshd[2744]: Failed password for invalid user root from 45.6.99.228 port 41890 ssh2
Jan  1 22:47:23 host sshd[2744]: Received disconnect from 45.6.99.228 port 41890:11: Bye Bye [preauth]
Jan  1 22:47:23 host sshd[2744]: Disconnected from 45.6.99.228 port 41890 [preauth]
Jan  1 22:47:30 host sshd[2777]: User root from 190.242.104.110 not allowed because not listed in AllowUsers
Jan  1 22:47:30 host sshd[2777]: input_userauth_request: invalid user root [preauth]
Jan  1 22:47:30 host unix_chkpwd[2780]: password check failed for user (root)
Jan  1 22:47:30 host sshd[2777]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.242.104.110  user=root
Jan  1 22:47:30 host sshd[2777]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 22:47:32 host sshd[2777]: Failed password for invalid user root from 190.242.104.110 port 33336 ssh2
Jan  1 22:47:33 host sshd[2777]: Received disconnect from 190.242.104.110 port 33336:11: Bye Bye [preauth]
Jan  1 22:47:33 host sshd[2777]: Disconnected from 190.242.104.110 port 33336 [preauth]
Jan  1 22:49:13 host sshd[2937]: User root from 119.202.72.87 not allowed because not listed in AllowUsers
Jan  1 22:49:13 host sshd[2937]: input_userauth_request: invalid user root [preauth]
Jan  1 22:49:13 host unix_chkpwd[2940]: password check failed for user (root)
Jan  1 22:49:13 host sshd[2937]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.202.72.87  user=root
Jan  1 22:49:13 host sshd[2937]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 22:49:15 host sshd[2937]: Failed password for invalid user root from 119.202.72.87 port 22771 ssh2
Jan  1 22:49:15 host sshd[2941]: User root from 190.242.104.110 not allowed because not listed in AllowUsers
Jan  1 22:49:15 host sshd[2941]: input_userauth_request: invalid user root [preauth]
Jan  1 22:49:15 host unix_chkpwd[2945]: password check failed for user (root)
Jan  1 22:49:15 host sshd[2941]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.242.104.110  user=root
Jan  1 22:49:15 host sshd[2941]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 22:49:15 host sshd[2937]: Received disconnect from 119.202.72.87 port 22771:11: Bye Bye [preauth]
Jan  1 22:49:15 host sshd[2937]: Disconnected from 119.202.72.87 port 22771 [preauth]
Jan  1 22:49:17 host sshd[2941]: Failed password for invalid user root from 190.242.104.110 port 50592 ssh2
Jan  1 22:49:18 host sshd[2941]: Received disconnect from 190.242.104.110 port 50592:11: Bye Bye [preauth]
Jan  1 22:49:18 host sshd[2941]: Disconnected from 190.242.104.110 port 50592 [preauth]
Jan  1 22:49:27 host sshd[2988]: User root from 200.69.141.210 not allowed because not listed in AllowUsers
Jan  1 22:49:27 host sshd[2988]: input_userauth_request: invalid user root [preauth]
Jan  1 22:49:27 host unix_chkpwd[3012]: password check failed for user (root)
Jan  1 22:49:27 host sshd[2988]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.69.141.210  user=root
Jan  1 22:49:27 host sshd[2988]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 22:49:29 host sshd[2988]: Failed password for invalid user root from 200.69.141.210 port 60026 ssh2
Jan  1 22:49:30 host sshd[2988]: Received disconnect from 200.69.141.210 port 60026:11: Bye Bye [preauth]
Jan  1 22:49:30 host sshd[2988]: Disconnected from 200.69.141.210 port 60026 [preauth]
Jan  1 22:50:16 host sshd[3129]: User root from 151.93.146.217 not allowed because not listed in AllowUsers
Jan  1 22:50:16 host sshd[3129]: input_userauth_request: invalid user root [preauth]
Jan  1 22:50:16 host unix_chkpwd[3132]: password check failed for user (root)
Jan  1 22:50:16 host sshd[3129]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.93.146.217  user=root
Jan  1 22:50:16 host sshd[3129]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 22:50:18 host sshd[3129]: Failed password for invalid user root from 151.93.146.217 port 44220 ssh2
Jan  1 22:50:19 host sshd[3129]: Received disconnect from 151.93.146.217 port 44220:11: Bye Bye [preauth]
Jan  1 22:50:19 host sshd[3129]: Disconnected from 151.93.146.217 port 44220 [preauth]
Jan  1 22:51:05 host sshd[3328]: User root from 185.137.24.110 not allowed because not listed in AllowUsers
Jan  1 22:51:05 host sshd[3328]: input_userauth_request: invalid user root [preauth]
Jan  1 22:51:05 host unix_chkpwd[3331]: password check failed for user (root)
Jan  1 22:51:05 host sshd[3328]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.137.24.110  user=root
Jan  1 22:51:05 host sshd[3328]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 22:51:07 host sshd[3328]: Failed password for invalid user root from 185.137.24.110 port 48838 ssh2
Jan  1 22:51:07 host sshd[3328]: Received disconnect from 185.137.24.110 port 48838:11: Bye Bye [preauth]
Jan  1 22:51:07 host sshd[3328]: Disconnected from 185.137.24.110 port 48838 [preauth]
Jan  1 22:51:18 host sshd[3346]: User root from 173.82.225.112 not allowed because not listed in AllowUsers
Jan  1 22:51:18 host sshd[3346]: input_userauth_request: invalid user root [preauth]
Jan  1 22:51:18 host unix_chkpwd[3350]: password check failed for user (root)
Jan  1 22:51:18 host sshd[3346]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.82.225.112  user=root
Jan  1 22:51:18 host sshd[3346]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 22:51:20 host sshd[3346]: Failed password for invalid user root from 173.82.225.112 port 34158 ssh2
Jan  1 22:51:21 host sshd[3346]: Received disconnect from 173.82.225.112 port 34158:11: Bye Bye [preauth]
Jan  1 22:51:21 host sshd[3346]: Disconnected from 173.82.225.112 port 34158 [preauth]
Jan  1 22:51:23 host sshd[3355]: Invalid user hadoop from 157.245.109.35 port 49434
Jan  1 22:51:23 host sshd[3355]: input_userauth_request: invalid user hadoop [preauth]
Jan  1 22:51:23 host sshd[3355]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 22:51:23 host sshd[3355]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.109.35
Jan  1 22:51:25 host sshd[3355]: Failed password for invalid user hadoop from 157.245.109.35 port 49434 ssh2
Jan  1 22:51:25 host sshd[3355]: Received disconnect from 157.245.109.35 port 49434:11: Bye Bye [preauth]
Jan  1 22:51:25 host sshd[3355]: Disconnected from 157.245.109.35 port 49434 [preauth]
Jan  1 22:51:28 host sshd[3360]: User root from 45.6.99.228 not allowed because not listed in AllowUsers
Jan  1 22:51:28 host sshd[3360]: input_userauth_request: invalid user root [preauth]
Jan  1 22:51:28 host unix_chkpwd[3390]: password check failed for user (root)
Jan  1 22:51:28 host sshd[3360]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.6.99.228  user=root
Jan  1 22:51:28 host sshd[3360]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 22:51:30 host sshd[3360]: Failed password for invalid user root from 45.6.99.228 port 56346 ssh2
Jan  1 22:51:42 host sshd[3438]: User root from 213.225.3.103 not allowed because not listed in AllowUsers
Jan  1 22:51:42 host sshd[3438]: input_userauth_request: invalid user root [preauth]
Jan  1 22:51:42 host unix_chkpwd[3440]: password check failed for user (root)
Jan  1 22:51:42 host sshd[3438]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.225.3.103  user=root
Jan  1 22:51:42 host sshd[3438]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 22:51:44 host sshd[3438]: Failed password for invalid user root from 213.225.3.103 port 60649 ssh2
Jan  1 22:51:50 host sshd[3479]: User root from 20.37.36.107 not allowed because not listed in AllowUsers
Jan  1 22:51:50 host sshd[3479]: input_userauth_request: invalid user root [preauth]
Jan  1 22:51:50 host unix_chkpwd[3482]: password check failed for user (root)
Jan  1 22:51:50 host sshd[3479]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.37.36.107  user=root
Jan  1 22:51:50 host sshd[3479]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 22:51:52 host sshd[3479]: Failed password for invalid user root from 20.37.36.107 port 43278 ssh2
Jan  1 22:51:52 host sshd[3479]: Received disconnect from 20.37.36.107 port 43278:11: Bye Bye [preauth]
Jan  1 22:51:52 host sshd[3479]: Disconnected from 20.37.36.107 port 43278 [preauth]
Jan  1 22:52:06 host sshd[3512]: User root from 151.93.146.217 not allowed because not listed in AllowUsers
Jan  1 22:52:06 host sshd[3512]: input_userauth_request: invalid user root [preauth]
Jan  1 22:52:06 host unix_chkpwd[3516]: password check failed for user (root)
Jan  1 22:52:06 host sshd[3512]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.93.146.217  user=root
Jan  1 22:52:06 host sshd[3512]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 22:52:09 host sshd[3512]: Failed password for invalid user root from 151.93.146.217 port 47144 ssh2
Jan  1 22:52:09 host sshd[3512]: Received disconnect from 151.93.146.217 port 47144:11: Bye Bye [preauth]
Jan  1 22:52:09 host sshd[3512]: Disconnected from 151.93.146.217 port 47144 [preauth]
Jan  1 22:52:24 host sshd[3566]: User root from 119.202.72.87 not allowed because not listed in AllowUsers
Jan  1 22:52:24 host sshd[3566]: input_userauth_request: invalid user root [preauth]
Jan  1 22:52:24 host unix_chkpwd[3569]: password check failed for user (root)
Jan  1 22:52:24 host sshd[3566]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.202.72.87  user=root
Jan  1 22:52:24 host sshd[3566]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 22:52:26 host sshd[3566]: Failed password for invalid user root from 119.202.72.87 port 56347 ssh2
Jan  1 22:52:40 host sshd[3642]: User root from 115.68.249.113 not allowed because not listed in AllowUsers
Jan  1 22:52:40 host sshd[3642]: input_userauth_request: invalid user root [preauth]
Jan  1 22:52:40 host unix_chkpwd[3645]: password check failed for user (root)
Jan  1 22:52:40 host sshd[3642]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.68.249.113  user=root
Jan  1 22:52:40 host sshd[3642]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 22:52:42 host sshd[3642]: Failed password for invalid user root from 115.68.249.113 port 44582 ssh2
Jan  1 22:52:42 host sshd[3642]: Received disconnect from 115.68.249.113 port 44582:11: Bye Bye [preauth]
Jan  1 22:52:42 host sshd[3642]: Disconnected from 115.68.249.113 port 44582 [preauth]
Jan  1 22:52:48 host sshd[3658]: User root from 157.245.109.35 not allowed because not listed in AllowUsers
Jan  1 22:52:48 host sshd[3658]: input_userauth_request: invalid user root [preauth]
Jan  1 22:52:48 host unix_chkpwd[3660]: password check failed for user (root)
Jan  1 22:52:48 host sshd[3658]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.109.35  user=root
Jan  1 22:52:48 host sshd[3658]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 22:52:50 host sshd[3658]: Failed password for invalid user root from 157.245.109.35 port 33668 ssh2
Jan  1 22:53:17 host sshd[3732]: Invalid user support from 171.225.185.49 port 64483
Jan  1 22:53:17 host sshd[3732]: input_userauth_request: invalid user support [preauth]
Jan  1 22:53:17 host sshd[3732]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 22:53:17 host sshd[3732]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.225.185.49
Jan  1 22:53:18 host sshd[3735]: Invalid user ubnt from 171.225.185.49 port 26214
Jan  1 22:53:18 host sshd[3735]: input_userauth_request: invalid user ubnt [preauth]
Jan  1 22:53:19 host sshd[3735]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 22:53:19 host sshd[3735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.225.185.49
Jan  1 22:53:19 host sshd[3732]: Failed password for invalid user support from 171.225.185.49 port 64483 ssh2
Jan  1 22:53:19 host sshd[3732]: Connection closed by 171.225.185.49 port 64483 [preauth]
Jan  1 22:53:21 host sshd[3735]: Failed password for invalid user ubnt from 171.225.185.49 port 26214 ssh2
Jan  1 22:53:21 host sshd[3735]: Connection closed by 171.225.185.49 port 26214 [preauth]
Jan  1 22:53:31 host sshd[3788]: User root from 185.137.24.110 not allowed because not listed in AllowUsers
Jan  1 22:53:31 host sshd[3788]: input_userauth_request: invalid user root [preauth]
Jan  1 22:53:31 host unix_chkpwd[3791]: password check failed for user (root)
Jan  1 22:53:31 host sshd[3788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.137.24.110  user=root
Jan  1 22:53:31 host sshd[3788]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 22:53:33 host sshd[3788]: Failed password for invalid user root from 185.137.24.110 port 35508 ssh2
Jan  1 22:53:34 host sshd[3788]: Received disconnect from 185.137.24.110 port 35508:11: Bye Bye [preauth]
Jan  1 22:53:34 host sshd[3788]: Disconnected from 185.137.24.110 port 35508 [preauth]
Jan  1 22:53:35 host sshd[3801]: Invalid user user from 171.225.185.49 port 61950
Jan  1 22:53:35 host sshd[3801]: input_userauth_request: invalid user user [preauth]
Jan  1 22:53:36 host sshd[3801]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 22:53:36 host sshd[3801]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.225.185.49
Jan  1 22:53:38 host sshd[3801]: Failed password for invalid user user from 171.225.185.49 port 61950 ssh2
Jan  1 22:53:41 host sshd[3865]: User root from 20.37.36.107 not allowed because not listed in AllowUsers
Jan  1 22:53:41 host sshd[3865]: input_userauth_request: invalid user root [preauth]
Jan  1 22:53:41 host unix_chkpwd[3869]: password check failed for user (root)
Jan  1 22:53:41 host sshd[3865]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.37.36.107  user=root
Jan  1 22:53:41 host sshd[3865]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 22:53:43 host sshd[3865]: Failed password for invalid user root from 20.37.36.107 port 39300 ssh2
Jan  1 22:53:43 host sshd[3865]: Received disconnect from 20.37.36.107 port 39300:11: Bye Bye [preauth]
Jan  1 22:53:43 host sshd[3865]: Disconnected from 20.37.36.107 port 39300 [preauth]
Jan  1 22:53:50 host sshd[3924]: User root from 211.46.4.196 not allowed because not listed in AllowUsers
Jan  1 22:53:50 host sshd[3924]: input_userauth_request: invalid user root [preauth]
Jan  1 22:53:50 host unix_chkpwd[3927]: password check failed for user (root)
Jan  1 22:53:50 host sshd[3924]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.46.4.196  user=root
Jan  1 22:53:50 host sshd[3924]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 22:53:52 host sshd[3924]: Failed password for invalid user root from 211.46.4.196 port 50790 ssh2
Jan  1 22:53:52 host sshd[3924]: Received disconnect from 211.46.4.196 port 50790:11: Bye Bye [preauth]
Jan  1 22:53:52 host sshd[3924]: Disconnected from 211.46.4.196 port 50790 [preauth]
Jan  1 22:54:17 host sshd[3998]: User root from 164.155.229.181 not allowed because not listed in AllowUsers
Jan  1 22:54:17 host sshd[3998]: input_userauth_request: invalid user root [preauth]
Jan  1 22:54:17 host unix_chkpwd[4004]: password check failed for user (root)
Jan  1 22:54:17 host sshd[3998]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.155.229.181  user=root
Jan  1 22:54:17 host sshd[3998]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 22:54:19 host sshd[3998]: Failed password for invalid user root from 164.155.229.181 port 37438 ssh2
Jan  1 22:54:19 host sshd[3998]: Received disconnect from 164.155.229.181 port 37438:11: Bye Bye [preauth]
Jan  1 22:54:19 host sshd[3998]: Disconnected from 164.155.229.181 port 37438 [preauth]
Jan  1 22:54:38 host sshd[4084]: User root from 115.68.249.113 not allowed because not listed in AllowUsers
Jan  1 22:54:38 host sshd[4084]: input_userauth_request: invalid user root [preauth]
Jan  1 22:54:38 host unix_chkpwd[4087]: password check failed for user (root)
Jan  1 22:54:38 host sshd[4084]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.68.249.113  user=root
Jan  1 22:54:38 host sshd[4084]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 22:54:40 host sshd[4084]: Failed password for invalid user root from 115.68.249.113 port 44574 ssh2
Jan  1 22:54:47 host sshd[4133]: User root from 59.93.130.122 not allowed because not listed in AllowUsers
Jan  1 22:54:47 host sshd[4133]: input_userauth_request: invalid user root [preauth]
Jan  1 22:54:47 host unix_chkpwd[4136]: password check failed for user (root)
Jan  1 22:54:47 host sshd[4133]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.93.130.122  user=root
Jan  1 22:54:47 host sshd[4133]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 22:54:49 host sshd[4133]: Failed password for invalid user root from 59.93.130.122 port 56 ssh2
Jan  1 22:54:49 host sshd[4133]: Received disconnect from 59.93.130.122 port 56:11: Bye Bye [preauth]
Jan  1 22:54:49 host sshd[4133]: Disconnected from 59.93.130.122 port 56 [preauth]
Jan  1 22:55:24 host sshd[4250]: User root from 173.82.225.112 not allowed because not listed in AllowUsers
Jan  1 22:55:24 host sshd[4250]: input_userauth_request: invalid user root [preauth]
Jan  1 22:55:24 host unix_chkpwd[4254]: password check failed for user (root)
Jan  1 22:55:24 host sshd[4250]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.82.225.112  user=root
Jan  1 22:55:24 host sshd[4250]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 22:55:27 host sshd[4250]: Failed password for invalid user root from 173.82.225.112 port 34396 ssh2
Jan  1 22:55:27 host sshd[4250]: Received disconnect from 173.82.225.112 port 34396:11: Bye Bye [preauth]
Jan  1 22:55:27 host sshd[4250]: Disconnected from 173.82.225.112 port 34396 [preauth]
Jan  1 22:57:53 host sshd[4695]: User root from 92.46.108.20 not allowed because not listed in AllowUsers
Jan  1 22:57:53 host sshd[4695]: input_userauth_request: invalid user root [preauth]
Jan  1 22:57:54 host unix_chkpwd[4701]: password check failed for user (root)
Jan  1 22:57:54 host sshd[4695]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20  user=root
Jan  1 22:57:54 host sshd[4695]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 22:57:56 host sshd[4695]: Failed password for invalid user root from 92.46.108.20 port 57122 ssh2
Jan  1 22:57:57 host sshd[4695]: Connection closed by 92.46.108.20 port 57122 [preauth]
Jan  1 22:58:25 host sshd[4789]: User ftp from 31.41.244.124 not allowed because not listed in AllowUsers
Jan  1 22:58:25 host sshd[4789]: input_userauth_request: invalid user ftp [preauth]
Jan  1 22:58:25 host unix_chkpwd[4797]: password check failed for user (ftp)
Jan  1 22:58:25 host sshd[4789]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.41.244.124  user=ftp
Jan  1 22:58:25 host sshd[4789]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp"
Jan  1 22:58:27 host sshd[4789]: Failed password for invalid user ftp from 31.41.244.124 port 18108 ssh2
Jan  1 22:58:27 host sshd[4789]: Received disconnect from 31.41.244.124 port 18108:11: Client disconnecting normally [preauth]
Jan  1 22:58:27 host sshd[4789]: Disconnected from 31.41.244.124 port 18108 [preauth]
Jan  1 22:58:28 host sshd[4821]: Invalid user user1 from 31.41.244.124 port 22749
Jan  1 22:58:28 host sshd[4821]: input_userauth_request: invalid user user1 [preauth]
Jan  1 22:58:29 host sshd[4821]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 22:58:29 host sshd[4821]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.41.244.124
Jan  1 22:58:31 host sshd[4821]: Failed password for invalid user user1 from 31.41.244.124 port 22749 ssh2
Jan  1 22:58:31 host sshd[4821]: Received disconnect from 31.41.244.124 port 22749:11: Client disconnecting normally [preauth]
Jan  1 22:58:31 host sshd[4821]: Disconnected from 31.41.244.124 port 22749 [preauth]
Jan  1 22:58:32 host sshd[4828]: Invalid user admin from 31.41.244.124 port 26959
Jan  1 22:58:32 host sshd[4828]: input_userauth_request: invalid user admin [preauth]
Jan  1 22:58:32 host sshd[4828]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 22:58:32 host sshd[4828]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.41.244.124
Jan  1 22:58:34 host sshd[4828]: Failed password for invalid user admin from 31.41.244.124 port 26959 ssh2
Jan  1 22:58:34 host sshd[4828]: Received disconnect from 31.41.244.124 port 26959:11: Client disconnecting normally [preauth]
Jan  1 22:58:34 host sshd[4828]: Disconnected from 31.41.244.124 port 26959 [preauth]
Jan  1 23:03:23 host sshd[5542]: Invalid user ts from 106.10.122.53 port 53682
Jan  1 23:03:23 host sshd[5542]: input_userauth_request: invalid user ts [preauth]
Jan  1 23:03:24 host sshd[5542]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 23:03:24 host sshd[5542]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53
Jan  1 23:03:25 host sshd[5552]: Invalid user oscar from 103.13.40.2 port 54032
Jan  1 23:03:25 host sshd[5552]: input_userauth_request: invalid user oscar [preauth]
Jan  1 23:03:25 host sshd[5552]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 23:03:25 host sshd[5552]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2
Jan  1 23:03:25 host sshd[5542]: Failed password for invalid user ts from 106.10.122.53 port 53682 ssh2
Jan  1 23:03:25 host sshd[5542]: Connection closed by 106.10.122.53 port 53682 [preauth]
Jan  1 23:03:28 host sshd[5552]: Failed password for invalid user oscar from 103.13.40.2 port 54032 ssh2
Jan  1 23:03:28 host sshd[5552]: Connection closed by 103.13.40.2 port 54032 [preauth]
Jan  1 23:03:47 host sshd[5617]: Did not receive identification string from 205.185.123.43 port 57780
Jan  1 23:06:47 host sshd[6006]: Did not receive identification string from 87.236.176.222 port 55507
Jan  1 23:06:47 host sshd[6011]: Connection closed by 87.236.176.222 port 59661 [preauth]
Jan  1 23:20:46 host sshd[7771]: Invalid user gregory from 107.189.30.59 port 59372
Jan  1 23:20:46 host sshd[7771]: input_userauth_request: invalid user gregory [preauth]
Jan  1 23:20:46 host sshd[7771]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 23:20:46 host sshd[7771]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59
Jan  1 23:20:48 host sshd[7771]: Failed password for invalid user gregory from 107.189.30.59 port 59372 ssh2
Jan  1 23:20:49 host sshd[7771]: Connection closed by 107.189.30.59 port 59372 [preauth]
Jan  1 23:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  1 23:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 23:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 23:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  1 23:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 23:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 23:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  1 23:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 23:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 23:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  1 23:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 23:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 23:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  1 23:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 23:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 23:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  1 23:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 23:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 23:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  1 23:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 23:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 23:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  1 23:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 23:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 23:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  1 23:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 23:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 23:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  1 23:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 23:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 23:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  1 23:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 23:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 23:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  1 23:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 23:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 23:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  1 23:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 23:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 23:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=laundryboniface user-2=dartsimp user-3=a2zgroup user-4=cochintaxi user-5=wwwkaretakers user-6=ugotscom user-7=wwwrmswll user-8=keralaholi user-9=wwwresourcehunte user-10=travelboniface user-11=wwwpmcresource user-12=pmcresources user-13=wwwtestugo user-14=shalinijames user-15=vfmassets user-16=wwwkapin user-17=woodpeck user-18=disposeat user-19=wwwkmaorg user-20=remysagr user-21=wwwnexidigital user-22=mrsclean user-23=phmetals user-24=kottayamcalldriv user-25=gifterman user-26=palco123 user-27=straightcurve user-28=wwwletsstalkfood user-29=wwwevmhonda user-30=bonifacegroup feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  1 23:21:55 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  1 23:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 23:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 23:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  1 23:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 23:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 23:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-EJQNhEPk03Y5vypN.~
Jan  1 23:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 23:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 23:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-EJQNhEPk03Y5vypN.~'
Jan  1 23:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 23:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 23:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-EJQNhEPk03Y5vypN.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  1 23:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 23:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 23:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  1 23:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 23:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 23:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  1 23:21:56 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  1 23:21:56 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  1 23:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  1 23:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 23:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 23:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  1 23:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 23:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 23:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  1 23:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 23:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 23:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  1 23:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 23:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 23:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  1 23:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  1 23:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  1 23:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  1 23:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  1 23:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  1 23:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  1 23:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  1 23:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  1 23:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  1 23:22:01 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  1 23:22:02 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  1 23:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  1 23:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  1 23:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  1 23:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  1 23:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  1 23:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  1 23:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  1 23:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  1 23:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  1 23:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  1 23:22:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  1 23:22:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  1 23:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  1 23:22:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  1 23:22:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  1 23:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  1 23:22:10 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  1 23:22:11 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  1 23:24:15 host sshd[8446]: User root from 162.218.126.136 not allowed because not listed in AllowUsers
Jan  1 23:24:15 host sshd[8446]: input_userauth_request: invalid user root [preauth]
Jan  1 23:24:15 host unix_chkpwd[8451]: password check failed for user (root)
Jan  1 23:24:15 host sshd[8446]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136  user=root
Jan  1 23:24:15 host sshd[8446]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 23:24:17 host sshd[8446]: Failed password for invalid user root from 162.218.126.136 port 36800 ssh2
Jan  1 23:24:17 host sshd[8446]: Connection closed by 162.218.126.136 port 36800 [preauth]
Jan  1 23:47:09 host sshd[11565]: User root from 23.95.115.90 not allowed because not listed in AllowUsers
Jan  1 23:47:09 host sshd[11565]: input_userauth_request: invalid user root [preauth]
Jan  1 23:47:09 host unix_chkpwd[11569]: password check failed for user (root)
Jan  1 23:47:09 host sshd[11565]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.95.115.90  user=root
Jan  1 23:47:09 host sshd[11565]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 23:47:11 host sshd[11565]: Failed password for invalid user root from 23.95.115.90 port 33920 ssh2
Jan  1 23:47:12 host sshd[11565]: Received disconnect from 23.95.115.90 port 33920:11: Bye Bye [preauth]
Jan  1 23:47:12 host sshd[11565]: Disconnected from 23.95.115.90 port 33920 [preauth]
Jan  1 23:50:03 host sshd[11888]: User root from 128.199.103.239 not allowed because not listed in AllowUsers
Jan  1 23:50:03 host sshd[11888]: input_userauth_request: invalid user root [preauth]
Jan  1 23:50:03 host unix_chkpwd[11890]: password check failed for user (root)
Jan  1 23:50:03 host sshd[11888]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.103.239  user=root
Jan  1 23:50:03 host sshd[11888]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 23:50:05 host sshd[11888]: Failed password for invalid user root from 128.199.103.239 port 53636 ssh2
Jan  1 23:50:05 host sshd[11888]: Received disconnect from 128.199.103.239 port 53636:11: Bye Bye [preauth]
Jan  1 23:50:05 host sshd[11888]: Disconnected from 128.199.103.239 port 53636 [preauth]
Jan  1 23:52:40 host sshd[12266]: Invalid user juan from 181.115.156.59 port 45710
Jan  1 23:52:40 host sshd[12266]: input_userauth_request: invalid user juan [preauth]
Jan  1 23:52:40 host sshd[12266]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 23:52:40 host sshd[12266]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.115.156.59
Jan  1 23:52:42 host sshd[12266]: Failed password for invalid user juan from 181.115.156.59 port 45710 ssh2
Jan  1 23:52:42 host sshd[12266]: Received disconnect from 181.115.156.59 port 45710:11: Bye Bye [preauth]
Jan  1 23:52:42 host sshd[12266]: Disconnected from 181.115.156.59 port 45710 [preauth]
Jan  1 23:53:26 host sshd[12346]: User root from 23.95.115.90 not allowed because not listed in AllowUsers
Jan  1 23:53:26 host sshd[12346]: input_userauth_request: invalid user root [preauth]
Jan  1 23:53:26 host unix_chkpwd[12351]: password check failed for user (root)
Jan  1 23:53:26 host sshd[12346]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.95.115.90  user=root
Jan  1 23:53:26 host sshd[12346]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 23:53:29 host sshd[12346]: Failed password for invalid user root from 23.95.115.90 port 36160 ssh2
Jan  1 23:53:29 host sshd[12346]: Received disconnect from 23.95.115.90 port 36160:11: Bye Bye [preauth]
Jan  1 23:53:29 host sshd[12346]: Disconnected from 23.95.115.90 port 36160 [preauth]
Jan  1 23:54:31 host sshd[12510]: User root from 181.115.156.59 not allowed because not listed in AllowUsers
Jan  1 23:54:31 host sshd[12510]: input_userauth_request: invalid user root [preauth]
Jan  1 23:54:31 host unix_chkpwd[12514]: password check failed for user (root)
Jan  1 23:54:31 host sshd[12510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.115.156.59  user=root
Jan  1 23:54:31 host sshd[12510]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  1 23:54:33 host sshd[12510]: Failed password for invalid user root from 181.115.156.59 port 45806 ssh2
Jan  1 23:54:33 host sshd[12510]: Received disconnect from 181.115.156.59 port 45806:11: Bye Bye [preauth]
Jan  1 23:54:33 host sshd[12510]: Disconnected from 181.115.156.59 port 45806 [preauth]
Jan  1 23:55:41 host sshd[12680]: Invalid user ftpuser from 128.199.103.239 port 49652
Jan  1 23:55:41 host sshd[12680]: input_userauth_request: invalid user ftpuser [preauth]
Jan  1 23:55:41 host sshd[12680]: pam_unix(sshd:auth): check pass; user unknown
Jan  1 23:55:41 host sshd[12680]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.103.239
Jan  1 23:55:44 host sshd[12680]: Failed password for invalid user ftpuser from 128.199.103.239 port 49652 ssh2
Jan  1 23:55:44 host sshd[12680]: Received disconnect from 128.199.103.239 port 49652:11: Bye Bye [preauth]
Jan  1 23:55:44 host sshd[12680]: Disconnected from 128.199.103.239 port 49652 [preauth]
Jan  2 00:10:41 host sshd[15012]: Did not receive identification string from 149.129.237.239 port 52300
Jan  2 00:11:45 host sshd[15144]: Invalid user admin from 149.129.237.239 port 51382
Jan  2 00:11:45 host sshd[15144]: input_userauth_request: invalid user admin [preauth]
Jan  2 00:11:46 host sshd[15144]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 00:11:46 host sshd[15144]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.129.237.239
Jan  2 00:11:48 host sshd[15144]: Failed password for invalid user admin from 149.129.237.239 port 51382 ssh2
Jan  2 00:11:48 host sshd[15144]: Connection closed by 149.129.237.239 port 51382 [preauth]
Jan  2 00:12:06 host sshd[15211]: Did not receive identification string from 172.105.96.215 port 10232
Jan  2 00:12:35 host sshd[15274]: Connection closed by 172.104.11.51 port 45114 [preauth]
Jan  2 00:12:36 host sshd[15278]: Connection closed by 172.104.11.51 port 45150 [preauth]
Jan  2 00:12:38 host sshd[15281]: Connection closed by 172.104.11.51 port 45168 [preauth]
Jan  2 00:13:13 host sshd[15270]: Invalid user admin from 149.129.237.239 port 39510
Jan  2 00:13:13 host sshd[15270]: input_userauth_request: invalid user admin [preauth]
Jan  2 00:13:14 host sshd[15270]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 00:13:14 host sshd[15270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.129.237.239
Jan  2 00:13:15 host sshd[15270]: Failed password for invalid user admin from 149.129.237.239 port 39510 ssh2
Jan  2 00:17:46 host sshd[16926]: Invalid user pi from 70.44.38.158 port 54008
Jan  2 00:17:46 host sshd[16926]: input_userauth_request: invalid user pi [preauth]
Jan  2 00:17:46 host sshd[16927]: Invalid user pi from 70.44.38.158 port 54012
Jan  2 00:17:46 host sshd[16927]: input_userauth_request: invalid user pi [preauth]
Jan  2 00:17:47 host sshd[16926]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 00:17:47 host sshd[16926]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.44.38.158
Jan  2 00:17:47 host sshd[16927]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 00:17:47 host sshd[16927]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.44.38.158
Jan  2 00:17:49 host sshd[16926]: Failed password for invalid user pi from 70.44.38.158 port 54008 ssh2
Jan  2 00:17:49 host sshd[16927]: Failed password for invalid user pi from 70.44.38.158 port 54012 ssh2
Jan  2 00:17:49 host sshd[16926]: Connection closed by 70.44.38.158 port 54008 [preauth]
Jan  2 00:17:49 host sshd[16927]: Connection closed by 70.44.38.158 port 54012 [preauth]
Jan  2 00:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  2 00:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 00:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 00:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  2 00:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 00:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 00:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  2 00:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 00:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 00:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  2 00:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 00:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 00:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  2 00:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 00:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 00:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  2 00:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 00:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 00:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  2 00:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 00:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 00:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  2 00:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 00:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 00:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  2 00:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 00:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 00:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  2 00:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 00:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 00:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  2 00:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 00:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 00:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  2 00:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 00:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 00:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  2 00:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 00:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 00:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=vfmassets user-2=wwwtestugo user-3=shalinijames user-4=pmcresources user-5=disposeat user-6=remysagr user-7=wwwkmaorg user-8=wwwkapin user-9=woodpeck user-10=gifterman user-11=palco123 user-12=phmetals user-13=kottayamcalldriv user-14=wwwnexidigital user-15=mrsclean user-16=bonifacegroup user-17=wwwevmhonda user-18=straightcurve user-19=wwwletsstalkfood user-20=dartsimp user-21=a2zgroup user-22=laundryboniface user-23=cochintaxi user-24=wwwkaretakers user-25=travelboniface user-26=wwwrmswll user-27=wwwresourcehunte user-28=keralaholi user-29=ugotscom user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  2 00:21:50 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  2 00:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 00:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 00:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  2 00:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 00:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 00:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-QOIzsKStnQR3paQm.~
Jan  2 00:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 00:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 00:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-QOIzsKStnQR3paQm.~'
Jan  2 00:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 00:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 00:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-QOIzsKStnQR3paQm.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  2 00:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 00:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 00:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  2 00:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 00:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 00:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  2 00:21:51 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 00:21:51 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 00:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  2 00:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 00:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 00:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  2 00:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 00:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 00:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  2 00:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 00:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 00:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  2 00:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 00:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 00:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  2 00:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 00:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 00:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  2 00:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  2 00:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  2 00:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  2 00:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  2 00:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  2 00:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  2 00:21:57 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  2 00:21:59 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  2 00:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  2 00:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 00:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 00:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  2 00:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 00:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 00:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  2 00:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 00:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 00:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  2 00:22:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 00:22:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 00:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  2 00:22:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 00:22:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 00:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  2 00:22:08 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  2 00:22:09 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  2 00:23:52 host sshd[17998]: Invalid user toby from 103.13.40.2 port 45302
Jan  2 00:23:52 host sshd[17998]: input_userauth_request: invalid user toby [preauth]
Jan  2 00:23:52 host sshd[17998]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 00:23:52 host sshd[17998]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2
Jan  2 00:23:54 host sshd[17998]: Failed password for invalid user toby from 103.13.40.2 port 45302 ssh2
Jan  2 00:23:54 host sshd[17998]: Connection closed by 103.13.40.2 port 45302 [preauth]
Jan  2 00:25:34 host sshd[18248]: User root from 106.10.122.53 not allowed because not listed in AllowUsers
Jan  2 00:25:34 host sshd[18248]: input_userauth_request: invalid user root [preauth]
Jan  2 00:25:34 host unix_chkpwd[18251]: password check failed for user (root)
Jan  2 00:25:34 host sshd[18248]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53  user=root
Jan  2 00:25:34 host sshd[18248]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 00:25:36 host sshd[18248]: Failed password for invalid user root from 106.10.122.53 port 40282 ssh2
Jan  2 00:25:36 host sshd[18248]: Connection closed by 106.10.122.53 port 40282 [preauth]
Jan  2 00:28:39 host sshd[18719]: Invalid user cxy from 162.218.126.136 port 33034
Jan  2 00:28:39 host sshd[18719]: input_userauth_request: invalid user cxy [preauth]
Jan  2 00:28:39 host sshd[18719]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 00:28:39 host sshd[18719]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136
Jan  2 00:28:40 host sshd[18719]: Failed password for invalid user cxy from 162.218.126.136 port 33034 ssh2
Jan  2 00:28:41 host sshd[18719]: Connection closed by 162.218.126.136 port 33034 [preauth]
Jan  2 00:29:11 host sshd[18784]: User mail from 193.169.255.30 not allowed because not listed in AllowUsers
Jan  2 00:29:11 host sshd[18784]: input_userauth_request: invalid user mail [preauth]
Jan  2 00:29:11 host sshd[18784]: Failed none for invalid user mail from 193.169.255.30 port 46588 ssh2
Jan  2 00:29:14 host unix_chkpwd[18791]: password check failed for user (mail)
Jan  2 00:29:14 host sshd[18784]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.169.255.30  user=mail
Jan  2 00:29:14 host sshd[18784]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "mail"
Jan  2 00:29:16 host sshd[18784]: Failed password for invalid user mail from 193.169.255.30 port 46588 ssh2
Jan  2 00:29:19 host unix_chkpwd[18798]: password check failed for user (mail)
Jan  2 00:29:19 host sshd[18784]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "mail"
Jan  2 00:29:22 host sshd[18784]: Failed password for invalid user mail from 193.169.255.30 port 46588 ssh2
Jan  2 00:29:25 host sshd[18784]: Connection closed by 193.169.255.30 port 46588 [preauth]
Jan  2 00:29:25 host sshd[18784]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.169.255.30  user=mail
Jan  2 00:33:17 host sshd[19382]: User root from 116.130.215.81 not allowed because not listed in AllowUsers
Jan  2 00:33:17 host sshd[19382]: input_userauth_request: invalid user root [preauth]
Jan  2 00:33:17 host unix_chkpwd[19389]: password check failed for user (root)
Jan  2 00:33:17 host sshd[19382]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.130.215.81  user=root
Jan  2 00:33:17 host sshd[19382]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 00:33:20 host sshd[19382]: Failed password for invalid user root from 116.130.215.81 port 50159 ssh2
Jan  2 00:33:20 host unix_chkpwd[19393]: password check failed for user (root)
Jan  2 00:33:20 host sshd[19382]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 00:33:22 host sshd[19382]: Failed password for invalid user root from 116.130.215.81 port 50159 ssh2
Jan  2 00:33:22 host unix_chkpwd[19396]: password check failed for user (root)
Jan  2 00:33:22 host sshd[19382]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 00:33:25 host sshd[19382]: Failed password for invalid user root from 116.130.215.81 port 50159 ssh2
Jan  2 00:42:21 host sshd[20636]: Invalid user yangxu from 41.197.31.178 port 48026
Jan  2 00:42:21 host sshd[20636]: input_userauth_request: invalid user yangxu [preauth]
Jan  2 00:42:22 host sshd[20636]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 00:42:22 host sshd[20636]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178
Jan  2 00:42:23 host sshd[20636]: Failed password for invalid user yangxu from 41.197.31.178 port 48026 ssh2
Jan  2 00:42:24 host sshd[20636]: Connection closed by 41.197.31.178 port 48026 [preauth]
Jan  2 00:57:33 host sshd[23086]: Bad protocol version identification '\003' from 179.60.147.13 port 63122
Jan  2 01:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  2 01:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 01:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 01:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  2 01:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 01:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 01:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  2 01:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 01:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 01:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  2 01:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 01:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 01:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  2 01:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 01:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 01:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  2 01:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 01:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 01:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  2 01:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 01:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 01:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  2 01:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 01:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 01:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  2 01:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 01:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 01:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  2 01:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 01:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 01:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  2 01:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 01:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 01:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  2 01:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 01:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 01:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  2 01:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 01:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 01:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=pmcresources user-2=vfmassets user-3=shalinijames user-4=wwwtestugo user-5=wwwkapin user-6=woodpeck user-7=wwwkmaorg user-8=disposeat user-9=remysagr user-10=wwwnexidigital user-11=mrsclean user-12=palco123 user-13=gifterman user-14=phmetals user-15=kottayamcalldriv user-16=wwwletsstalkfood user-17=straightcurve user-18=bonifacegroup user-19=wwwevmhonda user-20=laundryboniface user-21=a2zgroup user-22=dartsimp user-23=cochintaxi user-24=wwwkaretakers user-25=wwwresourcehunte user-26=keralaholi user-27=wwwrmswll user-28=ugotscom user-29=travelboniface user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  2 01:21:50 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  2 01:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 01:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 01:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  2 01:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 01:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 01:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-WrsxVYJ30icV6CbF.~
Jan  2 01:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 01:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 01:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-WrsxVYJ30icV6CbF.~'
Jan  2 01:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 01:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 01:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-WrsxVYJ30icV6CbF.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  2 01:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 01:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 01:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  2 01:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 01:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 01:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  2 01:21:51 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 01:21:51 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 01:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  2 01:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 01:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 01:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  2 01:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 01:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 01:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  2 01:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 01:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 01:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  2 01:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 01:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 01:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  2 01:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 01:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 01:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  2 01:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  2 01:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  2 01:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  2 01:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  2 01:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  2 01:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  2 01:21:55 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  2 01:22:02 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  2 01:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  2 01:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 01:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 01:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  2 01:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 01:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 01:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  2 01:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 01:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 01:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  2 01:22:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 01:22:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 01:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  2 01:22:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 01:22:13 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 01:22:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  2 01:22:13 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  2 01:22:15 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  2 01:33:01 host sshd[27946]: Invalid user user1 from 162.218.126.136 port 46652
Jan  2 01:33:01 host sshd[27946]: input_userauth_request: invalid user user1 [preauth]
Jan  2 01:33:01 host sshd[27946]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 01:33:01 host sshd[27946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136
Jan  2 01:33:04 host sshd[27946]: Failed password for invalid user user1 from 162.218.126.136 port 46652 ssh2
Jan  2 01:33:04 host sshd[27946]: Connection closed by 162.218.126.136 port 46652 [preauth]
Jan  2 01:35:44 host sshd[28369]: Invalid user user1 from 92.46.108.20 port 44296
Jan  2 01:35:44 host sshd[28369]: input_userauth_request: invalid user user1 [preauth]
Jan  2 01:35:45 host sshd[28369]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 01:35:45 host sshd[28369]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20
Jan  2 01:35:47 host sshd[28369]: Failed password for invalid user user1 from 92.46.108.20 port 44296 ssh2
Jan  2 01:35:47 host sshd[28369]: Connection closed by 92.46.108.20 port 44296 [preauth]
Jan  2 01:44:47 host sshd[29536]: Invalid user user1 from 103.13.40.2 port 36562
Jan  2 01:44:47 host sshd[29536]: input_userauth_request: invalid user user1 [preauth]
Jan  2 01:44:47 host sshd[29536]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 01:44:47 host sshd[29536]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2
Jan  2 01:44:49 host sshd[29536]: Failed password for invalid user user1 from 103.13.40.2 port 36562 ssh2
Jan  2 01:44:49 host sshd[29536]: Connection closed by 103.13.40.2 port 36562 [preauth]
Jan  2 01:48:00 host sshd[30311]: User root from 106.10.122.53 not allowed because not listed in AllowUsers
Jan  2 01:48:00 host sshd[30311]: input_userauth_request: invalid user root [preauth]
Jan  2 01:48:01 host unix_chkpwd[30314]: password check failed for user (root)
Jan  2 01:48:01 host sshd[30311]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53  user=root
Jan  2 01:48:01 host sshd[30311]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 01:48:03 host sshd[30311]: Failed password for invalid user root from 106.10.122.53 port 37926 ssh2
Jan  2 01:48:03 host sshd[30311]: Connection closed by 106.10.122.53 port 37926 [preauth]
Jan  2 01:48:29 host sshd[30380]: Invalid user user from 24.121.33.250 port 54119
Jan  2 01:48:29 host sshd[30380]: input_userauth_request: invalid user user [preauth]
Jan  2 01:48:30 host sshd[30380]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 01:48:30 host sshd[30380]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.121.33.250
Jan  2 01:48:32 host sshd[30380]: Failed password for invalid user user from 24.121.33.250 port 54119 ssh2
Jan  2 01:48:33 host sshd[30380]: Connection closed by 24.121.33.250 port 54119 [preauth]
Jan  2 02:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  2 02:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  2 02:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  2 02:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  2 02:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  2 02:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  2 02:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  2 02:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  2 02:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  2 02:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  2 02:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  2 02:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  2 02:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  2 02:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=disposeat user-2=remysagr user-3=wwwkmaorg user-4=woodpeck user-5=wwwkapin user-6=vfmassets user-7=wwwtestugo user-8=shalinijames user-9=pmcresources user-10=bonifacegroup user-11=wwwevmhonda user-12=wwwletsstalkfood user-13=straightcurve user-14=gifterman user-15=palco123 user-16=kottayamcalldriv user-17=phmetals user-18=mrsclean user-19=wwwnexidigital user-20=wwwkaretakers user-21=cochintaxi user-22=dartsimp user-23=a2zgroup user-24=laundryboniface user-25=wwwpmcresource user-26=travelboniface user-27=wwwrmswll user-28=keralaholi user-29=wwwresourcehunte user-30=ugotscom feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  2 02:21:50 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  2 02:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  2 02:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-yYAeL7OjOHgdG84A.~
Jan  2 02:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-yYAeL7OjOHgdG84A.~'
Jan  2 02:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-yYAeL7OjOHgdG84A.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  2 02:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  2 02:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  2 02:21:51 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 02:21:51 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 02:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  2 02:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  2 02:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  2 02:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  2 02:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  2 02:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  2 02:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  2 02:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  2 02:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  2 02:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  2 02:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  2 02:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  2 02:21:56 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  2 02:21:57 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  2 02:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  2 02:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  2 02:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  2 02:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  2 02:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 02:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 02:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  2 02:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 02:22:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 02:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  2 02:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  2 02:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  2 02:22:57 host sshd[2738]: User root from 152.32.211.250 not allowed because not listed in AllowUsers
Jan  2 02:22:57 host sshd[2738]: input_userauth_request: invalid user root [preauth]
Jan  2 02:22:57 host unix_chkpwd[2740]: password check failed for user (root)
Jan  2 02:22:57 host sshd[2738]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.211.250  user=root
Jan  2 02:22:57 host sshd[2738]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 02:22:59 host sshd[2738]: Failed password for invalid user root from 152.32.211.250 port 50136 ssh2
Jan  2 02:22:59 host sshd[2738]: Received disconnect from 152.32.211.250 port 50136:11: Bye Bye [preauth]
Jan  2 02:22:59 host sshd[2738]: Disconnected from 152.32.211.250 port 50136 [preauth]
Jan  2 02:24:32 host sshd[3034]: User root from 137.184.96.200 not allowed because not listed in AllowUsers
Jan  2 02:24:32 host sshd[3034]: input_userauth_request: invalid user root [preauth]
Jan  2 02:24:32 host unix_chkpwd[3037]: password check failed for user (root)
Jan  2 02:24:32 host sshd[3034]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.96.200  user=root
Jan  2 02:24:32 host sshd[3034]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 02:24:34 host sshd[3034]: Failed password for invalid user root from 137.184.96.200 port 45840 ssh2
Jan  2 02:24:34 host sshd[3034]: Received disconnect from 137.184.96.200 port 45840:11: Bye Bye [preauth]
Jan  2 02:24:34 host sshd[3034]: Disconnected from 137.184.96.200 port 45840 [preauth]
Jan  2 02:25:01 host sshd[3069]: User root from 180.190.241.88 not allowed because not listed in AllowUsers
Jan  2 02:25:01 host sshd[3069]: input_userauth_request: invalid user root [preauth]
Jan  2 02:25:01 host unix_chkpwd[3095]: password check failed for user (root)
Jan  2 02:25:01 host sshd[3069]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.190.241.88  user=root
Jan  2 02:25:01 host sshd[3069]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 02:25:03 host sshd[3069]: Failed password for invalid user root from 180.190.241.88 port 42762 ssh2
Jan  2 02:25:03 host sshd[3069]: Received disconnect from 180.190.241.88 port 42762:11: Bye Bye [preauth]
Jan  2 02:25:03 host sshd[3069]: Disconnected from 180.190.241.88 port 42762 [preauth]
Jan  2 02:25:31 host sshd[3168]: User root from 161.35.175.231 not allowed because not listed in AllowUsers
Jan  2 02:25:31 host sshd[3168]: input_userauth_request: invalid user root [preauth]
Jan  2 02:25:31 host unix_chkpwd[3171]: password check failed for user (root)
Jan  2 02:25:31 host sshd[3168]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.175.231  user=root
Jan  2 02:25:31 host sshd[3168]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 02:25:33 host sshd[3168]: Failed password for invalid user root from 161.35.175.231 port 37540 ssh2
Jan  2 02:25:34 host sshd[3168]: Received disconnect from 161.35.175.231 port 37540:11: Bye Bye [preauth]
Jan  2 02:25:34 host sshd[3168]: Disconnected from 161.35.175.231 port 37540 [preauth]
Jan  2 02:26:06 host sshd[3234]: User root from 47.176.38.253 not allowed because not listed in AllowUsers
Jan  2 02:26:06 host sshd[3234]: input_userauth_request: invalid user root [preauth]
Jan  2 02:26:06 host unix_chkpwd[3237]: password check failed for user (root)
Jan  2 02:26:06 host sshd[3234]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.176.38.253  user=root
Jan  2 02:26:06 host sshd[3234]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 02:26:08 host sshd[3234]: Failed password for invalid user root from 47.176.38.253 port 6082 ssh2
Jan  2 02:26:09 host sshd[3234]: Received disconnect from 47.176.38.253 port 6082:11: Bye Bye [preauth]
Jan  2 02:26:09 host sshd[3234]: Disconnected from 47.176.38.253 port 6082 [preauth]
Jan  2 02:26:14 host sshd[3233]: Connection reset by 24.63.248.61 port 52277 [preauth]
Jan  2 02:26:22 host sshd[3268]: Bad protocol version identification 'MGLNDD_167.71.234.10_22' from 198.199.100.137 port 51664
Jan  2 02:27:09 host sshd[3382]: User root from 152.32.211.250 not allowed because not listed in AllowUsers
Jan  2 02:27:09 host sshd[3382]: input_userauth_request: invalid user root [preauth]
Jan  2 02:27:09 host unix_chkpwd[3384]: password check failed for user (root)
Jan  2 02:27:09 host sshd[3382]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.211.250  user=root
Jan  2 02:27:09 host sshd[3382]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 02:27:11 host sshd[3382]: Failed password for invalid user root from 152.32.211.250 port 43024 ssh2
Jan  2 02:27:11 host sshd[3382]: Received disconnect from 152.32.211.250 port 43024:11: Bye Bye [preauth]
Jan  2 02:27:11 host sshd[3382]: Disconnected from 152.32.211.250 port 43024 [preauth]
Jan  2 02:27:12 host sshd[3400]: User root from 185.194.216.188 not allowed because not listed in AllowUsers
Jan  2 02:27:12 host sshd[3400]: input_userauth_request: invalid user root [preauth]
Jan  2 02:27:12 host unix_chkpwd[3430]: password check failed for user (root)
Jan  2 02:27:12 host sshd[3400]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.194.216.188  user=root
Jan  2 02:27:12 host sshd[3400]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 02:27:13 host sshd[3415]: User root from 180.190.241.88 not allowed because not listed in AllowUsers
Jan  2 02:27:13 host sshd[3415]: input_userauth_request: invalid user root [preauth]
Jan  2 02:27:13 host unix_chkpwd[3433]: password check failed for user (root)
Jan  2 02:27:13 host sshd[3415]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.190.241.88  user=root
Jan  2 02:27:13 host sshd[3415]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 02:27:15 host sshd[3400]: Failed password for invalid user root from 185.194.216.188 port 55786 ssh2
Jan  2 02:27:15 host sshd[3400]: Received disconnect from 185.194.216.188 port 55786:11: Bye Bye [preauth]
Jan  2 02:27:15 host sshd[3400]: Disconnected from 185.194.216.188 port 55786 [preauth]
Jan  2 02:27:15 host sshd[3415]: Failed password for invalid user root from 180.190.241.88 port 36394 ssh2
Jan  2 02:27:16 host sshd[3415]: Received disconnect from 180.190.241.88 port 36394:11: Bye Bye [preauth]
Jan  2 02:27:16 host sshd[3415]: Disconnected from 180.190.241.88 port 36394 [preauth]
Jan  2 02:27:26 host sshd[3484]: User root from 195.191.82.212 not allowed because not listed in AllowUsers
Jan  2 02:27:26 host sshd[3484]: input_userauth_request: invalid user root [preauth]
Jan  2 02:27:26 host unix_chkpwd[3512]: password check failed for user (root)
Jan  2 02:27:26 host sshd[3484]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.191.82.212  user=root
Jan  2 02:27:26 host sshd[3484]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 02:27:28 host sshd[3484]: Failed password for invalid user root from 195.191.82.212 port 50324 ssh2
Jan  2 02:27:29 host sshd[3484]: Received disconnect from 195.191.82.212 port 50324:11: Bye Bye [preauth]
Jan  2 02:27:29 host sshd[3484]: Disconnected from 195.191.82.212 port 50324 [preauth]
Jan  2 02:28:23 host sshd[3617]: Invalid user user from 161.35.175.231 port 49828
Jan  2 02:28:23 host sshd[3617]: input_userauth_request: invalid user user [preauth]
Jan  2 02:28:23 host sshd[3617]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 02:28:23 host sshd[3617]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.175.231
Jan  2 02:28:25 host sshd[3617]: Failed password for invalid user user from 161.35.175.231 port 49828 ssh2
Jan  2 02:28:25 host sshd[3617]: Received disconnect from 161.35.175.231 port 49828:11: Bye Bye [preauth]
Jan  2 02:28:25 host sshd[3617]: Disconnected from 161.35.175.231 port 49828 [preauth]
Jan  2 02:28:31 host sshd[3685]: Did not receive identification string from 149.129.220.104 port 61000
Jan  2 02:28:57 host sshd[3728]: Invalid user anita from 185.194.216.188 port 59726
Jan  2 02:28:57 host sshd[3728]: input_userauth_request: invalid user anita [preauth]
Jan  2 02:28:57 host sshd[3728]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 02:28:57 host sshd[3728]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.194.216.188
Jan  2 02:28:58 host sshd[3733]: User root from 137.184.96.200 not allowed because not listed in AllowUsers
Jan  2 02:28:58 host sshd[3733]: input_userauth_request: invalid user root [preauth]
Jan  2 02:28:58 host unix_chkpwd[3737]: password check failed for user (root)
Jan  2 02:28:58 host sshd[3733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.96.200  user=root
Jan  2 02:28:58 host sshd[3733]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 02:28:59 host sshd[3728]: Failed password for invalid user anita from 185.194.216.188 port 59726 ssh2
Jan  2 02:28:59 host sshd[3728]: Received disconnect from 185.194.216.188 port 59726:11: Bye Bye [preauth]
Jan  2 02:28:59 host sshd[3728]: Disconnected from 185.194.216.188 port 59726 [preauth]
Jan  2 02:29:00 host sshd[3733]: Failed password for invalid user root from 137.184.96.200 port 35888 ssh2
Jan  2 02:29:01 host sshd[3733]: Received disconnect from 137.184.96.200 port 35888:11: Bye Bye [preauth]
Jan  2 02:29:01 host sshd[3733]: Disconnected from 137.184.96.200 port 35888 [preauth]
Jan  2 02:29:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  2 02:29:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:29:02 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:29:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  2 02:29:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:29:02 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:29:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  2 02:29:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:29:02 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:29:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  2 02:29:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:29:02 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:29:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  2 02:29:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:29:02 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:29:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  2 02:29:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:29:02 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:29:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  2 02:29:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:29:02 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:29:32 host sshd[3905]: Invalid user chw from 41.197.31.178 port 41392
Jan  2 02:29:32 host sshd[3905]: input_userauth_request: invalid user chw [preauth]
Jan  2 02:29:32 host sshd[3905]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 02:29:32 host sshd[3905]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178
Jan  2 02:29:33 host sshd[3909]: User root from 150.230.235.117 not allowed because not listed in AllowUsers
Jan  2 02:29:33 host sshd[3909]: input_userauth_request: invalid user root [preauth]
Jan  2 02:29:33 host unix_chkpwd[3913]: password check failed for user (root)
Jan  2 02:29:33 host sshd[3909]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.230.235.117  user=root
Jan  2 02:29:33 host sshd[3909]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 02:29:34 host sshd[3905]: Failed password for invalid user chw from 41.197.31.178 port 41392 ssh2
Jan  2 02:29:34 host sshd[3905]: Connection closed by 41.197.31.178 port 41392 [preauth]
Jan  2 02:29:35 host sshd[3909]: Failed password for invalid user root from 150.230.235.117 port 52100 ssh2
Jan  2 02:29:35 host sshd[3909]: Received disconnect from 150.230.235.117 port 52100:11: Bye Bye [preauth]
Jan  2 02:29:35 host sshd[3909]: Disconnected from 150.230.235.117 port 52100 [preauth]
Jan  2 02:29:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  2 02:29:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:29:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:29:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  2 02:29:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:29:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:29:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  2 02:29:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:29:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:29:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  2 02:29:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:29:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:29:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  2 02:29:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:29:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:29:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=laundryboniface user-2=dartsimp user-3=a2zgroup user-4=cochintaxi user-5=wwwkaretakers user-6=ugotscom user-7=wwwrmswll user-8=wwwresourcehunte user-9=keralaholi user-10=travelboniface user-11=wwwpmcresource user-12=pmcresources user-13=wwwtestugo user-14=shalinijames user-15=vfmassets user-16=woodpeck user-17=wwwkapin user-18=wwwkmaorg user-19=disposeat user-20=remysagr user-21=mrsclean user-22=wwwnexidigital user-23=phmetals user-24=kottayamcalldriv user-25=gifterman user-26=palco123 user-27=wwwletsstalkfood user-28=straightcurve user-29=wwwevmhonda user-30=bonifacegroup feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  2 02:29:49 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  2 02:29:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:29:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:29:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwevmhonda --output=json
Jan  2 02:29:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:29:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:29:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color instance info --format=json --check-updates=true
Jan  2 02:29:49 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  2 02:29:50 host sshd[3979]: User root from 47.176.38.253 not allowed because not listed in AllowUsers
Jan  2 02:29:50 host sshd[3979]: input_userauth_request: invalid user root [preauth]
Jan  2 02:29:50 host unix_chkpwd[3983]: password check failed for user (root)
Jan  2 02:29:50 host sshd[3979]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.176.38.253  user=root
Jan  2 02:29:50 host sshd[3979]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 02:29:52 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  2 02:29:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false
Jan  2 02:29:52 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  2 02:29:52 host sshd[3979]: Failed password for invalid user root from 47.176.38.253 port 63744 ssh2
Jan  2 02:29:53 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  2 02:29:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false
Jan  2 02:29:53 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  2 02:29:55 host sshd[4102]: Invalid user admin from 84.216.152.25 port 36936
Jan  2 02:29:55 host sshd[4102]: input_userauth_request: invalid user admin [preauth]
Jan  2 02:29:55 host sshd[4102]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 02:29:55 host sshd[4102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.216.152.25
Jan  2 02:29:56 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  2 02:29:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  2 02:29:56 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  2 02:29:56 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  2 02:29:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwevmhonda LangPHP php_get_vhost_versions --output=json
Jan  2 02:29:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:29:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:29:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 package_manager_get_package_info package-0=ea-php72 --output=json
Jan  2 02:29:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:29:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:29:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color instance login-url --skip-plugins=false --format=json
Jan  2 02:29:57 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  2 02:29:57 host sshd[4102]: Failed password for invalid user admin from 84.216.152.25 port 36936 ssh2
Jan  2 02:29:57 host sshd[4102]: Connection closed by 84.216.152.25 port 36936 [preauth]
Jan  2 02:29:58 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  2 02:29:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwletsstalkfood --output=json
Jan  2 02:29:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:29:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:29:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color instance info --format=json --check-updates=true
Jan  2 02:29:58 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  2 02:29:58 host sshd[4176]: User root from 195.191.82.212 not allowed because not listed in AllowUsers
Jan  2 02:29:58 host sshd[4176]: input_userauth_request: invalid user root [preauth]
Jan  2 02:29:58 host unix_chkpwd[4193]: password check failed for user (root)
Jan  2 02:29:58 host sshd[4176]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.191.82.212  user=root
Jan  2 02:29:58 host sshd[4176]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 02:30:00 host sshd[4176]: Failed password for invalid user root from 195.191.82.212 port 53672 ssh2
Jan  2 02:30:00 host sshd[4176]: Received disconnect from 195.191.82.212 port 53672:11: Bye Bye [preauth]
Jan  2 02:30:00 host sshd[4176]: Disconnected from 195.191.82.212 port 53672 [preauth]
Jan  2 02:30:04 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  2 02:30:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false
Jan  2 02:30:04 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  2 02:30:06 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  2 02:30:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false
Jan  2 02:30:06 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  2 02:30:07 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  2 02:30:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  2 02:30:07 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  2 02:30:07 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  2 02:30:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood LangPHP php_get_vhost_versions --output=json
Jan  2 02:30:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:30:07 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:30:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color instance login-url --skip-plugins=false --format=json
Jan  2 02:30:07 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  2 02:30:08 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  2 02:30:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood DomainInfo single_domain_data domain=letsstalkfood.com return_https_redirect_status=1 --output=json
Jan  2 02:30:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:30:08 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:30:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 fetch_vhost_ssl_components --output=json
Jan  2 02:30:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:30:08 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:30:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 fetch_ssl_vhosts --output=json
Jan  2 02:30:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:30:09 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:30:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood Mime list_redirects --output=json
Jan  2 02:30:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:30:09 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:30:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  2 02:30:09 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  2 02:30:10 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  2 02:30:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false
Jan  2 02:30:10 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  2 02:30:12 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  2 02:30:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  2 02:30:12 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  2 02:30:17 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  2 02:30:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false
Jan  2 02:30:17 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  2 02:30:22 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  2 02:30:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/public_html/wp-config.php
Jan  2 02:30:22 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  2 02:30:22 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  2 02:30:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  2 02:30:22 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  2 02:30:23 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  2 02:30:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/public_html/.maintenance
Jan  2 02:30:23 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  2 02:30:23 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  2 02:30:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color db-prefix get
Jan  2 02:30:23 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  2 02:30:23 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  2 02:30:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood DirectoryPrivacy is_directory_protected dir=/home/wwwletsstalkfood/public_html --output=json
Jan  2 02:30:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:30:23 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:30:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  2 02:30:23 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  2 02:30:24 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  2 02:30:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color wpt-cron event reschedule wp_version_check '+2 day'
Jan  2 02:30:24 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  2 02:30:25 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  2 02:30:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day'
Jan  2 02:30:25 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  2 02:30:25 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  2 02:30:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  2 02:30:25 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  2 02:30:26 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  2 02:30:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  2 02:30:26 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  2 02:30:26 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  2 02:30:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color admin-username is-secure
Jan  2 02:30:26 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  2 02:30:26 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  2 02:30:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  2 02:30:27 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  2 02:30:27 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  2 02:30:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/public_html/wp-config.php
Jan  2 02:30:27 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  2 02:30:27 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  2 02:30:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/stat -c %a /home/wwwletsstalkfood/public_html/wp-config.php
Jan  2 02:30:27 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  2 02:30:27 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  2 02:30:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color pingbacks is_disabled
Jan  2 02:30:27 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  2 02:30:27 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  2 02:30:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  2 02:30:27 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  2 02:30:28 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  2 02:30:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color security-keys are_keys_correct
Jan  2 02:30:28 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  2 02:30:28 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  2 02:30:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=mrsclean --output=json
Jan  2 02:30:28 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:30:29 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:30:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/backup && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/mrsclean/public_html/backup --no-color instance info --format=json --check-updates=true
Jan  2 02:30:29 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  2 02:30:29 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  2 02:30:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean DomainInfo single_domain_data domain=mrsclean.co.in return_https_redirect_status=1 --output=json
Jan  2 02:30:29 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:30:29 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:30:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean Mime list_redirects --output=json
Jan  2 02:30:29 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:30:29 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:30:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/public_html/backup/wp-includes/version.php
Jan  2 02:30:29 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  2 02:30:29 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  2 02:30:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/cat /home/mrsclean/public_html/backup/wp-includes/version.php
Jan  2 02:30:29 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  2 02:30:29 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  2 02:30:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  2 02:30:29 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  2 02:30:29 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  2 02:30:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean LangPHP php_get_vhost_versions --output=json
Jan  2 02:30:29 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:30:29 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:30:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  2 02:30:29 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 02:30:29 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 02:30:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/blog && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/mrsclean/public_html/blog --no-color instance info --format=json --check-updates=true
Jan  2 02:30:29 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  2 02:30:30 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  2 02:30:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/public_html/blog/wp-includes/version.php
Jan  2 02:30:30 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  2 02:30:30 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  2 02:30:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/cat /home/mrsclean/public_html/blog/wp-includes/version.php
Jan  2 02:30:30 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  2 02:30:30 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  2 02:30:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  2 02:30:30 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  2 02:30:30 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  2 02:30:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=shalinijames --output=json
Jan  2 02:30:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:30:30 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:30:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color instance info --format=json --check-updates=true
Jan  2 02:30:30 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  2 02:30:37 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  2 02:30:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option get auto_update_plugins --format=json
Jan  2 02:30:37 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  2 02:30:38 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  2 02:30:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option get auto_update_themes --format=json
Jan  2 02:30:38 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  2 02:30:38 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  2 02:30:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  2 02:30:38 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  2 02:30:38 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  2 02:30:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames LangPHP php_get_vhost_versions --output=json
Jan  2 02:30:38 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:30:38 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:30:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color instance login-url --skip-plugins=false --format=json
Jan  2 02:30:38 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  2 02:30:39 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  2 02:30:39 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames DomainInfo single_domain_data domain=shalinijames.com return_https_redirect_status=1 --output=json
Jan  2 02:30:39 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:30:39 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:30:39 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames Mime list_redirects --output=json
Jan  2 02:30:39 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:30:39 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:30:39 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  2 02:30:39 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  2 02:30:41 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  2 02:30:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option get auto_update_plugins --format=json
Jan  2 02:30:41 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  2 02:30:41 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  2 02:30:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  2 02:30:41 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  2 02:30:46 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  2 02:30:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option get auto_update_themes --format=json
Jan  2 02:30:46 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  2 02:30:46 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  2 02:30:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/public_html/wp-config.php
Jan  2 02:30:46 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  2 02:30:46 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  2 02:30:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  2 02:30:46 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  2 02:30:47 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  2 02:30:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/public_html/.maintenance
Jan  2 02:30:47 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  2 02:30:47 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  2 02:30:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color db-prefix get
Jan  2 02:30:47 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  2 02:30:47 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  2 02:30:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames DirectoryPrivacy is_directory_protected dir=/home/shalinijames/public_html --output=json
Jan  2 02:30:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:30:47 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:30:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  2 02:30:47 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  2 02:30:48 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  2 02:30:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color wpt-cron event reschedule wp_version_check '+2 day'
Jan  2 02:30:48 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  2 02:30:48 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  2 02:30:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day'
Jan  2 02:30:48 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  2 02:30:49 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  2 02:30:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  2 02:30:49 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  2 02:30:49 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  2 02:30:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  2 02:30:49 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  2 02:30:50 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  2 02:30:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color admin-username is-secure
Jan  2 02:30:50 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  2 02:30:50 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  2 02:30:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  2 02:30:50 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  2 02:30:51 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  2 02:30:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/public_html/wp-config.php
Jan  2 02:30:51 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  2 02:30:51 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  2 02:30:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/stat -c %a /home/shalinijames/public_html/wp-config.php
Jan  2 02:30:51 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  2 02:30:51 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  2 02:30:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color pingbacks is_disabled
Jan  2 02:30:51 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  2 02:30:51 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  2 02:30:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  2 02:30:51 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  2 02:30:51 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  2 02:30:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color security-keys are_keys_correct
Jan  2 02:30:51 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  2 02:30:52 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  2 02:30:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwtestugo --output=json
Jan  2 02:30:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:30:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:30:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color instance info --format=json --check-updates=true
Jan  2 02:30:52 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:30:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:30:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option get auto_update_plugins --format=json
Jan  2 02:30:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:30:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:30:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option get auto_update_themes --format=json
Jan  2 02:30:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:30:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:30:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  2 02:30:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:30:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:30:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo LangPHP php_get_vhost_versions --output=json
Jan  2 02:30:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:30:59 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:30:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color instance login-url --skip-plugins=false --format=json
Jan  2 02:30:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DomainInfo single_domain_data domain=testugo.in return_https_redirect_status=1 --output=json
Jan  2 02:31:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:31:00 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:31:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo Mime list_redirects --output=json
Jan  2 02:31:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:31:00 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:31:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  2 02:31:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option get auto_update_plugins --format=json
Jan  2 02:31:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  2 02:31:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option get auto_update_themes --format=json
Jan  2 02:31:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt1/wp-config.php
Jan  2 02:31:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  2 02:31:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt1/.maintenance
Jan  2 02:31:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color db-prefix get
Jan  2 02:31:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/tt1 --output=json
Jan  2 02:31:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:31:06 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:31:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  2 02:31:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color wpt-cron event reschedule wp_version_check '+2 day'
Jan  2 02:31:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day'
Jan  2 02:31:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  2 02:31:08 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  2 02:31:08 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color admin-username is-secure
Jan  2 02:31:08 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  2 02:31:09 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt1/wp-config.php
Jan  2 02:31:09 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/stat -c %a /home/wwwtestugo/public_html/tt1/wp-config.php
Jan  2 02:31:09 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color pingbacks is_disabled
Jan  2 02:31:09 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:10 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  2 02:31:10 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:10 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color security-keys are_keys_correct
Jan  2 02:31:10 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:10 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color instance info --format=json --check-updates=true
Jan  2 02:31:11 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:15 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option get auto_update_plugins --format=json
Jan  2 02:31:15 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:15 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option get auto_update_themes --format=json
Jan  2 02:31:16 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:16 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  2 02:31:16 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:16 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color instance login-url --skip-plugins=false --format=json
Jan  2 02:31:16 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:16 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  2 02:31:17 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:17 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option get auto_update_plugins --format=json
Jan  2 02:31:17 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:17 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  2 02:31:18 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:21 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option get auto_update_themes --format=json
Jan  2 02:31:21 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:22 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt/wp-config.php
Jan  2 02:31:22 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:22 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  2 02:31:22 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:22 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt/.maintenance
Jan  2 02:31:22 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:22 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color db-prefix get
Jan  2 02:31:22 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:22 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/tt --output=json
Jan  2 02:31:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:31:23 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:31:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  2 02:31:23 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:23 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color wpt-cron event reschedule wp_version_check '+2 day'
Jan  2 02:31:23 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:24 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day'
Jan  2 02:31:24 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:24 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  2 02:31:24 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:24 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  2 02:31:24 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:25 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color admin-username is-secure
Jan  2 02:31:25 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:25 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  2 02:31:25 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:26 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt/wp-config.php
Jan  2 02:31:26 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:26 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/stat -c %a /home/wwwtestugo/public_html/tt/wp-config.php
Jan  2 02:31:26 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:26 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color pingbacks is_disabled
Jan  2 02:31:26 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:26 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  2 02:31:26 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:27 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color security-keys are_keys_correct
Jan  2 02:31:27 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:27 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color instance info --format=json --check-updates=true
Jan  2 02:31:27 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:32 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option get auto_update_plugins --format=json
Jan  2 02:31:32 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:33 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option get auto_update_themes --format=json
Jan  2 02:31:33 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:33 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  2 02:31:33 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:33 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color instance login-url --skip-plugins=false --format=json
Jan  2 02:31:33 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:35 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  2 02:31:35 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:35 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option get auto_update_plugins --format=json
Jan  2 02:31:35 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:36 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  2 02:31:36 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:40 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option get auto_update_themes --format=json
Jan  2 02:31:40 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:40 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/HYPE/wp-config.php
Jan  2 02:31:40 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:40 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  2 02:31:40 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:40 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/HYPE/.maintenance
Jan  2 02:31:41 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:41 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color db-prefix get
Jan  2 02:31:41 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:41 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/HYPE --output=json
Jan  2 02:31:41 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:31:41 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:31:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  2 02:31:41 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:41 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color wpt-cron event reschedule wp_version_check '+2 day'
Jan  2 02:31:42 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:42 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day'
Jan  2 02:31:42 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:42 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  2 02:31:42 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:43 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  2 02:31:43 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:43 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color admin-username is-secure
Jan  2 02:31:43 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:44 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  2 02:31:44 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:44 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/HYPE/wp-config.php
Jan  2 02:31:44 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:44 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/stat -c %a /home/wwwtestugo/public_html/HYPE/wp-config.php
Jan  2 02:31:44 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:44 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color pingbacks is_disabled
Jan  2 02:31:44 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:44 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  2 02:31:44 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:45 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color security-keys are_keys_correct
Jan  2 02:31:45 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:31:45 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:31:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=ugotscom --output=json
Jan  2 02:31:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:31:45 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:31:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/boniface/blog && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/boniface/blog --no-color instance info --format=json --check-updates=true
Jan  2 02:31:45 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 02:31:46 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 02:31:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DomainInfo single_domain_data domain=ugotechnologies.com return_https_redirect_status=1 --output=json
Jan  2 02:31:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:31:46 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:31:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom Mime list_redirects --output=json
Jan  2 02:31:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:31:46 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:31:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/boniface/blog/wp-includes/version.php
Jan  2 02:31:46 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 02:31:46 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 02:31:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/public_html/boniface/blog/wp-includes/version.php
Jan  2 02:31:46 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 02:31:46 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 02:31:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  2 02:31:46 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 02:31:46 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 02:31:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom LangPHP php_get_vhost_versions --output=json
Jan  2 02:31:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:31:46 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:31:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color instance info --format=json --check-updates=true
Jan  2 02:31:46 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 02:31:53 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 02:31:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option get auto_update_plugins --format=json
Jan  2 02:31:53 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 02:31:54 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 02:31:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option get auto_update_themes --format=json
Jan  2 02:31:54 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 02:31:54 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 02:31:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  2 02:31:54 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 02:31:54 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 02:31:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color instance login-url --skip-plugins=false --format=json
Jan  2 02:31:54 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 02:31:54 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 02:31:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  2 02:31:54 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 02:31:56 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 02:31:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option get auto_update_plugins --format=json
Jan  2 02:31:56 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 02:31:56 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 02:31:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  2 02:31:56 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 02:32:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 02:32:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option get auto_update_themes --format=json
Jan  2 02:32:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 02:32:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 02:32:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/UGOCRM/ugo_blg/wp-config.php
Jan  2 02:32:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 02:32:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 02:32:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  2 02:32:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 02:32:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 02:32:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/UGOCRM/ugo_blg/.maintenance
Jan  2 02:32:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 02:32:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 02:32:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color db-prefix get
Jan  2 02:32:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 02:32:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 02:32:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DirectoryPrivacy is_directory_protected dir=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --output=json
Jan  2 02:32:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:32:02 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:32:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  2 02:32:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 02:32:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 02:32:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color wpt-cron event reschedule wp_version_check '+2 day'
Jan  2 02:32:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 02:32:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 02:32:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day'
Jan  2 02:32:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 02:32:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 02:32:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  2 02:32:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 02:32:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 02:32:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  2 02:32:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 02:32:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 02:32:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color admin-username is-secure
Jan  2 02:32:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 02:32:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 02:32:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  2 02:32:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 02:32:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 02:32:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/UGOCRM/ugo_blg/wp-config.php
Jan  2 02:32:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 02:32:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 02:32:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/stat -c %a /home/ugotscom/public_html/old/UGOCRM/ugo_blg/wp-config.php
Jan  2 02:32:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 02:32:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 02:32:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color pingbacks is_disabled
Jan  2 02:32:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 02:32:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 02:32:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  2 02:32:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 02:32:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 02:32:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color security-keys are_keys_correct
Jan  2 02:32:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 02:32:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 02:32:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color instance info --format=json --check-updates=true
Jan  2 02:32:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 02:32:10 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 02:32:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option get auto_update_plugins --format=json
Jan  2 02:32:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 02:32:10 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 02:32:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option get auto_update_themes --format=json
Jan  2 02:32:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 02:32:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 02:32:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  2 02:32:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 02:32:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 02:32:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color instance login-url --skip-plugins=false --format=json
Jan  2 02:32:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 02:32:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 02:32:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  2 02:32:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 02:32:13 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 02:32:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option get auto_update_plugins --format=json
Jan  2 02:32:13 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 02:32:13 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 02:32:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  2 02:32:13 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 02:32:14 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 02:32:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option get auto_update_themes --format=json
Jan  2 02:32:14 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 02:32:15 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 02:32:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/site/wp-config.php
Jan  2 02:32:15 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 02:32:15 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 02:32:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  2 02:32:15 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 02:32:15 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 02:32:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/site/.maintenance
Jan  2 02:32:15 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 02:32:15 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 02:32:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color db-prefix get
Jan  2 02:32:15 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 02:32:16 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 02:32:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DirectoryPrivacy is_directory_protected dir=/home/ugotscom/public_html/old/site --output=json
Jan  2 02:32:16 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:32:16 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:32:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  2 02:32:16 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 02:32:16 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 02:32:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color wpt-cron event reschedule wp_version_check '+2 day'
Jan  2 02:32:16 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 02:32:17 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 02:32:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day'
Jan  2 02:32:17 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 02:32:17 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 02:32:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  2 02:32:17 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 02:32:17 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 02:32:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  2 02:32:18 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 02:32:19 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 02:32:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color admin-username is-secure
Jan  2 02:32:19 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 02:32:19 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 02:32:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  2 02:32:19 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 02:32:19 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 02:32:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/site/wp-config.php
Jan  2 02:32:19 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 02:32:19 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 02:32:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/stat -c %a /home/ugotscom/public_html/old/site/wp-config.php
Jan  2 02:32:19 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 02:32:19 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 02:32:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color pingbacks is_disabled
Jan  2 02:32:19 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 02:32:20 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 02:32:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  2 02:32:20 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 02:32:20 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 02:32:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color security-keys are_keys_correct
Jan  2 02:32:20 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 02:32:21 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 02:32:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=woodpeck --output=json
Jan  2 02:32:21 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:32:21 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:32:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html/wp && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/woodpeck/public_html/wp --no-color instance info --format=json --check-updates=true
Jan  2 02:32:21 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0)
Jan  2 02:32:21 host sudo: pam_unix(sudo:session): session closed for user woodpeck
Jan  2 02:32:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck DomainInfo single_domain_data domain=woodpeckerindia.com return_https_redirect_status=1 --output=json
Jan  2 02:32:21 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:32:21 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:32:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck Mime list_redirects --output=json
Jan  2 02:32:21 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:32:21 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:32:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/test -e /home/woodpeck/public_html/wp/wp-includes/version.php
Jan  2 02:32:21 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0)
Jan  2 02:32:21 host sudo: pam_unix(sudo:session): session closed for user woodpeck
Jan  2 02:32:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  2 02:32:21 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0)
Jan  2 02:32:21 host sudo: pam_unix(sudo:session): session closed for user woodpeck
Jan  2 02:32:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck LangPHP php_get_vhost_versions --output=json
Jan  2 02:32:21 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:32:21 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:32:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=palco123 --output=json
Jan  2 02:32:21 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:32:22 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:32:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color instance info --format=json --check-updates=true
Jan  2 02:32:22 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  2 02:32:29 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  2 02:32:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false
Jan  2 02:32:30 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  2 02:32:30 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  2 02:32:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false
Jan  2 02:32:30 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  2 02:32:36 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  2 02:32:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  2 02:32:36 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  2 02:32:36 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  2 02:32:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 LangPHP php_get_vhost_versions --output=json
Jan  2 02:32:36 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:32:36 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:32:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color instance login-url --skip-plugins=false --format=json
Jan  2 02:32:36 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  2 02:32:37 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  2 02:32:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 DomainInfo single_domain_data domain=panlys.com return_https_redirect_status=1 --output=json
Jan  2 02:32:37 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:32:37 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:32:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 Mime list_redirects --output=json
Jan  2 02:32:37 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:32:37 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:32:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  2 02:32:37 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  2 02:32:38 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  2 02:32:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false
Jan  2 02:32:38 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  2 02:32:39 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  2 02:32:39 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  2 02:32:39 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  2 02:32:44 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  2 02:32:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false
Jan  2 02:32:44 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  2 02:32:49 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  2 02:32:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/public_html/wp-config.php
Jan  2 02:32:49 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  2 02:32:49 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  2 02:32:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  2 02:32:49 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  2 02:32:50 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  2 02:32:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/public_html/.maintenance
Jan  2 02:32:50 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  2 02:32:50 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  2 02:32:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color db-prefix get
Jan  2 02:32:50 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  2 02:32:51 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  2 02:32:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 DirectoryPrivacy is_directory_protected dir=/home/palco123/public_html --output=json
Jan  2 02:32:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:32:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:32:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  2 02:32:51 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  2 02:32:51 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  2 02:32:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color option get auto_update_core_major
Jan  2 02:32:51 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  2 02:32:52 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  2 02:32:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color wpt-cron event reschedule wp_version_check '+2 day'
Jan  2 02:32:52 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  2 02:32:53 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  2 02:32:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day'
Jan  2 02:32:53 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  2 02:32:53 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  2 02:32:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color admin-username is-secure
Jan  2 02:32:53 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  2 02:32:54 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  2 02:32:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  2 02:32:54 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  2 02:32:54 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  2 02:32:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/public_html/wp-config.php
Jan  2 02:32:54 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  2 02:32:54 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  2 02:32:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/stat -c %a /home/palco123/public_html/wp-config.php
Jan  2 02:32:54 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  2 02:32:54 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  2 02:32:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color pingbacks is_disabled
Jan  2 02:32:54 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  2 02:32:55 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  2 02:32:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  2 02:32:55 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  2 02:32:55 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  2 02:32:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color security-keys are_keys_correct
Jan  2 02:32:55 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  2 02:32:56 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  2 02:32:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwresourcehunte --output=json
Jan  2 02:32:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:32:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:32:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color instance info --format=json --check-updates=true
Jan  2 02:32:56 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  2 02:33:00 host sshd[6486]: User root from 187.217.117.3 not allowed because not listed in AllowUsers
Jan  2 02:33:00 host sshd[6486]: input_userauth_request: invalid user root [preauth]
Jan  2 02:33:00 host unix_chkpwd[6494]: password check failed for user (root)
Jan  2 02:33:00 host sshd[6486]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.217.117.3  user=root
Jan  2 02:33:00 host sshd[6486]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 02:33:02 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  2 02:33:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option get auto_update_plugins --format=json
Jan  2 02:33:02 host sshd[6486]: Failed password for invalid user root from 187.217.117.3 port 35002 ssh2
Jan  2 02:33:02 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  2 02:33:03 host sshd[6486]: Received disconnect from 187.217.117.3 port 35002:11: Bye Bye [preauth]
Jan  2 02:33:03 host sshd[6486]: Disconnected from 187.217.117.3 port 35002 [preauth]
Jan  2 02:33:03 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  2 02:33:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option get auto_update_themes --format=json
Jan  2 02:33:03 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  2 02:33:03 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  2 02:33:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  2 02:33:03 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  2 02:33:03 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  2 02:33:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte LangPHP php_get_vhost_versions --output=json
Jan  2 02:33:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:33:03 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:33:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color instance login-url --skip-plugins=false --format=json
Jan  2 02:33:03 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  2 02:33:04 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  2 02:33:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte DomainInfo single_domain_data domain=resourcehunters.com return_https_redirect_status=1 --output=json
Jan  2 02:33:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:33:04 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:33:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte Mime list_redirects --output=json
Jan  2 02:33:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:33:04 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:33:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  2 02:33:04 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  2 02:33:04 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  2 02:33:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option get auto_update_plugins --format=json
Jan  2 02:33:04 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  2 02:33:05 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  2 02:33:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  2 02:33:05 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  2 02:33:10 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  2 02:33:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option get auto_update_themes --format=json
Jan  2 02:33:10 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  2 02:33:10 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  2 02:33:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/test -e /home/wwwresourcehunte/public_html/wp-config.php
Jan  2 02:33:10 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  2 02:33:10 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  2 02:33:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  2 02:33:10 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  2 02:33:10 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  2 02:33:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/test -e /home/wwwresourcehunte/public_html/.maintenance
Jan  2 02:33:10 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  2 02:33:10 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  2 02:33:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color db-prefix get
Jan  2 02:33:10 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  2 02:33:11 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  2 02:33:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte DirectoryPrivacy is_directory_protected dir=/home/wwwresourcehunte/public_html --output=json
Jan  2 02:33:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:33:11 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:33:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  2 02:33:11 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  2 02:33:11 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  2 02:33:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color wpt-cron event reschedule wp_version_check '+2 day'
Jan  2 02:33:12 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  2 02:33:12 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  2 02:33:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day'
Jan  2 02:33:12 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  2 02:33:12 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  2 02:33:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  2 02:33:12 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  2 02:33:13 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  2 02:33:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  2 02:33:13 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  2 02:33:13 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  2 02:33:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color admin-username is-secure
Jan  2 02:33:13 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  2 02:33:13 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  2 02:33:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  2 02:33:13 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  2 02:33:13 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  2 02:33:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/test -e /home/wwwresourcehunte/public_html/wp-config.php
Jan  2 02:33:14 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  2 02:33:14 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  2 02:33:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/stat -c %a /home/wwwresourcehunte/public_html/wp-config.php
Jan  2 02:33:14 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  2 02:33:14 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  2 02:33:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color pingbacks is_disabled
Jan  2 02:33:14 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  2 02:33:14 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  2 02:33:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  2 02:33:14 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  2 02:33:14 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  2 02:33:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color security-keys are_keys_correct
Jan  2 02:33:14 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  2 02:33:15 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  2 02:33:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=laundryboniface WpToolkitNotification send_admin_auto_updates_notification 'available_updates_text=<br/><br/>Updates are available for the following items:<br/><br/>' 'available_updates_list=1. Plugin "SiteOrigin Widgets Bundle" on  (http://ugotechnologies.com/old). Installed version: 1.8.1. Available version: 1.46.1.<br/><br/>' installed_updates_text= installed_updates_list= 'failure_updates_text=Updates were not installed for the following items:<br/><br/>' 'failure_updates_list=1. Website "EVM Honda Cochin" (http://www.evmhonda.com): Failed to reset cache for the instance #1: Fatal error: Uncaught Error: Call to undefined function cardealer_is_wpml_active() in /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-options.php:1041#012Stack trace:#012#0
Jan  2 02:33:15 host sudo: wp-toolkit : (command continued) /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-init.php(22): require_once()#012#1 /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/cardealer-helper-library.php(183): require_once('"'"'/home/wwwevmhon...'"'"')#012#2 /home/wwwevmhonda/public_html/wp-includes/class-wp-hook.php(287): cdhl_include_admin_files('"'"''"'"')#012#3 /home/wwwevmhonda/public_html/wp-includes/class-wp-hook.php(311): WP_Hook->apply_filters(NULL, Array)#012#4 /home/wwwevmhonda/public_html/wp-includes/plugin.php(478): WP_Hook->do_action(Array)#012#5 /home/wwwevmhonda/public_html/wp-settings.php(546): do_action('"'"'init'"'"')#012#6 /usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/vendor/wp-cli/wp-cli/php/WP_CLI/Runner.php(1356): require('"'"'/home/wwwevmhon...'"'"')#012#7 /usr/local/cpanel/3rdparty/wp-toolkit/plib/ve in
Jan  2 02:33:15 host sudo: wp-toolkit : (command continued) /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-options.php on line 1041#012Error: There has been a critical error on your website.Learn more about debugging in WordPress. There has been a critical error on your website.#012<br/><br/>2. Website "/home/mrsclean/public_html/backup" (http://mrsclean.co.in/backup): Failed to reset cache for the instance #5: Error: Error establishing a database connection. This either means that the username and password information in your `wp-config.php` file is incorrect or we can’t contact the database server at `localhost`. This could mean your host’s database server is down.#012<br/><br/>3. Website "/home/mrsclean/public_html/blog" (http://mrsclean.co.in/blog): Failed to reset cache for the instance #6: Error: Error establishing a database connection. This either means that the username and password information in your `wp-config.php`
Jan  2 02:33:15 host sudo: wp-toolkit : (command continued) file is incorrect or we can’t contact the database server at `localhost`. This could mean your host’s database server is down.#012<br/><br/>4. Website "/home/ugotscom/public_html/boniface/blog" (http://ugotechnologies.com/boniface/blog): Failed to reset cache for the instance #13: Error: Error establishing a database connection.#012<br/><br/>5. Website "/home/woodpeck/public_html/wp" (http://woodpeckerindia.com/wp): Failed to reset cache for the instance #16: /bin/sh: line 0: cd: /home/woodpeck/public_html/wp: No such file or directory#012<br/><br/>' --output=json
Jan  2 02:33:15 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:33:15 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:33:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color cli cache clear
Jan  2 02:33:15 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  2 02:33:15 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  2 02:33:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color cli cache clear
Jan  2 02:33:15 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  2 02:33:15 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  2 02:33:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/backup && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/mrsclean/public_html/backup --no-color cli cache clear
Jan  2 02:33:15 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  2 02:33:15 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  2 02:33:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/blog && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/mrsclean/public_html/blog --no-color cli cache clear
Jan  2 02:33:15 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  2 02:33:15 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  2 02:33:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color cli cache clear
Jan  2 02:33:16 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  2 02:33:16 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  2 02:33:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color cli cache clear
Jan  2 02:33:16 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:33:16 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:33:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color cli cache clear
Jan  2 02:33:16 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:33:16 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:33:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color cli cache clear
Jan  2 02:33:16 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:33:16 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:33:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/boniface/blog && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/boniface/blog --no-color cli cache clear
Jan  2 02:33:16 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 02:33:16 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 02:33:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color cli cache clear
Jan  2 02:33:17 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 02:33:17 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 02:33:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color cli cache clear
Jan  2 02:33:17 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 02:33:17 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 02:33:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html/wp && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/woodpeck/public_html/wp --no-color cli cache clear
Jan  2 02:33:17 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0)
Jan  2 02:33:17 host sudo: pam_unix(sudo:session): session closed for user woodpeck
Jan  2 02:33:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color cli cache clear
Jan  2 02:33:17 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  2 02:33:17 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  2 02:33:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color cli cache clear
Jan  2 02:33:17 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  2 02:33:17 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  2 02:33:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet
Jan  2 02:33:17 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  2 02:33:18 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  2 02:33:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet
Jan  2 02:33:18 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  2 02:33:18 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  2 02:33:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet
Jan  2 02:33:18 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  2 02:33:19 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  2 02:33:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet
Jan  2 02:33:19 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:33:20 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:33:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet
Jan  2 02:33:20 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:33:20 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:33:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet
Jan  2 02:33:20 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 02:33:20 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 02:33:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet
Jan  2 02:33:20 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 02:33:21 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 02:33:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet
Jan  2 02:33:21 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 02:33:21 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 02:33:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet
Jan  2 02:33:21 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  2 02:33:22 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  2 02:33:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet
Jan  2 02:33:22 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  2 02:33:22 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  2 02:33:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c httpd -v
Jan  2 02:33:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:33:22 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:33:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwevmhonda/evmhonda.com/wp-toolkit.conf
Jan  2 02:33:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:33:22 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:33:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwevmhonda/evmhonda.com/wp-toolkit.conf
Jan  2 02:33:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:33:22 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:33:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwevmhonda/evmhonda.com/wp-toolkit.conf
Jan  2 02:33:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:33:22 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:33:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwevmhonda/evmhonda.com/wp-toolkit.conf
Jan  2 02:33:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:33:22 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:33:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf
Jan  2 02:33:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:33:22 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:33:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf
Jan  2 02:33:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:33:22 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:33:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf
Jan  2 02:33:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:33:22 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:33:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf
Jan  2 02:33:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:33:22 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:33:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/shalinijames/shalinijames.com/wp-toolkit.conf
Jan  2 02:33:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:33:22 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/shalinijames/shalinijames.com/wp-toolkit.conf
Jan  2 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/shalinijames/shalinijames.com/wp-toolkit.conf
Jan  2 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/shalinijames/shalinijames.com/wp-toolkit.conf
Jan  2 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  2 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  2 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  2 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  2 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  2 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  2 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  2 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  2 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  2 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  2 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  2 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  2 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf
Jan  2 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf
Jan  2 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf
Jan  2 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf
Jan  2 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf
Jan  2 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf
Jan  2 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf
Jan  2 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf
Jan  2 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/palco123/panlys.com/wp-toolkit.conf
Jan  2 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/palco123/panlys.com/wp-toolkit.conf
Jan  2 02:33:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:33:24 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/palco123/panlys.com/wp-toolkit.conf
Jan  2 02:33:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:33:24 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/palco123/panlys.com/wp-toolkit.conf
Jan  2 02:33:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:33:24 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf
Jan  2 02:33:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:33:24 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf
Jan  2 02:33:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:33:24 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf
Jan  2 02:33:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:33:24 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf
Jan  2 02:33:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 02:33:24 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 02:36:55 host sshd[7688]: User root from 187.217.117.3 not allowed because not listed in AllowUsers
Jan  2 02:36:55 host sshd[7688]: input_userauth_request: invalid user root [preauth]
Jan  2 02:36:55 host unix_chkpwd[7692]: password check failed for user (root)
Jan  2 02:36:55 host sshd[7688]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.217.117.3  user=root
Jan  2 02:36:55 host sshd[7688]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 02:36:57 host sshd[7688]: Failed password for invalid user root from 187.217.117.3 port 49092 ssh2
Jan  2 02:37:06 host sshd[7744]: User root from 150.230.235.117 not allowed because not listed in AllowUsers
Jan  2 02:37:06 host sshd[7744]: input_userauth_request: invalid user root [preauth]
Jan  2 02:37:06 host unix_chkpwd[7746]: password check failed for user (root)
Jan  2 02:37:06 host sshd[7744]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.230.235.117  user=root
Jan  2 02:37:06 host sshd[7744]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 02:37:08 host sshd[7744]: Failed password for invalid user root from 150.230.235.117 port 57466 ssh2
Jan  2 02:37:45 host sshd[7850]: Invalid user admin from 162.218.126.136 port 60412
Jan  2 02:37:45 host sshd[7850]: input_userauth_request: invalid user admin [preauth]
Jan  2 02:37:45 host sshd[7850]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 02:37:45 host sshd[7850]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136
Jan  2 02:37:47 host sshd[7850]: Failed password for invalid user admin from 162.218.126.136 port 60412 ssh2
Jan  2 02:37:48 host sshd[7850]: Connection closed by 162.218.126.136 port 60412 [preauth]
Jan  2 02:44:52 host sshd[8799]: User root from 216.147.120.185 not allowed because not listed in AllowUsers
Jan  2 02:44:52 host sshd[8799]: input_userauth_request: invalid user root [preauth]
Jan  2 02:44:52 host unix_chkpwd[8809]: password check failed for user (root)
Jan  2 02:44:52 host sshd[8799]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.147.120.185  user=root
Jan  2 02:44:52 host sshd[8799]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 02:44:54 host sshd[8799]: Failed password for invalid user root from 216.147.120.185 port 48590 ssh2
Jan  2 02:44:54 host sshd[8799]: Received disconnect from 216.147.120.185 port 48590:11: Bye Bye [preauth]
Jan  2 02:44:54 host sshd[8799]: Disconnected from 216.147.120.185 port 48590 [preauth]
Jan  2 02:45:36 host sshd[9018]: Invalid user web from 158.160.42.148 port 40482
Jan  2 02:45:36 host sshd[9018]: input_userauth_request: invalid user web [preauth]
Jan  2 02:45:36 host sshd[9018]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 02:45:36 host sshd[9018]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.160.42.148
Jan  2 02:45:39 host sshd[9018]: Failed password for invalid user web from 158.160.42.148 port 40482 ssh2
Jan  2 02:45:39 host sshd[9018]: Received disconnect from 158.160.42.148 port 40482:11: Bye Bye [preauth]
Jan  2 02:45:39 host sshd[9018]: Disconnected from 158.160.42.148 port 40482 [preauth]
Jan  2 02:46:52 host sshd[9169]: User root from 189.6.45.130 not allowed because not listed in AllowUsers
Jan  2 02:46:52 host sshd[9169]: input_userauth_request: invalid user root [preauth]
Jan  2 02:46:52 host unix_chkpwd[9174]: password check failed for user (root)
Jan  2 02:46:52 host sshd[9169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.6.45.130  user=root
Jan  2 02:46:52 host sshd[9169]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 02:46:54 host sshd[9169]: Failed password for invalid user root from 189.6.45.130 port 50987 ssh2
Jan  2 02:46:54 host sshd[9169]: Received disconnect from 189.6.45.130 port 50987:11: Bye Bye [preauth]
Jan  2 02:46:54 host sshd[9169]: Disconnected from 189.6.45.130 port 50987 [preauth]
Jan  2 02:47:12 host sshd[9210]: User root from 143.198.144.234 not allowed because not listed in AllowUsers
Jan  2 02:47:12 host sshd[9210]: input_userauth_request: invalid user root [preauth]
Jan  2 02:47:12 host unix_chkpwd[9219]: password check failed for user (root)
Jan  2 02:47:12 host sshd[9210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.144.234  user=root
Jan  2 02:47:12 host sshd[9210]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 02:47:15 host sshd[9210]: Failed password for invalid user root from 143.198.144.234 port 60018 ssh2
Jan  2 02:47:15 host sshd[9210]: Received disconnect from 143.198.144.234 port 60018:11: Bye Bye [preauth]
Jan  2 02:47:15 host sshd[9210]: Disconnected from 143.198.144.234 port 60018 [preauth]
Jan  2 02:47:22 host sshd[9235]: User root from 65.109.134.138 not allowed because not listed in AllowUsers
Jan  2 02:47:22 host sshd[9235]: input_userauth_request: invalid user root [preauth]
Jan  2 02:47:22 host unix_chkpwd[9239]: password check failed for user (root)
Jan  2 02:47:22 host sshd[9235]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.109.134.138  user=root
Jan  2 02:47:22 host sshd[9235]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 02:47:23 host sshd[9235]: Failed password for invalid user root from 65.109.134.138 port 42560 ssh2
Jan  2 02:47:23 host sshd[9235]: Received disconnect from 65.109.134.138 port 42560:11: Bye Bye [preauth]
Jan  2 02:47:23 host sshd[9235]: Disconnected from 65.109.134.138 port 42560 [preauth]
Jan  2 02:48:50 host sshd[9412]: User root from 111.70.0.154 not allowed because not listed in AllowUsers
Jan  2 02:48:50 host sshd[9412]: input_userauth_request: invalid user root [preauth]
Jan  2 02:48:51 host unix_chkpwd[9419]: password check failed for user (root)
Jan  2 02:48:51 host sshd[9412]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.70.0.154  user=root
Jan  2 02:48:51 host sshd[9412]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 02:48:52 host sshd[9412]: Failed password for invalid user root from 111.70.0.154 port 56813 ssh2
Jan  2 02:48:53 host sshd[9412]: Connection closed by 111.70.0.154 port 56813 [preauth]
Jan  2 02:50:12 host sshd[9602]: Did not receive identification string from 182.43.174.35 port 40190
Jan  2 02:50:13 host sshd[9604]: User root from 182.43.174.35 not allowed because not listed in AllowUsers
Jan  2 02:50:13 host sshd[9604]: input_userauth_request: invalid user root [preauth]
Jan  2 02:50:13 host sshd[9606]: Invalid user student from 182.43.174.35 port 40756
Jan  2 02:50:13 host sshd[9606]: input_userauth_request: invalid user student [preauth]
Jan  2 02:50:13 host sshd[9608]: Invalid user ftpuser from 182.43.174.35 port 40758
Jan  2 02:50:13 host sshd[9608]: input_userauth_request: invalid user ftpuser [preauth]
Jan  2 02:50:14 host sshd[9606]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 02:50:14 host sshd[9606]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.43.174.35
Jan  2 02:50:14 host unix_chkpwd[9626]: password check failed for user (root)
Jan  2 02:50:14 host sshd[9604]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.43.174.35  user=root
Jan  2 02:50:14 host sshd[9604]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 02:50:14 host sshd[9608]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 02:50:14 host sshd[9608]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.43.174.35
Jan  2 02:50:15 host sshd[9606]: Failed password for invalid user student from 182.43.174.35 port 40756 ssh2
Jan  2 02:50:15 host sshd[9604]: Failed password for invalid user root from 182.43.174.35 port 40754 ssh2
Jan  2 02:50:15 host sshd[9608]: Failed password for invalid user ftpuser from 182.43.174.35 port 40758 ssh2
Jan  2 02:50:16 host sshd[9604]: Connection closed by 182.43.174.35 port 40754 [preauth]
Jan  2 02:50:16 host sshd[9606]: Connection closed by 182.43.174.35 port 40756 [preauth]
Jan  2 02:50:16 host sshd[9608]: Connection closed by 182.43.174.35 port 40758 [preauth]
Jan  2 02:50:21 host sshd[9670]: User root from 158.160.42.148 not allowed because not listed in AllowUsers
Jan  2 02:50:21 host sshd[9670]: input_userauth_request: invalid user root [preauth]
Jan  2 02:50:21 host unix_chkpwd[9674]: password check failed for user (root)
Jan  2 02:50:21 host sshd[9670]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.160.42.148  user=root
Jan  2 02:50:21 host sshd[9670]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 02:50:23 host sshd[9670]: Failed password for invalid user root from 158.160.42.148 port 40690 ssh2
Jan  2 02:50:23 host sshd[9670]: Received disconnect from 158.160.42.148 port 40690:11: Bye Bye [preauth]
Jan  2 02:50:23 host sshd[9670]: Disconnected from 158.160.42.148 port 40690 [preauth]
Jan  2 02:50:29 host sshd[9752]: User root from 143.198.144.234 not allowed because not listed in AllowUsers
Jan  2 02:50:30 host sshd[9752]: input_userauth_request: invalid user root [preauth]
Jan  2 02:50:30 host unix_chkpwd[9801]: password check failed for user (root)
Jan  2 02:50:30 host sshd[9752]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.144.234  user=root
Jan  2 02:50:30 host sshd[9752]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 02:50:32 host sshd[9752]: Failed password for invalid user root from 143.198.144.234 port 60194 ssh2
Jan  2 02:50:32 host sshd[9752]: Received disconnect from 143.198.144.234 port 60194:11: Bye Bye [preauth]
Jan  2 02:50:32 host sshd[9752]: Disconnected from 143.198.144.234 port 60194 [preauth]
Jan  2 02:51:09 host sshd[9930]: User root from 216.147.120.185 not allowed because not listed in AllowUsers
Jan  2 02:51:09 host sshd[9930]: input_userauth_request: invalid user root [preauth]
Jan  2 02:51:09 host unix_chkpwd[9935]: password check failed for user (root)
Jan  2 02:51:09 host sshd[9930]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.147.120.185  user=root
Jan  2 02:51:09 host sshd[9930]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 02:51:11 host sshd[9930]: Failed password for invalid user root from 216.147.120.185 port 41098 ssh2
Jan  2 02:51:12 host sshd[9930]: Received disconnect from 216.147.120.185 port 41098:11: Bye Bye [preauth]
Jan  2 02:51:12 host sshd[9930]: Disconnected from 216.147.120.185 port 41098 [preauth]
Jan  2 02:51:16 host sshd[9976]: User root from 65.109.134.138 not allowed because not listed in AllowUsers
Jan  2 02:51:16 host sshd[9976]: input_userauth_request: invalid user root [preauth]
Jan  2 02:51:16 host unix_chkpwd[9979]: password check failed for user (root)
Jan  2 02:51:16 host sshd[9976]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.109.134.138  user=root
Jan  2 02:51:16 host sshd[9976]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 02:51:18 host sshd[9976]: Failed password for invalid user root from 65.109.134.138 port 48066 ssh2
Jan  2 02:52:11 host sshd[10097]: User root from 189.6.45.130 not allowed because not listed in AllowUsers
Jan  2 02:52:11 host sshd[10097]: input_userauth_request: invalid user root [preauth]
Jan  2 02:52:11 host unix_chkpwd[10103]: password check failed for user (root)
Jan  2 02:52:11 host sshd[10097]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.6.45.130  user=root
Jan  2 02:52:11 host sshd[10097]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 02:52:13 host sshd[10097]: Failed password for invalid user root from 189.6.45.130 port 34215 ssh2
Jan  2 03:05:45 host sshd[12126]: Invalid user monitor from 103.13.40.2 port 38784
Jan  2 03:05:45 host sshd[12126]: input_userauth_request: invalid user monitor [preauth]
Jan  2 03:05:45 host sshd[12126]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 03:05:45 host sshd[12126]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2
Jan  2 03:05:47 host sshd[12126]: Failed password for invalid user monitor from 103.13.40.2 port 38784 ssh2
Jan  2 03:05:47 host sshd[12126]: Connection closed by 103.13.40.2 port 38784 [preauth]
Jan  2 03:07:42 host sshd[12393]: Invalid user support from 179.185.3.141 port 46318
Jan  2 03:07:42 host sshd[12393]: input_userauth_request: invalid user support [preauth]
Jan  2 03:07:43 host sshd[12393]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 03:07:43 host sshd[12393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.185.3.141
Jan  2 03:07:45 host sshd[12393]: Failed password for invalid user support from 179.185.3.141 port 46318 ssh2
Jan  2 03:07:45 host sshd[12393]: Connection closed by 179.185.3.141 port 46318 [preauth]
Jan  2 03:10:18 host sshd[12800]: User root from 106.10.122.53 not allowed because not listed in AllowUsers
Jan  2 03:10:18 host sshd[12800]: input_userauth_request: invalid user root [preauth]
Jan  2 03:10:18 host unix_chkpwd[12806]: password check failed for user (root)
Jan  2 03:10:18 host sshd[12800]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53  user=root
Jan  2 03:10:18 host sshd[12800]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 03:10:20 host sshd[12800]: Failed password for invalid user root from 106.10.122.53 port 44324 ssh2
Jan  2 03:10:20 host sshd[12800]: Connection closed by 106.10.122.53 port 44324 [preauth]
Jan  2 03:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  2 03:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 03:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 03:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  2 03:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 03:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 03:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  2 03:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 03:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 03:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  2 03:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 03:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 03:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  2 03:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 03:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 03:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  2 03:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 03:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 03:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  2 03:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 03:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 03:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  2 03:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 03:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 03:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  2 03:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 03:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 03:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  2 03:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 03:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 03:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  2 03:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 03:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 03:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  2 03:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 03:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 03:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  2 03:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 03:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 03:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwevmhonda user-2=bonifacegroup user-3=wwwletsstalkfood user-4=straightcurve user-5=kottayamcalldriv user-6=phmetals user-7=gifterman user-8=palco123 user-9=wwwnexidigital user-10=mrsclean user-11=remysagr user-12=disposeat user-13=wwwkmaorg user-14=wwwkapin user-15=woodpeck user-16=wwwtestugo user-17=shalinijames user-18=vfmassets user-19=pmcresources user-20=wwwpmcresource user-21=travelboniface user-22=ugotscom user-23=wwwrmswll user-24=keralaholi user-25=wwwresourcehunte user-26=wwwkaretakers user-27=cochintaxi user-28=dartsimp user-29=a2zgroup user-30=laundryboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  2 03:21:50 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  2 03:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 03:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 03:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  2 03:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 03:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 03:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-TBh7nMr3S9igXZOn.~
Jan  2 03:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 03:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 03:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-TBh7nMr3S9igXZOn.~'
Jan  2 03:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 03:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 03:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-TBh7nMr3S9igXZOn.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  2 03:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 03:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 03:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  2 03:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 03:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 03:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  2 03:21:52 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 03:21:52 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 03:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  2 03:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 03:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 03:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  2 03:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 03:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 03:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  2 03:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 03:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 03:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  2 03:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 03:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 03:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  2 03:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 03:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 03:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  2 03:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  2 03:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  2 03:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  2 03:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  2 03:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  2 03:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  2 03:22:01 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  2 03:22:03 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  2 03:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  2 03:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 03:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 03:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  2 03:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 03:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 03:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  2 03:22:08 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 03:22:10 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 03:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  2 03:22:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 03:22:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 03:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  2 03:22:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 03:22:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 03:22:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  2 03:22:13 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  2 03:22:20 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  2 03:37:34 host sshd[17015]: Invalid user service from 194.169.175.102 port 61908
Jan  2 03:37:34 host sshd[17015]: input_userauth_request: invalid user service [preauth]
Jan  2 03:37:34 host sshd[17015]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 03:37:34 host sshd[17015]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.169.175.102
Jan  2 03:37:35 host sshd[17015]: Failed password for invalid user service from 194.169.175.102 port 61908 ssh2
Jan  2 03:37:35 host sshd[17015]: Received disconnect from 194.169.175.102 port 61908:11: Client disconnecting normally [preauth]
Jan  2 03:37:35 host sshd[17015]: Disconnected from 194.169.175.102 port 61908 [preauth]
Jan  2 03:43:01 host sshd[17827]: Invalid user nvidia from 162.218.126.136 port 45336
Jan  2 03:43:01 host sshd[17827]: input_userauth_request: invalid user nvidia [preauth]
Jan  2 03:43:01 host sshd[17827]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 03:43:01 host sshd[17827]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136
Jan  2 03:43:03 host sshd[17827]: Failed password for invalid user nvidia from 162.218.126.136 port 45336 ssh2
Jan  2 03:43:03 host sshd[17827]: Connection closed by 162.218.126.136 port 45336 [preauth]
Jan  2 03:44:50 host sshd[18066]: User root from 38.44.76.45 not allowed because not listed in AllowUsers
Jan  2 03:44:50 host sshd[18066]: input_userauth_request: invalid user root [preauth]
Jan  2 03:44:50 host unix_chkpwd[18071]: password check failed for user (root)
Jan  2 03:44:50 host sshd[18066]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=38.44.76.45  user=root
Jan  2 03:44:50 host sshd[18066]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 03:44:53 host sshd[18066]: Failed password for invalid user root from 38.44.76.45 port 52080 ssh2
Jan  2 03:44:53 host sshd[18066]: Connection closed by 38.44.76.45 port 52080 [preauth]
Jan  2 04:03:51 host sshd[20641]: Invalid user user from 92.33.222.216 port 34188
Jan  2 04:03:51 host sshd[20641]: input_userauth_request: invalid user user [preauth]
Jan  2 04:03:51 host sshd[20641]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 04:03:51 host sshd[20641]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.33.222.216
Jan  2 04:03:52 host sshd[20651]: Did not receive identification string from 85.234.137.154 port 40430
Jan  2 04:03:53 host sshd[20641]: Failed password for invalid user user from 92.33.222.216 port 34188 ssh2
Jan  2 04:03:53 host sshd[20641]: Connection closed by 92.33.222.216 port 34188 [preauth]
Jan  2 04:08:39 host sshd[21287]: Invalid user lhy from 41.197.31.178 port 46802
Jan  2 04:08:39 host sshd[21287]: input_userauth_request: invalid user lhy [preauth]
Jan  2 04:08:39 host sshd[21287]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 04:08:39 host sshd[21287]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178
Jan  2 04:08:41 host sshd[21287]: Failed password for invalid user lhy from 41.197.31.178 port 46802 ssh2
Jan  2 04:08:41 host sshd[21287]: Connection closed by 41.197.31.178 port 46802 [preauth]
Jan  2 04:09:20 host sshd[21347]: Invalid user joshua from 107.189.30.59 port 45832
Jan  2 04:09:20 host sshd[21347]: input_userauth_request: invalid user joshua [preauth]
Jan  2 04:09:20 host sshd[21347]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 04:09:20 host sshd[21347]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59
Jan  2 04:09:21 host sshd[21347]: Failed password for invalid user joshua from 107.189.30.59 port 45832 ssh2
Jan  2 04:09:22 host sshd[21347]: Connection closed by 107.189.30.59 port 45832 [preauth]
Jan  2 04:12:17 host sshd[21843]: User root from 92.46.108.20 not allowed because not listed in AllowUsers
Jan  2 04:12:17 host sshd[21843]: input_userauth_request: invalid user root [preauth]
Jan  2 04:12:18 host unix_chkpwd[21853]: password check failed for user (root)
Jan  2 04:12:18 host sshd[21843]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20  user=root
Jan  2 04:12:18 host sshd[21843]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 04:12:20 host sshd[21843]: Failed password for invalid user root from 92.46.108.20 port 49488 ssh2
Jan  2 04:12:21 host sshd[21843]: Connection closed by 92.46.108.20 port 49488 [preauth]
Jan  2 04:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  2 04:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 04:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 04:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  2 04:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 04:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 04:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  2 04:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 04:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 04:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  2 04:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 04:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 04:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  2 04:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 04:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 04:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  2 04:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 04:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 04:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  2 04:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 04:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 04:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  2 04:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 04:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 04:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  2 04:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 04:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 04:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  2 04:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 04:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 04:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  2 04:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 04:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 04:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  2 04:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 04:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 04:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  2 04:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 04:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 04:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=pmcresources user-2=vfmassets user-3=shalinijames user-4=wwwtestugo user-5=wwwkapin user-6=woodpeck user-7=disposeat user-8=wwwkmaorg user-9=remysagr user-10=wwwnexidigital user-11=mrsclean user-12=palco123 user-13=gifterman user-14=phmetals user-15=kottayamcalldriv user-16=straightcurve user-17=wwwletsstalkfood user-18=bonifacegroup user-19=wwwevmhonda user-20=laundryboniface user-21=a2zgroup user-22=dartsimp user-23=cochintaxi user-24=wwwkaretakers user-25=wwwresourcehunte user-26=keralaholi user-27=wwwrmswll user-28=ugotscom user-29=travelboniface user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  2 04:21:50 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  2 04:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 04:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 04:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  2 04:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 04:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 04:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-9f1TEg6QkjTeL4h6.~
Jan  2 04:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 04:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 04:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-9f1TEg6QkjTeL4h6.~'
Jan  2 04:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 04:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 04:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-9f1TEg6QkjTeL4h6.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  2 04:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 04:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 04:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  2 04:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 04:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 04:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  2 04:21:51 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 04:21:51 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 04:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  2 04:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 04:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 04:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  2 04:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 04:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 04:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  2 04:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 04:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 04:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  2 04:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 04:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 04:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  2 04:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 04:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 04:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  2 04:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  2 04:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  2 04:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  2 04:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  2 04:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  2 04:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  2 04:22:00 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  2 04:22:05 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  2 04:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  2 04:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 04:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 04:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  2 04:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 04:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 04:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  2 04:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 04:22:15 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 04:22:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  2 04:22:15 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 04:22:16 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 04:22:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  2 04:22:16 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 04:22:18 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 04:22:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  2 04:22:18 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  2 04:22:22 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  2 04:22:59 host sshd[23744]: Invalid user admin from 61.177.123.59 port 58154
Jan  2 04:22:59 host sshd[23744]: input_userauth_request: invalid user admin [preauth]
Jan  2 04:23:00 host sshd[23744]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 04:23:00 host sshd[23744]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.123.59
Jan  2 04:23:02 host sshd[23744]: Failed password for invalid user admin from 61.177.123.59 port 58154 ssh2
Jan  2 04:23:03 host sshd[23744]: Connection closed by 61.177.123.59 port 58154 [preauth]
Jan  2 04:26:57 host sshd[24314]: Invalid user user from 103.13.40.2 port 55016
Jan  2 04:26:57 host sshd[24314]: input_userauth_request: invalid user user [preauth]
Jan  2 04:26:57 host sshd[24314]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 04:26:57 host sshd[24314]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2
Jan  2 04:26:59 host sshd[24314]: Failed password for invalid user user from 103.13.40.2 port 55016 ssh2
Jan  2 04:26:59 host sshd[24314]: Connection closed by 103.13.40.2 port 55016 [preauth]
Jan  2 04:32:55 host sshd[25184]: Invalid user public from 106.10.122.53 port 53202
Jan  2 04:32:55 host sshd[25184]: input_userauth_request: invalid user public [preauth]
Jan  2 04:32:55 host sshd[25184]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 04:32:55 host sshd[25184]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53
Jan  2 04:32:57 host sshd[25184]: Failed password for invalid user public from 106.10.122.53 port 53202 ssh2
Jan  2 04:32:58 host sshd[25184]: Connection closed by 106.10.122.53 port 53202 [preauth]
Jan  2 04:48:25 host sshd[27653]: Invalid user zjc from 162.218.126.136 port 52278
Jan  2 04:48:25 host sshd[27653]: input_userauth_request: invalid user zjc [preauth]
Jan  2 04:48:26 host sshd[27653]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 04:48:26 host sshd[27653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136
Jan  2 04:48:28 host sshd[27653]: Failed password for invalid user zjc from 162.218.126.136 port 52278 ssh2
Jan  2 04:48:29 host sshd[27653]: Connection closed by 162.218.126.136 port 52278 [preauth]
Jan  2 04:57:29 host sshd[29089]: Connection closed by 167.172.148.206 port 50496 [preauth]
Jan  2 05:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  2 05:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 05:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 05:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  2 05:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 05:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 05:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  2 05:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 05:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  2 05:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 05:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  2 05:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 05:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  2 05:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 05:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  2 05:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 05:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  2 05:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 05:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  2 05:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 05:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  2 05:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 05:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  2 05:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 05:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  2 05:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 05:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  2 05:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 05:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=pmcresources user-2=wwwtestugo user-3=shalinijames user-4=vfmassets user-5=wwwkapin user-6=woodpeck user-7=wwwkmaorg user-8=disposeat user-9=remysagr user-10=mrsclean user-11=wwwnexidigital user-12=kottayamcalldriv user-13=phmetals user-14=gifterman user-15=palco123 user-16=wwwletsstalkfood user-17=straightcurve user-18=wwwevmhonda user-19=bonifacegroup user-20=laundryboniface user-21=dartsimp user-22=a2zgroup user-23=wwwkaretakers user-24=cochintaxi user-25=ugotscom user-26=wwwrmswll user-27=keralaholi user-28=wwwresourcehunte user-29=travelboniface user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  2 05:21:51 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  2 05:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 05:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  2 05:21:51 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 05:21:51 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=evmhonda.com --output=json
Jan  2 05:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 05:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/test -e /home/wwwevmhonda/wordpress-backups
Jan  2 05:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  2 05:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  2 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && find -H /home/wwwevmhonda/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  2 05:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  2 05:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  2 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=letsstalkfood.com --output=json
Jan  2 05:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 05:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/wordpress-backups
Jan  2 05:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  2 05:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  2 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && find -H /home/wwwletsstalkfood/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  2 05:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  2 05:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  2 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=mrsclean.co.in --output=json
Jan  2 05:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 05:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/wordpress-backups
Jan  2 05:21:52 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  2 05:21:52 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  2 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/backup && find -H /home/mrsclean/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  2 05:21:52 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  2 05:21:52 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  2 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/wordpress-backups
Jan  2 05:21:52 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  2 05:21:52 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  2 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/blog && find -H /home/mrsclean/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  2 05:21:52 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  2 05:21:52 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  2 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=shalinijames.com --output=json
Jan  2 05:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 05:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/wordpress-backups
Jan  2 05:21:52 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  2 05:21:52 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  2 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && find -H /home/shalinijames/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  2 05:21:52 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  2 05:21:52 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  2 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=testugo.in --output=json
Jan  2 05:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 05:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups
Jan  2 05:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 05:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && find -H /home/wwwtestugo/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  2 05:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 05:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups
Jan  2 05:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 05:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && find -H /home/wwwtestugo/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  2 05:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 05:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups
Jan  2 05:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 05:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && find -H /home/wwwtestugo/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  2 05:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 05:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=ugotechnologies.com --output=json
Jan  2 05:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 05:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups
Jan  2 05:21:53 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 05:21:53 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/boniface/blog && find -H /home/ugotscom/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  2 05:21:53 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 05:21:53 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups
Jan  2 05:21:53 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 05:21:53 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && find -H /home/ugotscom/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  2 05:21:53 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 05:21:53 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups
Jan  2 05:21:53 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 05:21:53 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && find -H /home/ugotscom/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  2 05:21:53 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 05:21:53 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=woodpeckerindia.com --output=json
Jan  2 05:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 05:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/test -e /home/woodpeck/wordpress-backups
Jan  2 05:21:53 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0)
Jan  2 05:21:53 host sudo: pam_unix(sudo:session): session closed for user woodpeck
Jan  2 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html/wp && find -H /home/woodpeck/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  2 05:21:53 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0)
Jan  2 05:21:53 host sudo: pam_unix(sudo:session): session closed for user woodpeck
Jan  2 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=panlys.com --output=json
Jan  2 05:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 05:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/wordpress-backups
Jan  2 05:21:53 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  2 05:21:53 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  2 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && find -H /home/palco123/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  2 05:21:53 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  2 05:21:53 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  2 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=resourcehunters.com --output=json
Jan  2 05:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 05:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/test -e /home/wwwresourcehunte/wordpress-backups
Jan  2 05:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  2 05:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  2 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && find -H /home/wwwresourcehunte/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  2 05:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  2 05:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  2 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /var/cpanel/licenseid_credentials.json
Jan  2 05:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 05:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  2 05:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 05:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=pmcresources ; COMMAND=/bin/cat /home/pmcresources/.wp-toolkit-identifier
Jan  2 05:21:54 host sudo: pam_unix(sudo:session): session opened for user pmcresources by (uid=0)
Jan  2 05:21:54 host sudo: pam_unix(sudo:session): session closed for user pmcresources
Jan  2 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/cat /home/wwwtestugo/.wp-toolkit-identifier
Jan  2 05:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 05:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/cat /home/shalinijames/.wp-toolkit-identifier
Jan  2 05:21:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  2 05:21:54 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  2 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=vfmassets ; COMMAND=/bin/cat /home/vfmassets/.wp-toolkit-identifier
Jan  2 05:21:54 host sudo: pam_unix(sudo:session): session opened for user vfmassets by (uid=0)
Jan  2 05:21:54 host sudo: pam_unix(sudo:session): session closed for user vfmassets
Jan  2 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkapin ; COMMAND=/bin/cat /home/wwwkapin/.wp-toolkit-identifier
Jan  2 05:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwkapin by (uid=0)
Jan  2 05:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwkapin
Jan  2 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/cat /home/woodpeck/.wp-toolkit-identifier
Jan  2 05:21:54 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0)
Jan  2 05:21:54 host sudo: pam_unix(sudo:session): session closed for user woodpeck
Jan  2 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkmaorg ; COMMAND=/bin/cat /home/wwwkmaorg/.wp-toolkit-identifier
Jan  2 05:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwkmaorg by (uid=0)
Jan  2 05:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwkmaorg
Jan  2 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=disposeat ; COMMAND=/bin/cat /home/disposeat/.wp-toolkit-identifier
Jan  2 05:21:54 host sudo: pam_unix(sudo:session): session opened for user disposeat by (uid=0)
Jan  2 05:21:54 host sudo: pam_unix(sudo:session): session closed for user disposeat
Jan  2 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=remysagr ; COMMAND=/bin/cat /home/remysagr/.wp-toolkit-identifier
Jan  2 05:21:54 host sudo: pam_unix(sudo:session): session opened for user remysagr by (uid=0)
Jan  2 05:21:54 host sudo: pam_unix(sudo:session): session closed for user remysagr
Jan  2 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/cat /home/mrsclean/.wp-toolkit-identifier
Jan  2 05:21:54 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  2 05:21:54 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  2 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwnexidigital ; COMMAND=/bin/cat /home/wwwnexidigital/.wp-toolkit-identifier
Jan  2 05:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwnexidigital by (uid=0)
Jan  2 05:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwnexidigital
Jan  2 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=kottayamcalldriv ; COMMAND=/bin/cat /home/kottayamcalldriv/.wp-toolkit-identifier
Jan  2 05:21:54 host sudo: pam_unix(sudo:session): session opened for user kottayamcalldriv by (uid=0)
Jan  2 05:21:54 host sudo: pam_unix(sudo:session): session closed for user kottayamcalldriv
Jan  2 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=phmetals ; COMMAND=/bin/cat /home/phmetals/.wp-toolkit-identifier
Jan  2 05:21:54 host sudo: pam_unix(sudo:session): session opened for user phmetals by (uid=0)
Jan  2 05:21:54 host sudo: pam_unix(sudo:session): session closed for user phmetals
Jan  2 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=gifterman ; COMMAND=/bin/cat /home/gifterman/.wp-toolkit-identifier
Jan  2 05:21:54 host sudo: pam_unix(sudo:session): session opened for user gifterman by (uid=0)
Jan  2 05:21:54 host sudo: pam_unix(sudo:session): session closed for user gifterman
Jan  2 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/cat /home/palco123/.wp-toolkit-identifier
Jan  2 05:21:54 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  2 05:21:54 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  2 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/cat /home/wwwletsstalkfood/.wp-toolkit-identifier
Jan  2 05:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  2 05:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  2 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=straightcurve ; COMMAND=/bin/cat /home/straightcurve/.wp-toolkit-identifier
Jan  2 05:21:54 host sudo: pam_unix(sudo:session): session opened for user straightcurve by (uid=0)
Jan  2 05:21:54 host sudo: pam_unix(sudo:session): session closed for user straightcurve
Jan  2 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/cat /home/wwwevmhonda/.wp-toolkit-identifier
Jan  2 05:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  2 05:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  2 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=bonifacegroup ; COMMAND=/bin/cat /home/bonifacegroup/.wp-toolkit-identifier
Jan  2 05:21:54 host sudo: pam_unix(sudo:session): session opened for user bonifacegroup by (uid=0)
Jan  2 05:21:54 host sudo: pam_unix(sudo:session): session closed for user bonifacegroup
Jan  2 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=laundryboniface ; COMMAND=/bin/cat /home/laundryboniface/.wp-toolkit-identifier
Jan  2 05:21:54 host sudo: pam_unix(sudo:session): session opened for user laundryboniface by (uid=0)
Jan  2 05:21:54 host sudo: pam_unix(sudo:session): session closed for user laundryboniface
Jan  2 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=dartsimp ; COMMAND=/bin/cat /home/dartsimp/.wp-toolkit-identifier
Jan  2 05:21:54 host sudo: pam_unix(sudo:session): session opened for user dartsimp by (uid=0)
Jan  2 05:21:54 host sudo: pam_unix(sudo:session): session closed for user dartsimp
Jan  2 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=a2zgroup ; COMMAND=/bin/cat /home/a2zgroup/.wp-toolkit-identifier
Jan  2 05:21:55 host sudo: pam_unix(sudo:session): session opened for user a2zgroup by (uid=0)
Jan  2 05:21:55 host sudo: pam_unix(sudo:session): session closed for user a2zgroup
Jan  2 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkaretakers ; COMMAND=/bin/cat /home/wwwkaretakers/.wp-toolkit-identifier
Jan  2 05:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwkaretakers by (uid=0)
Jan  2 05:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwkaretakers
Jan  2 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=cochintaxi ; COMMAND=/bin/cat /home/cochintaxi/.wp-toolkit-identifier
Jan  2 05:21:55 host sudo: pam_unix(sudo:session): session opened for user cochintaxi by (uid=0)
Jan  2 05:21:55 host sudo: pam_unix(sudo:session): session closed for user cochintaxi
Jan  2 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwrmswll ; COMMAND=/bin/cat /home/wwwrmswll/.wp-toolkit-identifier
Jan  2 05:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwrmswll by (uid=0)
Jan  2 05:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwrmswll
Jan  2 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/cat /home/keralaholi/.wp-toolkit-identifier
Jan  2 05:21:55 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0)
Jan  2 05:21:55 host sudo: pam_unix(sudo:session): session closed for user keralaholi
Jan  2 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -f /home/keralaholi/.wp-toolkit-identifier
Jan  2 05:21:55 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0)
Jan  2 05:21:55 host sudo: pam_unix(sudo:session): session closed for user keralaholi
Jan  2 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -e /home/keralaholi/-wpt-tmp-dQjrcRx7OqwIRdM7.wp-toolkit-identifier
Jan  2 05:21:55 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0)
Jan  2 05:21:55 host sudo: pam_unix(sudo:session): session closed for user keralaholi
Jan  2 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/sh -c cat > /home/keralaholi/-wpt-tmp-dQjrcRx7OqwIRdM7.wp-toolkit-identifier
Jan  2 05:21:55 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0)
Jan  2 05:21:55 host sudo: pam_unix(sudo:session): session closed for user keralaholi
Jan  2 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/cat /home/wwwresourcehunte/.wp-toolkit-identifier
Jan  2 05:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  2 05:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  2 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=travelboniface ; COMMAND=/bin/cat /home/travelboniface/.wp-toolkit-identifier
Jan  2 05:21:55 host sudo: pam_unix(sudo:session): session opened for user travelboniface by (uid=0)
Jan  2 05:21:55 host sudo: pam_unix(sudo:session): session closed for user travelboniface
Jan  2 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwpmcresource ; COMMAND=/bin/cat /home/wwwpmcresource/.wp-toolkit-identifier
Jan  2 05:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwpmcresource by (uid=0)
Jan  2 05:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwpmcresource
Jan  2 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/cat /home/keralaholi/.wp-toolkit-identifier
Jan  2 05:21:55 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0)
Jan  2 05:21:55 host sudo: pam_unix(sudo:session): session closed for user keralaholi
Jan  2 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -f /home/keralaholi/.wp-toolkit-identifier
Jan  2 05:21:55 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0)
Jan  2 05:21:55 host sudo: pam_unix(sudo:session): session closed for user keralaholi
Jan  2 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -e /home/keralaholi/-wpt-tmp-8sZuG6XQB2t75zj7.wp-toolkit-identifier
Jan  2 05:21:55 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0)
Jan  2 05:21:55 host sudo: pam_unix(sudo:session): session closed for user keralaholi
Jan  2 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/sh -c cat > /home/keralaholi/-wpt-tmp-8sZuG6XQB2t75zj7.wp-toolkit-identifier
Jan  2 05:21:55 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0)
Jan  2 05:21:55 host sudo: pam_unix(sudo:session): session closed for user keralaholi
Jan  2 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_shared_ip --output=json
Jan  2 05:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 05:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_public_ip ip=167.71.234.10 --output=json
Jan  2 05:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 05:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  2 05:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 05:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-bwdufh5UCzmM0sJs.~
Jan  2 05:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 05:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-bwdufh5UCzmM0sJs.~'
Jan  2 05:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 05:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-bwdufh5UCzmM0sJs.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  2 05:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 05:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  2 05:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 05:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  2 05:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 05:21:59 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  2 05:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 05:21:59 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  2 05:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 05:22:00 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  2 05:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 05:22:00 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  2 05:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 05:22:01 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  2 05:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  2 05:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  2 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  2 05:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  2 05:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  2 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  2 05:22:04 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  2 05:22:06 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  2 05:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  2 05:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 05:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 05:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  2 05:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 05:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 05:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  2 05:22:08 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 05:22:10 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 05:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  2 05:22:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 05:22:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 05:22:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  2 05:22:12 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 05:22:13 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 05:22:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  2 05:22:14 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  2 05:22:15 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  2 05:30:34 host sshd[2268]: Connection closed by 94.102.61.20 port 38998 [preauth]
Jan  2 05:44:20 host sshd[4307]: Invalid user ubuntu from 41.197.31.178 port 37506
Jan  2 05:44:20 host sshd[4307]: input_userauth_request: invalid user ubuntu [preauth]
Jan  2 05:44:21 host sshd[4307]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 05:44:21 host sshd[4307]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178
Jan  2 05:44:23 host sshd[4307]: Failed password for invalid user ubuntu from 41.197.31.178 port 37506 ssh2
Jan  2 05:44:23 host sshd[4307]: Connection closed by 41.197.31.178 port 37506 [preauth]
Jan  2 05:50:46 host sshd[5276]: User root from 61.48.23.122 not allowed because not listed in AllowUsers
Jan  2 05:50:46 host sshd[5276]: input_userauth_request: invalid user root [preauth]
Jan  2 05:50:46 host unix_chkpwd[5281]: password check failed for user (root)
Jan  2 05:50:46 host sshd[5276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.48.23.122  user=root
Jan  2 05:50:46 host sshd[5276]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 05:50:47 host sshd[5276]: Failed password for invalid user root from 61.48.23.122 port 5126 ssh2
Jan  2 05:50:48 host unix_chkpwd[5284]: password check failed for user (root)
Jan  2 05:50:48 host sshd[5276]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 05:50:50 host sshd[5276]: Failed password for invalid user root from 61.48.23.122 port 5126 ssh2
Jan  2 05:50:50 host unix_chkpwd[5290]: password check failed for user (root)
Jan  2 05:50:50 host sshd[5276]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 05:50:53 host sshd[5276]: Failed password for invalid user root from 61.48.23.122 port 5126 ssh2
Jan  2 05:50:53 host unix_chkpwd[5296]: password check failed for user (root)
Jan  2 05:50:53 host sshd[5276]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 05:50:55 host sshd[5276]: Failed password for invalid user root from 61.48.23.122 port 5126 ssh2
Jan  2 05:51:25 host sshd[5505]: Invalid user dell from 103.13.40.2 port 46436
Jan  2 05:51:25 host sshd[5505]: input_userauth_request: invalid user dell [preauth]
Jan  2 05:51:25 host sshd[5505]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 05:51:25 host sshd[5505]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2
Jan  2 05:51:27 host sshd[5505]: Failed password for invalid user dell from 103.13.40.2 port 46436 ssh2
Jan  2 05:51:27 host sshd[5505]: Connection closed by 103.13.40.2 port 46436 [preauth]
Jan  2 05:53:17 host sshd[5802]: Invalid user user from 162.218.126.136 port 48032
Jan  2 05:53:17 host sshd[5802]: input_userauth_request: invalid user user [preauth]
Jan  2 05:53:17 host sshd[5802]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 05:53:17 host sshd[5802]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136
Jan  2 05:53:18 host sshd[5802]: Failed password for invalid user user from 162.218.126.136 port 48032 ssh2
Jan  2 05:53:19 host sshd[5802]: Connection closed by 162.218.126.136 port 48032 [preauth]
Jan  2 05:55:45 host sshd[6260]: Invalid user bbnc from 106.10.122.53 port 46734
Jan  2 05:55:45 host sshd[6260]: input_userauth_request: invalid user bbnc [preauth]
Jan  2 05:55:45 host sshd[6260]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 05:55:45 host sshd[6260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53
Jan  2 05:55:47 host sshd[6260]: Failed password for invalid user bbnc from 106.10.122.53 port 46734 ssh2
Jan  2 05:55:47 host sshd[6260]: Connection closed by 106.10.122.53 port 46734 [preauth]
Jan  2 06:14:38 host sshd[9217]: User root from 147.182.188.81 not allowed because not listed in AllowUsers
Jan  2 06:14:38 host sshd[9217]: input_userauth_request: invalid user root [preauth]
Jan  2 06:14:38 host unix_chkpwd[9220]: password check failed for user (root)
Jan  2 06:14:38 host sshd[9217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.182.188.81  user=root
Jan  2 06:14:38 host sshd[9217]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 06:14:40 host sshd[9221]: Connection closed by 45.79.181.94 port 54434 [preauth]
Jan  2 06:14:40 host sshd[9217]: Failed password for invalid user root from 147.182.188.81 port 42196 ssh2
Jan  2 06:14:40 host sshd[9217]: Received disconnect from 147.182.188.81 port 42196:11: Bye Bye [preauth]
Jan  2 06:14:40 host sshd[9217]: Disconnected from 147.182.188.81 port 42196 [preauth]
Jan  2 06:14:42 host sshd[9224]: Connection closed by 45.79.181.94 port 54450 [preauth]
Jan  2 06:14:43 host sshd[9228]: Connection closed by 45.79.181.94 port 54452 [preauth]
Jan  2 06:15:40 host sshd[9500]: User root from 146.190.52.81 not allowed because not listed in AllowUsers
Jan  2 06:15:40 host sshd[9500]: input_userauth_request: invalid user root [preauth]
Jan  2 06:15:40 host unix_chkpwd[9503]: password check failed for user (root)
Jan  2 06:15:40 host sshd[9500]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.190.52.81  user=root
Jan  2 06:15:40 host sshd[9500]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 06:15:42 host sshd[9500]: Failed password for invalid user root from 146.190.52.81 port 44486 ssh2
Jan  2 06:15:43 host sshd[9500]: Received disconnect from 146.190.52.81 port 44486:11: Bye Bye [preauth]
Jan  2 06:15:43 host sshd[9500]: Disconnected from 146.190.52.81 port 44486 [preauth]
Jan  2 06:17:24 host sshd[9710]: Invalid user  from 64.62.197.113 port 5121
Jan  2 06:17:24 host sshd[9710]: input_userauth_request: invalid user  [preauth]
Jan  2 06:17:27 host sshd[9710]: Connection closed by 64.62.197.113 port 5121 [preauth]
Jan  2 06:18:39 host sshd[9867]: User root from 23.31.122.1 not allowed because not listed in AllowUsers
Jan  2 06:18:39 host sshd[9867]: input_userauth_request: invalid user root [preauth]
Jan  2 06:18:39 host unix_chkpwd[9870]: password check failed for user (root)
Jan  2 06:18:39 host sshd[9867]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.31.122.1  user=root
Jan  2 06:18:39 host sshd[9867]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 06:18:41 host sshd[9867]: Failed password for invalid user root from 23.31.122.1 port 48092 ssh2
Jan  2 06:18:41 host sshd[9867]: Received disconnect from 23.31.122.1 port 48092:11: Bye Bye [preauth]
Jan  2 06:18:41 host sshd[9867]: Disconnected from 23.31.122.1 port 48092 [preauth]
Jan  2 06:18:46 host sshd[9876]: User root from 147.182.188.81 not allowed because not listed in AllowUsers
Jan  2 06:18:46 host sshd[9876]: input_userauth_request: invalid user root [preauth]
Jan  2 06:18:46 host unix_chkpwd[9879]: password check failed for user (root)
Jan  2 06:18:46 host sshd[9876]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.182.188.81  user=root
Jan  2 06:18:46 host sshd[9876]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 06:18:48 host sshd[9876]: Failed password for invalid user root from 147.182.188.81 port 60168 ssh2
Jan  2 06:18:48 host sshd[9876]: Received disconnect from 147.182.188.81 port 60168:11: Bye Bye [preauth]
Jan  2 06:18:48 host sshd[9876]: Disconnected from 147.182.188.81 port 60168 [preauth]
Jan  2 06:19:31 host sshd[10015]: User root from 146.190.52.81 not allowed because not listed in AllowUsers
Jan  2 06:19:31 host sshd[10015]: input_userauth_request: invalid user root [preauth]
Jan  2 06:19:31 host unix_chkpwd[10019]: password check failed for user (root)
Jan  2 06:19:31 host sshd[10015]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.190.52.81  user=root
Jan  2 06:19:31 host sshd[10015]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 06:19:33 host sshd[10015]: Failed password for invalid user root from 146.190.52.81 port 52802 ssh2
Jan  2 06:19:33 host sshd[10015]: Received disconnect from 146.190.52.81 port 52802:11: Bye Bye [preauth]
Jan  2 06:19:33 host sshd[10015]: Disconnected from 146.190.52.81 port 52802 [preauth]
Jan  2 06:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  2 06:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 06:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 06:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  2 06:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 06:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 06:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  2 06:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 06:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 06:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  2 06:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 06:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 06:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  2 06:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 06:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 06:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  2 06:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 06:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 06:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  2 06:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 06:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 06:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  2 06:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 06:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 06:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  2 06:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 06:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 06:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  2 06:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 06:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 06:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  2 06:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 06:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 06:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  2 06:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 06:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 06:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  2 06:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 06:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 06:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=cochintaxi user-2=wwwkaretakers user-3=laundryboniface user-4=a2zgroup user-5=dartsimp user-6=wwwpmcresource user-7=wwwresourcehunte user-8=keralaholi user-9=wwwrmswll user-10=ugotscom user-11=travelboniface user-12=wwwkapin user-13=woodpeck user-14=disposeat user-15=wwwkmaorg user-16=remysagr user-17=pmcresources user-18=vfmassets user-19=shalinijames user-20=wwwtestugo user-21=wwwletsstalkfood user-22=straightcurve user-23=bonifacegroup user-24=wwwevmhonda user-25=wwwnexidigital user-26=mrsclean user-27=palco123 user-28=gifterman user-29=phmetals user-30=kottayamcalldriv feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  2 06:21:51 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  2 06:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 06:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 06:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  2 06:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 06:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 06:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-cnMhBF8pGoX6G0Fa.~
Jan  2 06:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 06:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 06:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-cnMhBF8pGoX6G0Fa.~'
Jan  2 06:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 06:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 06:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-cnMhBF8pGoX6G0Fa.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  2 06:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 06:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 06:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  2 06:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 06:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 06:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  2 06:21:52 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 06:21:52 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 06:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  2 06:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 06:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 06:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  2 06:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 06:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 06:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  2 06:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 06:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 06:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  2 06:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 06:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 06:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  2 06:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 06:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 06:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  2 06:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  2 06:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  2 06:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  2 06:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  2 06:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  2 06:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  2 06:21:56 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  2 06:21:57 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  2 06:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  2 06:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 06:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 06:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  2 06:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 06:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 06:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  2 06:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 06:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 06:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  2 06:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 06:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 06:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  2 06:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 06:22:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 06:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  2 06:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  2 06:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  2 06:23:03 host sshd[10792]: Invalid user oracle from 210.10.200.186 port 43515
Jan  2 06:23:03 host sshd[10792]: input_userauth_request: invalid user oracle [preauth]
Jan  2 06:23:03 host sshd[10792]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 06:23:03 host sshd[10792]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.10.200.186
Jan  2 06:23:05 host sshd[10792]: Failed password for invalid user oracle from 210.10.200.186 port 43515 ssh2
Jan  2 06:23:05 host sshd[10792]: Received disconnect from 210.10.200.186 port 43515:11: Bye Bye [preauth]
Jan  2 06:23:05 host sshd[10792]: Disconnected from 210.10.200.186 port 43515 [preauth]
Jan  2 06:25:47 host sshd[11188]: User root from 210.10.200.186 not allowed because not listed in AllowUsers
Jan  2 06:25:47 host sshd[11188]: input_userauth_request: invalid user root [preauth]
Jan  2 06:25:47 host unix_chkpwd[11190]: password check failed for user (root)
Jan  2 06:25:47 host sshd[11188]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.10.200.186  user=root
Jan  2 06:25:47 host sshd[11188]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 06:25:48 host sshd[11188]: Failed password for invalid user root from 210.10.200.186 port 35797 ssh2
Jan  2 06:25:48 host sshd[11188]: Received disconnect from 210.10.200.186 port 35797:11: Bye Bye [preauth]
Jan  2 06:25:48 host sshd[11188]: Disconnected from 210.10.200.186 port 35797 [preauth]
Jan  2 06:26:19 host sshd[11378]: Invalid user worker from 23.31.122.1 port 33900
Jan  2 06:26:19 host sshd[11378]: input_userauth_request: invalid user worker [preauth]
Jan  2 06:26:19 host sshd[11378]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 06:26:19 host sshd[11378]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.31.122.1
Jan  2 06:26:21 host sshd[11378]: Failed password for invalid user worker from 23.31.122.1 port 33900 ssh2
Jan  2 06:26:21 host sshd[11378]: Received disconnect from 23.31.122.1 port 33900:11: Bye Bye [preauth]
Jan  2 06:26:21 host sshd[11378]: Disconnected from 23.31.122.1 port 33900 [preauth]
Jan  2 06:50:29 host sshd[14939]: Invalid user docker from 92.46.108.20 port 47732
Jan  2 06:50:29 host sshd[14939]: input_userauth_request: invalid user docker [preauth]
Jan  2 06:50:30 host sshd[14939]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 06:50:30 host sshd[14939]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20
Jan  2 06:50:32 host sshd[14939]: Failed password for invalid user docker from 92.46.108.20 port 47732 ssh2
Jan  2 06:50:32 host sshd[14939]: Connection closed by 92.46.108.20 port 47732 [preauth]
Jan  2 06:54:12 host sshd[15369]: User root from 35.207.98.222 not allowed because not listed in AllowUsers
Jan  2 06:54:12 host sshd[15369]: input_userauth_request: invalid user root [preauth]
Jan  2 06:54:12 host unix_chkpwd[15372]: password check failed for user (root)
Jan  2 06:54:12 host sshd[15369]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.207.98.222  user=root
Jan  2 06:54:12 host sshd[15369]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 06:54:14 host sshd[15369]: Failed password for invalid user root from 35.207.98.222 port 57184 ssh2
Jan  2 06:54:14 host sshd[15369]: Received disconnect from 35.207.98.222 port 57184:11: Bye Bye [preauth]
Jan  2 06:54:14 host sshd[15369]: Disconnected from 35.207.98.222 port 57184 [preauth]
Jan  2 06:54:35 host sshd[15428]: User root from 35.207.98.222 not allowed because not listed in AllowUsers
Jan  2 06:54:35 host sshd[15428]: input_userauth_request: invalid user root [preauth]
Jan  2 06:54:35 host unix_chkpwd[15431]: password check failed for user (root)
Jan  2 06:54:35 host sshd[15428]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.207.98.222  user=root
Jan  2 06:54:35 host sshd[15428]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 06:54:37 host sshd[15428]: Failed password for invalid user root from 35.207.98.222 port 59766 ssh2
Jan  2 06:54:45 host sshd[15571]: User root from 185.125.204.91 not allowed because not listed in AllowUsers
Jan  2 06:54:45 host sshd[15571]: input_userauth_request: invalid user root [preauth]
Jan  2 06:54:45 host unix_chkpwd[15574]: password check failed for user (root)
Jan  2 06:54:45 host sshd[15571]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.125.204.91  user=root
Jan  2 06:54:45 host sshd[15571]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 06:54:48 host sshd[15571]: Failed password for invalid user root from 185.125.204.91 port 58434 ssh2
Jan  2 06:54:48 host sshd[15571]: Received disconnect from 185.125.204.91 port 58434:11: Bye Bye [preauth]
Jan  2 06:54:48 host sshd[15571]: Disconnected from 185.125.204.91 port 58434 [preauth]
Jan  2 06:55:00 host sshd[15588]: User root from 112.220.238.3 not allowed because not listed in AllowUsers
Jan  2 06:55:00 host sshd[15588]: input_userauth_request: invalid user root [preauth]
Jan  2 06:55:00 host unix_chkpwd[15591]: password check failed for user (root)
Jan  2 06:55:00 host sshd[15588]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.220.238.3  user=root
Jan  2 06:55:00 host sshd[15588]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 06:55:02 host sshd[15588]: Failed password for invalid user root from 112.220.238.3 port 34988 ssh2
Jan  2 06:55:02 host sshd[15588]: Received disconnect from 112.220.238.3 port 34988:11: Bye Bye [preauth]
Jan  2 06:55:02 host sshd[15588]: Disconnected from 112.220.238.3 port 34988 [preauth]
Jan  2 06:55:28 host sshd[15677]: User root from 161.35.79.199 not allowed because not listed in AllowUsers
Jan  2 06:55:28 host sshd[15677]: input_userauth_request: invalid user root [preauth]
Jan  2 06:55:28 host unix_chkpwd[15681]: password check failed for user (root)
Jan  2 06:55:28 host sshd[15677]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.79.199  user=root
Jan  2 06:55:28 host sshd[15677]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 06:55:30 host sshd[15677]: Failed password for invalid user root from 161.35.79.199 port 45704 ssh2
Jan  2 06:55:30 host sshd[15677]: Received disconnect from 161.35.79.199 port 45704:11: Bye Bye [preauth]
Jan  2 06:55:30 host sshd[15677]: Disconnected from 161.35.79.199 port 45704 [preauth]
Jan  2 06:55:38 host sshd[15698]: Invalid user oracle from 198.211.41.230 port 40054
Jan  2 06:55:38 host sshd[15698]: input_userauth_request: invalid user oracle [preauth]
Jan  2 06:55:38 host sshd[15698]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 06:55:38 host sshd[15698]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.211.41.230
Jan  2 06:55:40 host sshd[15698]: Failed password for invalid user oracle from 198.211.41.230 port 40054 ssh2
Jan  2 06:55:40 host sshd[15698]: Received disconnect from 198.211.41.230 port 40054:11: Bye Bye [preauth]
Jan  2 06:55:40 host sshd[15698]: Disconnected from 198.211.41.230 port 40054 [preauth]
Jan  2 06:57:56 host sshd[15943]: User root from 89.163.208.173 not allowed because not listed in AllowUsers
Jan  2 06:57:56 host sshd[15943]: input_userauth_request: invalid user root [preauth]
Jan  2 06:57:56 host unix_chkpwd[15945]: password check failed for user (root)
Jan  2 06:57:56 host sshd[15943]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.163.208.173  user=root
Jan  2 06:57:56 host sshd[15943]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 06:57:58 host sshd[15943]: Failed password for invalid user root from 89.163.208.173 port 52526 ssh2
Jan  2 06:57:58 host sshd[15943]: Received disconnect from 89.163.208.173 port 52526:11: Bye Bye [preauth]
Jan  2 06:57:58 host sshd[15943]: Disconnected from 89.163.208.173 port 52526 [preauth]
Jan  2 06:58:28 host sshd[16025]: User root from 162.218.126.136 not allowed because not listed in AllowUsers
Jan  2 06:58:28 host sshd[16025]: input_userauth_request: invalid user root [preauth]
Jan  2 06:58:28 host unix_chkpwd[16028]: password check failed for user (root)
Jan  2 06:58:28 host sshd[16025]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136  user=root
Jan  2 06:58:28 host sshd[16025]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 06:58:30 host sshd[16025]: Failed password for invalid user root from 162.218.126.136 port 36462 ssh2
Jan  2 06:58:30 host sshd[16025]: Connection closed by 162.218.126.136 port 36462 [preauth]
Jan  2 06:59:04 host sshd[16088]: User root from 188.166.225.37 not allowed because not listed in AllowUsers
Jan  2 06:59:04 host sshd[16088]: input_userauth_request: invalid user root [preauth]
Jan  2 06:59:04 host unix_chkpwd[16090]: password check failed for user (root)
Jan  2 06:59:04 host sshd[16088]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.225.37  user=root
Jan  2 06:59:04 host sshd[16088]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 06:59:06 host sshd[16088]: Failed password for invalid user root from 188.166.225.37 port 41298 ssh2
Jan  2 06:59:06 host sshd[16088]: Received disconnect from 188.166.225.37 port 41298:11: Bye Bye [preauth]
Jan  2 06:59:06 host sshd[16088]: Disconnected from 188.166.225.37 port 41298 [preauth]
Jan  2 06:59:17 host sshd[16107]: Invalid user usuario from 211.224.131.58 port 21548
Jan  2 06:59:17 host sshd[16107]: input_userauth_request: invalid user usuario [preauth]
Jan  2 06:59:17 host sshd[16107]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 06:59:17 host sshd[16107]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.224.131.58
Jan  2 06:59:20 host sshd[16107]: Failed password for invalid user usuario from 211.224.131.58 port 21548 ssh2
Jan  2 06:59:20 host sshd[16107]: Received disconnect from 211.224.131.58 port 21548:11: Bye Bye [preauth]
Jan  2 06:59:20 host sshd[16107]: Disconnected from 211.224.131.58 port 21548 [preauth]
Jan  2 07:00:10 host sshd[16323]: User root from 198.211.41.230 not allowed because not listed in AllowUsers
Jan  2 07:00:10 host sshd[16323]: input_userauth_request: invalid user root [preauth]
Jan  2 07:00:10 host unix_chkpwd[16325]: password check failed for user (root)
Jan  2 07:00:10 host sshd[16323]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.211.41.230  user=root
Jan  2 07:00:10 host sshd[16323]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 07:00:11 host sshd[16323]: Failed password for invalid user root from 198.211.41.230 port 35558 ssh2
Jan  2 07:00:12 host sshd[16323]: Received disconnect from 198.211.41.230 port 35558:11: Bye Bye [preauth]
Jan  2 07:00:12 host sshd[16323]: Disconnected from 198.211.41.230 port 35558 [preauth]
Jan  2 07:00:27 host sshd[16412]: User centos from 112.220.238.3 not allowed because not listed in AllowUsers
Jan  2 07:00:27 host sshd[16412]: input_userauth_request: invalid user centos [preauth]
Jan  2 07:00:27 host unix_chkpwd[16415]: password check failed for user (centos)
Jan  2 07:00:27 host sshd[16412]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.220.238.3  user=centos
Jan  2 07:00:28 host sshd[16417]: Invalid user nagios from 89.163.208.173 port 33228
Jan  2 07:00:28 host sshd[16417]: input_userauth_request: invalid user nagios [preauth]
Jan  2 07:00:28 host sshd[16417]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 07:00:28 host sshd[16417]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.163.208.173
Jan  2 07:00:29 host sshd[16412]: Failed password for invalid user centos from 112.220.238.3 port 35616 ssh2
Jan  2 07:00:29 host sshd[16412]: Received disconnect from 112.220.238.3 port 35616:11: Bye Bye [preauth]
Jan  2 07:00:29 host sshd[16412]: Disconnected from 112.220.238.3 port 35616 [preauth]
Jan  2 07:00:30 host sshd[16417]: Failed password for invalid user nagios from 89.163.208.173 port 33228 ssh2
Jan  2 07:00:30 host sshd[16417]: Received disconnect from 89.163.208.173 port 33228:11: Bye Bye [preauth]
Jan  2 07:00:30 host sshd[16417]: Disconnected from 89.163.208.173 port 33228 [preauth]
Jan  2 07:00:44 host sshd[16492]: User root from 161.35.79.199 not allowed because not listed in AllowUsers
Jan  2 07:00:44 host sshd[16492]: input_userauth_request: invalid user root [preauth]
Jan  2 07:00:44 host unix_chkpwd[16495]: password check failed for user (root)
Jan  2 07:00:44 host sshd[16492]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.79.199  user=root
Jan  2 07:00:44 host sshd[16492]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 07:00:46 host sshd[16492]: Failed password for invalid user root from 161.35.79.199 port 40542 ssh2
Jan  2 07:00:46 host sshd[16492]: Received disconnect from 161.35.79.199 port 40542:11: Bye Bye [preauth]
Jan  2 07:00:46 host sshd[16492]: Disconnected from 161.35.79.199 port 40542 [preauth]
Jan  2 07:01:17 host sshd[16585]: Invalid user nagios from 185.125.204.91 port 58586
Jan  2 07:01:17 host sshd[16585]: input_userauth_request: invalid user nagios [preauth]
Jan  2 07:01:17 host sshd[16585]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 07:01:17 host sshd[16585]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.125.204.91
Jan  2 07:01:19 host sshd[16585]: Failed password for invalid user nagios from 185.125.204.91 port 58586 ssh2
Jan  2 07:01:19 host sshd[16585]: Received disconnect from 185.125.204.91 port 58586:11: Bye Bye [preauth]
Jan  2 07:01:19 host sshd[16585]: Disconnected from 185.125.204.91 port 58586 [preauth]
Jan  2 07:01:27 host sshd[16661]: Invalid user test from 188.166.225.37 port 47180
Jan  2 07:01:27 host sshd[16661]: input_userauth_request: invalid user test [preauth]
Jan  2 07:01:27 host sshd[16661]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 07:01:27 host sshd[16661]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.225.37
Jan  2 07:01:29 host sshd[16661]: Failed password for invalid user test from 188.166.225.37 port 47180 ssh2
Jan  2 07:01:29 host sshd[16661]: Received disconnect from 188.166.225.37 port 47180:11: Bye Bye [preauth]
Jan  2 07:01:29 host sshd[16661]: Disconnected from 188.166.225.37 port 47180 [preauth]
Jan  2 07:01:33 host sshd[16691]: Invalid user test from 211.224.131.58 port 55232
Jan  2 07:01:33 host sshd[16691]: input_userauth_request: invalid user test [preauth]
Jan  2 07:01:33 host sshd[16691]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 07:01:33 host sshd[16691]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.224.131.58
Jan  2 07:01:34 host sshd[16691]: Failed password for invalid user test from 211.224.131.58 port 55232 ssh2
Jan  2 07:01:34 host sshd[16691]: Received disconnect from 211.224.131.58 port 55232:11: Bye Bye [preauth]
Jan  2 07:01:34 host sshd[16691]: Disconnected from 211.224.131.58 port 55232 [preauth]
Jan  2 07:02:52 host sshd[16850]: User root from 211.224.131.58 not allowed because not listed in AllowUsers
Jan  2 07:02:52 host sshd[16850]: input_userauth_request: invalid user root [preauth]
Jan  2 07:02:52 host unix_chkpwd[16853]: password check failed for user (root)
Jan  2 07:02:52 host sshd[16850]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.224.131.58  user=root
Jan  2 07:02:52 host sshd[16850]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 07:02:54 host sshd[16850]: Failed password for invalid user root from 211.224.131.58 port 53572 ssh2
Jan  2 07:02:54 host sshd[16850]: Received disconnect from 211.224.131.58 port 53572:11: Bye Bye [preauth]
Jan  2 07:02:54 host sshd[16850]: Disconnected from 211.224.131.58 port 53572 [preauth]
Jan  2 07:08:33 host sshd[17741]: Did not receive identification string from 149.129.220.104 port 61000
Jan  2 07:17:57 host sshd[19396]: Invalid user user from 103.13.40.2 port 52498
Jan  2 07:17:57 host sshd[19396]: input_userauth_request: invalid user user [preauth]
Jan  2 07:17:57 host sshd[19396]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 07:17:57 host sshd[19396]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2
Jan  2 07:17:59 host sshd[19396]: Failed password for invalid user user from 103.13.40.2 port 52498 ssh2
Jan  2 07:17:59 host sshd[19396]: Connection closed by 103.13.40.2 port 52498 [preauth]
Jan  2 07:18:29 host sshd[19498]: Invalid user user1 from 41.197.31.178 port 59044
Jan  2 07:18:29 host sshd[19498]: input_userauth_request: invalid user user1 [preauth]
Jan  2 07:18:30 host sshd[19498]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 07:18:30 host sshd[19498]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178
Jan  2 07:18:31 host sshd[19498]: Failed password for invalid user user1 from 41.197.31.178 port 59044 ssh2
Jan  2 07:18:32 host sshd[19498]: Connection closed by 41.197.31.178 port 59044 [preauth]
Jan  2 07:18:37 host sshd[19511]: Invalid user chenchen from 106.10.122.53 port 37372
Jan  2 07:18:37 host sshd[19511]: input_userauth_request: invalid user chenchen [preauth]
Jan  2 07:18:37 host sshd[19511]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 07:18:37 host sshd[19511]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53
Jan  2 07:18:39 host sshd[19511]: Failed password for invalid user chenchen from 106.10.122.53 port 37372 ssh2
Jan  2 07:18:39 host sshd[19511]: Connection closed by 106.10.122.53 port 37372 [preauth]
Jan  2 07:19:51 host sshd[19847]: Invalid user support from 193.169.255.30 port 37870
Jan  2 07:19:51 host sshd[19847]: input_userauth_request: invalid user support [preauth]
Jan  2 07:19:51 host sshd[19847]: Failed none for invalid user support from 193.169.255.30 port 37870 ssh2
Jan  2 07:19:54 host sshd[19847]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 07:19:54 host sshd[19847]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.169.255.30
Jan  2 07:19:57 host sshd[19847]: Failed password for invalid user support from 193.169.255.30 port 37870 ssh2
Jan  2 07:20:00 host sshd[19847]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 07:20:02 host sshd[19847]: Failed password for invalid user support from 193.169.255.30 port 37870 ssh2
Jan  2 07:20:05 host sshd[19847]: Connection closed by 193.169.255.30 port 37870 [preauth]
Jan  2 07:20:05 host sshd[19847]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.169.255.30
Jan  2 07:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  2 07:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 07:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 07:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  2 07:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 07:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 07:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  2 07:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 07:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 07:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  2 07:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 07:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 07:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  2 07:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 07:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 07:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  2 07:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 07:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 07:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  2 07:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 07:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 07:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  2 07:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 07:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 07:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  2 07:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 07:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 07:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  2 07:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 07:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 07:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  2 07:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 07:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 07:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  2 07:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 07:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 07:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  2 07:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 07:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 07:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwtestugo user-2=shalinijames user-3=vfmassets user-4=pmcresources user-5=wwwkmaorg user-6=disposeat user-7=remysagr user-8=woodpeck user-9=wwwkapin user-10=kottayamcalldriv user-11=phmetals user-12=gifterman user-13=palco123 user-14=wwwnexidigital user-15=mrsclean user-16=wwwevmhonda user-17=bonifacegroup user-18=wwwletsstalkfood user-19=straightcurve user-20=dartsimp user-21=a2zgroup user-22=laundryboniface user-23=cochintaxi user-24=wwwkaretakers user-25=travelboniface user-26=ugotscom user-27=wwwrmswll user-28=keralaholi user-29=wwwresourcehunte user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  2 07:21:51 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  2 07:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 07:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 07:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  2 07:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 07:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 07:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-zR8AKoaiGOeVfVWy.~
Jan  2 07:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 07:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 07:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-zR8AKoaiGOeVfVWy.~'
Jan  2 07:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 07:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 07:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-zR8AKoaiGOeVfVWy.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  2 07:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 07:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 07:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  2 07:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 07:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 07:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  2 07:21:52 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 07:21:52 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 07:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  2 07:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 07:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 07:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  2 07:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 07:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 07:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  2 07:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 07:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 07:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  2 07:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 07:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 07:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  2 07:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 07:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 07:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  2 07:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  2 07:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  2 07:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  2 07:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  2 07:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  2 07:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  2 07:21:56 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  2 07:21:58 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  2 07:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  2 07:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 07:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 07:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  2 07:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 07:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 07:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  2 07:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 07:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 07:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  2 07:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 07:22:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 07:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  2 07:22:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 07:22:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 07:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  2 07:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  2 07:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  2 07:30:24 host sshd[21650]: Invalid user checkfsys from 104.244.74.6 port 41082
Jan  2 07:30:24 host sshd[21650]: input_userauth_request: invalid user checkfsys [preauth]
Jan  2 07:30:24 host sshd[21650]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 07:30:24 host sshd[21650]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6
Jan  2 07:30:26 host sshd[21650]: Failed password for invalid user checkfsys from 104.244.74.6 port 41082 ssh2
Jan  2 07:30:26 host sshd[21650]: Connection closed by 104.244.74.6 port 41082 [preauth]
Jan  2 07:42:07 host sshd[23318]: Invalid user checkfsys from 104.244.74.6 port 34128
Jan  2 07:42:07 host sshd[23318]: input_userauth_request: invalid user checkfsys [preauth]
Jan  2 07:42:07 host sshd[23318]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 07:42:07 host sshd[23318]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6
Jan  2 07:42:09 host sshd[23318]: Failed password for invalid user checkfsys from 104.244.74.6 port 34128 ssh2
Jan  2 07:42:09 host sshd[23318]: Connection closed by 104.244.74.6 port 34128 [preauth]
Jan  2 07:43:00 host sshd[23417]: User root from 134.17.16.43 not allowed because not listed in AllowUsers
Jan  2 07:43:00 host sshd[23417]: input_userauth_request: invalid user root [preauth]
Jan  2 07:43:00 host unix_chkpwd[23420]: password check failed for user (root)
Jan  2 07:43:00 host sshd[23417]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.17.16.43  user=root
Jan  2 07:43:00 host sshd[23417]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 07:43:02 host sshd[23417]: Failed password for invalid user root from 134.17.16.43 port 37140 ssh2
Jan  2 07:43:02 host sshd[23417]: Received disconnect from 134.17.16.43 port 37140:11: Bye Bye [preauth]
Jan  2 07:43:02 host sshd[23417]: Disconnected from 134.17.16.43 port 37140 [preauth]
Jan  2 07:45:44 host sshd[24124]: Invalid user jonathan from 134.17.16.43 port 37141
Jan  2 07:45:44 host sshd[24124]: input_userauth_request: invalid user jonathan [preauth]
Jan  2 07:45:44 host sshd[24124]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 07:45:44 host sshd[24124]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.17.16.43
Jan  2 07:45:46 host sshd[24124]: Failed password for invalid user jonathan from 134.17.16.43 port 37141 ssh2
Jan  2 07:45:46 host sshd[24124]: Received disconnect from 134.17.16.43 port 37141:11: Bye Bye [preauth]
Jan  2 07:45:46 host sshd[24124]: Disconnected from 134.17.16.43 port 37141 [preauth]
Jan  2 07:59:59 host sshd[26469]: Invalid user checkfsys from 104.244.74.6 port 37818
Jan  2 07:59:59 host sshd[26469]: input_userauth_request: invalid user checkfsys [preauth]
Jan  2 07:59:59 host sshd[26469]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 07:59:59 host sshd[26469]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6
Jan  2 08:00:00 host sshd[26469]: Failed password for invalid user checkfsys from 104.244.74.6 port 37818 ssh2
Jan  2 08:00:01 host sshd[26469]: Connection closed by 104.244.74.6 port 37818 [preauth]
Jan  2 08:04:47 host sshd[27402]: Invalid user user1 from 162.218.126.136 port 33916
Jan  2 08:04:47 host sshd[27402]: input_userauth_request: invalid user user1 [preauth]
Jan  2 08:04:47 host sshd[27402]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 08:04:47 host sshd[27402]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136
Jan  2 08:04:49 host sshd[27402]: Failed password for invalid user user1 from 162.218.126.136 port 33916 ssh2
Jan  2 08:04:49 host sshd[27402]: Connection closed by 162.218.126.136 port 33916 [preauth]
Jan  2 08:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  2 08:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 08:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 08:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  2 08:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 08:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 08:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  2 08:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 08:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 08:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  2 08:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 08:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 08:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  2 08:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 08:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 08:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  2 08:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 08:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 08:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  2 08:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 08:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 08:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  2 08:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 08:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 08:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  2 08:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 08:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 08:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  2 08:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 08:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 08:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  2 08:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 08:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 08:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  2 08:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 08:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 08:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  2 08:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 08:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 08:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwresourcehunte user-2=keralaholi user-3=wwwrmswll user-4=ugotscom user-5=travelboniface user-6=wwwpmcresource user-7=laundryboniface user-8=a2zgroup user-9=dartsimp user-10=wwwkaretakers user-11=cochintaxi user-12=mrsclean user-13=wwwnexidigital user-14=palco123 user-15=gifterman user-16=phmetals user-17=kottayamcalldriv user-18=straightcurve user-19=wwwletsstalkfood user-20=bonifacegroup user-21=wwwevmhonda user-22=pmcresources user-23=vfmassets user-24=shalinijames user-25=wwwtestugo user-26=wwwkapin user-27=woodpeck user-28=disposeat user-29=wwwkmaorg user-30=remysagr feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  2 08:21:50 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  2 08:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 08:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 08:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  2 08:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 08:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 08:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-p7xlVTGiAE3AryUg.~
Jan  2 08:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 08:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 08:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-p7xlVTGiAE3AryUg.~'
Jan  2 08:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 08:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 08:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-p7xlVTGiAE3AryUg.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  2 08:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 08:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 08:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  2 08:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 08:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 08:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  2 08:21:51 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 08:21:51 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 08:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  2 08:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 08:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 08:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  2 08:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 08:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 08:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  2 08:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 08:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 08:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  2 08:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 08:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 08:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  2 08:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 08:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 08:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  2 08:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  2 08:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  2 08:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  2 08:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  2 08:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  2 08:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  2 08:21:55 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  2 08:21:57 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  2 08:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  2 08:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 08:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 08:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  2 08:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 08:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 08:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  2 08:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 08:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 08:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  2 08:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 08:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 08:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  2 08:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 08:22:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 08:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  2 08:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  2 08:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  2 08:24:41 host sshd[30818]: Did not receive identification string from 163.53.90.10 port 50308
Jan  2 08:24:43 host sshd[30820]: Invalid user fah from 163.53.90.10 port 50397
Jan  2 08:24:43 host sshd[30820]: input_userauth_request: invalid user fah [preauth]
Jan  2 08:24:44 host sshd[30823]: Invalid user sysop from 163.53.90.10 port 50398
Jan  2 08:24:44 host sshd[30823]: input_userauth_request: invalid user sysop [preauth]
Jan  2 08:24:44 host sshd[30822]: Invalid user labocosta from 163.53.90.10 port 50396
Jan  2 08:24:44 host sshd[30822]: input_userauth_request: invalid user labocosta [preauth]
Jan  2 08:24:44 host sshd[30826]: Invalid user hudi from 163.53.90.10 port 50399
Jan  2 08:24:44 host sshd[30826]: input_userauth_request: invalid user hudi [preauth]
Jan  2 08:24:44 host sshd[30820]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 08:24:44 host sshd[30820]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.53.90.10
Jan  2 08:24:45 host sshd[30823]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 08:24:45 host sshd[30823]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.53.90.10
Jan  2 08:24:45 host sshd[30822]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 08:24:45 host sshd[30822]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.53.90.10
Jan  2 08:24:45 host sshd[30826]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 08:24:45 host sshd[30826]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.53.90.10
Jan  2 08:24:46 host sshd[30820]: Failed password for invalid user fah from 163.53.90.10 port 50397 ssh2
Jan  2 08:24:47 host sshd[30823]: Failed password for invalid user sysop from 163.53.90.10 port 50398 ssh2
Jan  2 08:24:47 host sshd[30822]: Failed password for invalid user labocosta from 163.53.90.10 port 50396 ssh2
Jan  2 08:24:47 host sshd[30826]: Failed password for invalid user hudi from 163.53.90.10 port 50399 ssh2
Jan  2 08:41:35 host sshd[1044]: User root from 106.10.122.53 not allowed because not listed in AllowUsers
Jan  2 08:41:35 host sshd[1044]: input_userauth_request: invalid user root [preauth]
Jan  2 08:41:35 host unix_chkpwd[1050]: password check failed for user (root)
Jan  2 08:41:35 host sshd[1044]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53  user=root
Jan  2 08:41:35 host sshd[1044]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 08:41:37 host sshd[1044]: Failed password for invalid user root from 106.10.122.53 port 48526 ssh2
Jan  2 08:41:37 host sshd[1044]: Connection closed by 106.10.122.53 port 48526 [preauth]
Jan  2 08:44:46 host sshd[1449]: User root from 103.13.40.2 not allowed because not listed in AllowUsers
Jan  2 08:44:46 host sshd[1449]: input_userauth_request: invalid user root [preauth]
Jan  2 08:44:46 host unix_chkpwd[1451]: password check failed for user (root)
Jan  2 08:44:46 host sshd[1449]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2  user=root
Jan  2 08:44:46 host sshd[1449]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 08:44:48 host sshd[1449]: Failed password for invalid user root from 103.13.40.2 port 58432 ssh2
Jan  2 08:44:48 host sshd[1449]: Connection closed by 103.13.40.2 port 58432 [preauth]
Jan  2 08:58:45 host sshd[3705]: Invalid user user from 41.197.31.178 port 34890
Jan  2 08:58:45 host sshd[3705]: input_userauth_request: invalid user user [preauth]
Jan  2 08:58:45 host sshd[3705]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 08:58:45 host sshd[3705]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178
Jan  2 08:58:48 host sshd[3705]: Failed password for invalid user user from 41.197.31.178 port 34890 ssh2
Jan  2 08:58:48 host sshd[3705]: Connection closed by 41.197.31.178 port 34890 [preauth]
Jan  2 08:59:23 host sshd[3772]: Invalid user jerry from 107.189.30.59 port 60524
Jan  2 08:59:23 host sshd[3772]: input_userauth_request: invalid user jerry [preauth]
Jan  2 08:59:23 host sshd[3772]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 08:59:23 host sshd[3772]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59
Jan  2 08:59:25 host sshd[3772]: Failed password for invalid user jerry from 107.189.30.59 port 60524 ssh2
Jan  2 08:59:26 host sshd[3772]: Connection closed by 107.189.30.59 port 60524 [preauth]
Jan  2 09:13:51 host sshd[6224]: User tomcat from 162.218.126.136 not allowed because not listed in AllowUsers
Jan  2 09:13:51 host sshd[6224]: input_userauth_request: invalid user tomcat [preauth]
Jan  2 09:13:52 host unix_chkpwd[6228]: password check failed for user (tomcat)
Jan  2 09:13:52 host sshd[6224]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136  user=tomcat
Jan  2 09:13:52 host sshd[6224]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "tomcat"
Jan  2 09:13:53 host sshd[6224]: Failed password for invalid user tomcat from 162.218.126.136 port 59344 ssh2
Jan  2 09:13:53 host sshd[6224]: Connection closed by 162.218.126.136 port 59344 [preauth]
Jan  2 09:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  2 09:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 09:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 09:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  2 09:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 09:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 09:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  2 09:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 09:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 09:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  2 09:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 09:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 09:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  2 09:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 09:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 09:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  2 09:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 09:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 09:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  2 09:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 09:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 09:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  2 09:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 09:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 09:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  2 09:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 09:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 09:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  2 09:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 09:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 09:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  2 09:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 09:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 09:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  2 09:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 09:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 09:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  2 09:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 09:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 09:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkmaorg user-2=disposeat user-3=remysagr user-4=wwwkapin user-5=woodpeck user-6=vfmassets user-7=shalinijames user-8=wwwtestugo user-9=pmcresources user-10=bonifacegroup user-11=wwwevmhonda user-12=straightcurve user-13=wwwletsstalkfood user-14=palco123 user-15=gifterman user-16=kottayamcalldriv user-17=phmetals user-18=wwwnexidigital user-19=mrsclean user-20=cochintaxi user-21=wwwkaretakers user-22=a2zgroup user-23=dartsimp user-24=laundryboniface user-25=wwwpmcresource user-26=travelboniface user-27=wwwresourcehunte user-28=keralaholi user-29=wwwrmswll user-30=ugotscom feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  2 09:21:54 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  2 09:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 09:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 09:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  2 09:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 09:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 09:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-toCpUg8Y7nL1e0fF.~
Jan  2 09:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 09:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 09:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-toCpUg8Y7nL1e0fF.~'
Jan  2 09:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 09:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 09:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-toCpUg8Y7nL1e0fF.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  2 09:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 09:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 09:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  2 09:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 09:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 09:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  2 09:21:55 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 09:21:55 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 09:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  2 09:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 09:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 09:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  2 09:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 09:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 09:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  2 09:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 09:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 09:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  2 09:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 09:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 09:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  2 09:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 09:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 09:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  2 09:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  2 09:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  2 09:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  2 09:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  2 09:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  2 09:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  2 09:22:00 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  2 09:22:02 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  2 09:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  2 09:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 09:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 09:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  2 09:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 09:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 09:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  2 09:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 09:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 09:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  2 09:22:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 09:22:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 09:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  2 09:22:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 09:22:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 09:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  2 09:22:09 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  2 09:22:10 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  2 09:28:16 host sshd[8997]: Invalid user jiayu from 92.46.108.20 port 42782
Jan  2 09:28:16 host sshd[8997]: input_userauth_request: invalid user jiayu [preauth]
Jan  2 09:28:16 host sshd[8997]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 09:28:16 host sshd[8997]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20
Jan  2 09:28:19 host sshd[8997]: Failed password for invalid user jiayu from 92.46.108.20 port 42782 ssh2
Jan  2 09:28:19 host sshd[8997]: Connection closed by 92.46.108.20 port 42782 [preauth]
Jan  2 09:57:18 host sshd[13183]: User root from 109.115.187.31 not allowed because not listed in AllowUsers
Jan  2 09:57:18 host sshd[13183]: input_userauth_request: invalid user root [preauth]
Jan  2 09:57:18 host unix_chkpwd[13187]: password check failed for user (root)
Jan  2 09:57:18 host sshd[13183]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.115.187.31  user=root
Jan  2 09:57:18 host sshd[13183]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 09:57:20 host sshd[13183]: Failed password for invalid user root from 109.115.187.31 port 58146 ssh2
Jan  2 09:57:20 host sshd[13183]: Received disconnect from 109.115.187.31 port 58146:11: Bye Bye [preauth]
Jan  2 09:57:20 host sshd[13183]: Disconnected from 109.115.187.31 port 58146 [preauth]
Jan  2 09:58:45 host sshd[13340]: Invalid user oracle from 186.38.26.5 port 59530
Jan  2 09:58:45 host sshd[13340]: input_userauth_request: invalid user oracle [preauth]
Jan  2 09:58:45 host sshd[13340]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 09:58:45 host sshd[13340]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.38.26.5
Jan  2 09:58:48 host sshd[13340]: Failed password for invalid user oracle from 186.38.26.5 port 59530 ssh2
Jan  2 09:58:48 host sshd[13340]: Received disconnect from 186.38.26.5 port 59530:11: Bye Bye [preauth]
Jan  2 09:58:48 host sshd[13340]: Disconnected from 186.38.26.5 port 59530 [preauth]
Jan  2 09:59:48 host sshd[13608]: Invalid user anastacia from 111.238.174.6 port 35532
Jan  2 09:59:48 host sshd[13608]: input_userauth_request: invalid user anastacia [preauth]
Jan  2 09:59:48 host sshd[13608]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 09:59:48 host sshd[13608]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.238.174.6
Jan  2 09:59:50 host sshd[13608]: Failed password for invalid user anastacia from 111.238.174.6 port 35532 ssh2
Jan  2 09:59:50 host sshd[13608]: Received disconnect from 111.238.174.6 port 35532:11: Bye Bye [preauth]
Jan  2 09:59:50 host sshd[13608]: Disconnected from 111.238.174.6 port 35532 [preauth]
Jan  2 10:00:00 host sshd[13758]: User root from 54.37.205.109 not allowed because not listed in AllowUsers
Jan  2 10:00:00 host sshd[13758]: input_userauth_request: invalid user root [preauth]
Jan  2 10:00:00 host unix_chkpwd[13763]: password check failed for user (root)
Jan  2 10:00:00 host sshd[13758]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.205.109  user=root
Jan  2 10:00:00 host sshd[13758]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 10:00:02 host sshd[13758]: Failed password for invalid user root from 54.37.205.109 port 37728 ssh2
Jan  2 10:00:02 host sshd[13758]: Received disconnect from 54.37.205.109 port 37728:11: Bye Bye [preauth]
Jan  2 10:00:02 host sshd[13758]: Disconnected from 54.37.205.109 port 37728 [preauth]
Jan  2 10:00:47 host sshd[13991]: User root from 111.238.174.6 not allowed because not listed in AllowUsers
Jan  2 10:00:47 host sshd[13991]: input_userauth_request: invalid user root [preauth]
Jan  2 10:00:47 host unix_chkpwd[13998]: password check failed for user (root)
Jan  2 10:00:47 host sshd[13991]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.238.174.6  user=root
Jan  2 10:00:47 host sshd[13991]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 10:00:49 host sshd[13991]: Failed password for invalid user root from 111.238.174.6 port 46996 ssh2
Jan  2 10:00:49 host sshd[13991]: Received disconnect from 111.238.174.6 port 46996:11: Bye Bye [preauth]
Jan  2 10:00:49 host sshd[13991]: Disconnected from 111.238.174.6 port 46996 [preauth]
Jan  2 10:03:09 host sshd[14610]: User root from 54.37.205.109 not allowed because not listed in AllowUsers
Jan  2 10:03:09 host sshd[14610]: input_userauth_request: invalid user root [preauth]
Jan  2 10:03:09 host unix_chkpwd[14617]: password check failed for user (root)
Jan  2 10:03:09 host sshd[14610]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.205.109  user=root
Jan  2 10:03:09 host sshd[14610]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 10:03:11 host sshd[14610]: Failed password for invalid user root from 54.37.205.109 port 49068 ssh2
Jan  2 10:03:11 host sshd[14610]: Received disconnect from 54.37.205.109 port 49068:11: Bye Bye [preauth]
Jan  2 10:03:11 host sshd[14610]: Disconnected from 54.37.205.109 port 49068 [preauth]
Jan  2 10:03:22 host sshd[14696]: User root from 109.115.187.31 not allowed because not listed in AllowUsers
Jan  2 10:03:22 host sshd[14696]: input_userauth_request: invalid user root [preauth]
Jan  2 10:03:22 host unix_chkpwd[14701]: password check failed for user (root)
Jan  2 10:03:22 host sshd[14696]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.115.187.31  user=root
Jan  2 10:03:22 host sshd[14696]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 10:03:24 host sshd[14710]: User root from 165.227.87.78 not allowed because not listed in AllowUsers
Jan  2 10:03:24 host sshd[14710]: input_userauth_request: invalid user root [preauth]
Jan  2 10:03:24 host unix_chkpwd[14740]: password check failed for user (root)
Jan  2 10:03:24 host sshd[14710]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.87.78  user=root
Jan  2 10:03:24 host sshd[14710]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 10:03:25 host sshd[14696]: Failed password for invalid user root from 109.115.187.31 port 58886 ssh2
Jan  2 10:03:27 host sshd[14710]: Failed password for invalid user root from 165.227.87.78 port 54612 ssh2
Jan  2 10:03:27 host sshd[14710]: Received disconnect from 165.227.87.78 port 54612:11: Bye Bye [preauth]
Jan  2 10:03:27 host sshd[14710]: Disconnected from 165.227.87.78 port 54612 [preauth]
Jan  2 10:03:54 host sshd[14880]: User root from 186.38.26.5 not allowed because not listed in AllowUsers
Jan  2 10:03:54 host sshd[14880]: input_userauth_request: invalid user root [preauth]
Jan  2 10:03:54 host unix_chkpwd[14889]: password check failed for user (root)
Jan  2 10:03:54 host sshd[14880]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.38.26.5  user=root
Jan  2 10:03:54 host sshd[14880]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 10:03:56 host sshd[14880]: Failed password for invalid user root from 186.38.26.5 port 55526 ssh2
Jan  2 10:03:56 host sshd[14880]: Received disconnect from 186.38.26.5 port 55526:11: Bye Bye [preauth]
Jan  2 10:03:56 host sshd[14880]: Disconnected from 186.38.26.5 port 55526 [preauth]
Jan  2 10:04:04 host sshd[14960]: Invalid user applprod from 106.10.122.53 port 35466
Jan  2 10:04:04 host sshd[14960]: input_userauth_request: invalid user applprod [preauth]
Jan  2 10:04:04 host sshd[14960]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 10:04:04 host sshd[14960]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53
Jan  2 10:04:06 host sshd[14960]: Failed password for invalid user applprod from 106.10.122.53 port 35466 ssh2
Jan  2 10:04:06 host sshd[14960]: Connection closed by 106.10.122.53 port 35466 [preauth]
Jan  2 10:04:58 host sshd[15176]: User root from 165.227.87.78 not allowed because not listed in AllowUsers
Jan  2 10:04:58 host sshd[15176]: input_userauth_request: invalid user root [preauth]
Jan  2 10:04:58 host unix_chkpwd[15182]: password check failed for user (root)
Jan  2 10:04:58 host sshd[15176]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.87.78  user=root
Jan  2 10:04:58 host sshd[15176]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 10:05:00 host sshd[15176]: Failed password for invalid user root from 165.227.87.78 port 35986 ssh2
Jan  2 10:11:47 host sshd[17010]: User root from 103.13.40.2 not allowed because not listed in AllowUsers
Jan  2 10:11:47 host sshd[17010]: input_userauth_request: invalid user root [preauth]
Jan  2 10:11:47 host unix_chkpwd[17012]: password check failed for user (root)
Jan  2 10:11:47 host sshd[17010]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2  user=root
Jan  2 10:11:47 host sshd[17010]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 10:11:49 host sshd[17010]: Failed password for invalid user root from 103.13.40.2 port 57666 ssh2
Jan  2 10:11:49 host sshd[17010]: Connection closed by 103.13.40.2 port 57666 [preauth]
Jan  2 10:19:08 host sshd[18090]: Invalid user user1 from 162.218.126.136 port 33368
Jan  2 10:19:08 host sshd[18090]: input_userauth_request: invalid user user1 [preauth]
Jan  2 10:19:09 host sshd[18090]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 10:19:09 host sshd[18090]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136
Jan  2 10:19:11 host sshd[18090]: Failed password for invalid user user1 from 162.218.126.136 port 33368 ssh2
Jan  2 10:19:11 host sshd[18090]: Connection closed by 162.218.126.136 port 33368 [preauth]
Jan  2 10:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  2 10:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 10:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 10:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  2 10:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 10:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 10:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  2 10:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 10:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 10:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  2 10:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 10:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 10:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  2 10:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 10:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 10:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  2 10:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 10:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 10:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  2 10:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 10:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 10:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  2 10:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 10:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 10:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  2 10:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 10:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 10:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  2 10:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 10:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 10:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  2 10:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 10:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 10:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  2 10:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 10:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 10:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  2 10:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 10:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 10:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=disposeat user-2=remysagr user-3=wwwkmaorg user-4=wwwkapin user-5=woodpeck user-6=vfmassets user-7=shalinijames user-8=wwwtestugo user-9=pmcresources user-10=bonifacegroup user-11=wwwevmhonda user-12=wwwletsstalkfood user-13=straightcurve user-14=palco123 user-15=gifterman user-16=kottayamcalldriv user-17=phmetals user-18=mrsclean user-19=wwwnexidigital user-20=cochintaxi user-21=wwwkaretakers user-22=a2zgroup user-23=dartsimp user-24=laundryboniface user-25=wwwpmcresource user-26=travelboniface user-27=wwwresourcehunte user-28=keralaholi user-29=wwwrmswll user-30=ugotscom feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  2 10:21:52 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  2 10:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 10:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 10:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  2 10:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 10:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 10:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-w20Ozunc0p9fdPju.~
Jan  2 10:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 10:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 10:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-w20Ozunc0p9fdPju.~'
Jan  2 10:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 10:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 10:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-w20Ozunc0p9fdPju.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  2 10:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 10:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 10:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  2 10:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 10:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 10:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  2 10:21:53 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 10:21:53 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 10:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  2 10:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 10:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 10:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  2 10:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 10:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 10:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  2 10:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 10:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 10:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  2 10:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 10:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 10:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  2 10:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 10:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 10:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  2 10:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  2 10:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  2 10:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  2 10:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  2 10:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  2 10:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  2 10:21:57 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  2 10:22:04 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  2 10:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  2 10:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 10:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 10:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  2 10:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 10:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 10:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  2 10:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 10:22:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 10:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  2 10:22:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 10:22:10 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 10:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  2 10:22:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 10:22:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 10:22:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  2 10:22:13 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  2 10:22:14 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  2 10:35:32 host sshd[20843]: Invalid user bfeng from 41.197.31.178 port 50734
Jan  2 10:35:32 host sshd[20843]: input_userauth_request: invalid user bfeng [preauth]
Jan  2 10:35:33 host sshd[20843]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 10:35:33 host sshd[20843]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178
Jan  2 10:35:35 host sshd[20843]: Failed password for invalid user bfeng from 41.197.31.178 port 50734 ssh2
Jan  2 10:35:35 host sshd[20843]: Connection closed by 41.197.31.178 port 50734 [preauth]
Jan  2 11:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  2 11:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 11:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 11:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  2 11:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 11:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 11:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  2 11:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 11:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 11:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  2 11:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 11:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 11:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  2 11:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 11:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 11:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  2 11:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 11:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 11:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  2 11:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 11:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 11:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  2 11:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 11:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 11:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  2 11:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 11:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 11:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  2 11:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 11:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 11:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  2 11:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 11:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 11:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  2 11:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 11:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 11:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  2 11:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 11:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 11:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=pmcresources user-2=vfmassets user-3=wwwtestugo user-4=shalinijames user-5=wwwkapin user-6=woodpeck user-7=disposeat user-8=wwwkmaorg user-9=remysagr user-10=mrsclean user-11=wwwnexidigital user-12=gifterman user-13=palco123 user-14=phmetals user-15=kottayamcalldriv user-16=straightcurve user-17=wwwletsstalkfood user-18=bonifacegroup user-19=wwwevmhonda user-20=laundryboniface user-21=dartsimp user-22=a2zgroup user-23=wwwkaretakers user-24=cochintaxi user-25=wwwrmswll user-26=keralaholi user-27=wwwresourcehunte user-28=ugotscom user-29=travelboniface user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  2 11:21:51 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  2 11:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 11:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 11:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  2 11:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 11:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 11:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-DNtsOUWG9jiTucOY.~
Jan  2 11:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 11:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 11:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-DNtsOUWG9jiTucOY.~'
Jan  2 11:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 11:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 11:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-DNtsOUWG9jiTucOY.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  2 11:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 11:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 11:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  2 11:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 11:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 11:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  2 11:21:52 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 11:21:52 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 11:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  2 11:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 11:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 11:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  2 11:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 11:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 11:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  2 11:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 11:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 11:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  2 11:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 11:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 11:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  2 11:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 11:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 11:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  2 11:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  2 11:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  2 11:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  2 11:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  2 11:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  2 11:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  2 11:21:59 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  2 11:22:01 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  2 11:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  2 11:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 11:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 11:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  2 11:22:08 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 11:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 11:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  2 11:22:08 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 11:22:13 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 11:22:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  2 11:22:14 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 11:22:20 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 11:22:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  2 11:22:20 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 11:22:24 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 11:22:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  2 11:22:25 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  2 11:22:26 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  2 11:24:04 host sshd[27955]: User root from 162.218.126.136 not allowed because not listed in AllowUsers
Jan  2 11:24:04 host sshd[27955]: input_userauth_request: invalid user root [preauth]
Jan  2 11:24:05 host unix_chkpwd[27958]: password check failed for user (root)
Jan  2 11:24:05 host sshd[27955]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136  user=root
Jan  2 11:24:05 host sshd[27955]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 11:24:07 host sshd[27955]: Failed password for invalid user root from 162.218.126.136 port 47866 ssh2
Jan  2 11:24:07 host sshd[27955]: Connection closed by 162.218.126.136 port 47866 [preauth]
Jan  2 11:26:22 host sshd[28203]: Invalid user dcmadmin from 106.10.122.53 port 57994
Jan  2 11:26:22 host sshd[28203]: input_userauth_request: invalid user dcmadmin [preauth]
Jan  2 11:26:22 host sshd[28203]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 11:26:22 host sshd[28203]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53
Jan  2 11:26:24 host sshd[28203]: Failed password for invalid user dcmadmin from 106.10.122.53 port 57994 ssh2
Jan  2 11:26:24 host sshd[28203]: Connection closed by 106.10.122.53 port 57994 [preauth]
Jan  2 11:38:53 host sshd[31254]: Invalid user steam from 103.13.40.2 port 41436
Jan  2 11:38:53 host sshd[31254]: input_userauth_request: invalid user steam [preauth]
Jan  2 11:38:53 host sshd[31254]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 11:38:53 host sshd[31254]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2
Jan  2 11:38:56 host sshd[31254]: Failed password for invalid user steam from 103.13.40.2 port 41436 ssh2
Jan  2 11:38:56 host sshd[31254]: Connection closed by 103.13.40.2 port 41436 [preauth]
Jan  2 11:43:19 host sshd[32000]: Invalid user ubnt from 45.128.234.195 port 46428
Jan  2 11:43:19 host sshd[32000]: input_userauth_request: invalid user ubnt [preauth]
Jan  2 11:43:19 host sshd[32000]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 11:43:19 host sshd[32000]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.128.234.195
Jan  2 11:43:20 host sshd[32000]: Failed password for invalid user ubnt from 45.128.234.195 port 46428 ssh2
Jan  2 11:43:20 host sshd[32000]: Received disconnect from 45.128.234.195 port 46428:11: Bye Bye [preauth]
Jan  2 11:43:20 host sshd[32000]: Disconnected from 45.128.234.195 port 46428 [preauth]
Jan  2 11:43:23 host sshd[32005]: Invalid user admin from 45.128.234.195 port 55436
Jan  2 11:43:23 host sshd[32005]: input_userauth_request: invalid user admin [preauth]
Jan  2 11:43:23 host sshd[32005]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 11:43:23 host sshd[32005]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.128.234.195
Jan  2 11:43:25 host sshd[32005]: Failed password for invalid user admin from 45.128.234.195 port 55436 ssh2
Jan  2 11:43:26 host sshd[32005]: Received disconnect from 45.128.234.195 port 55436:11: Bye Bye [preauth]
Jan  2 11:43:26 host sshd[32005]: Disconnected from 45.128.234.195 port 55436 [preauth]
Jan  2 11:43:30 host sshd[32039]: User root from 45.128.234.195 not allowed because not listed in AllowUsers
Jan  2 11:43:30 host sshd[32039]: input_userauth_request: invalid user root [preauth]
Jan  2 11:43:30 host unix_chkpwd[32047]: password check failed for user (root)
Jan  2 11:43:30 host sshd[32039]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.128.234.195  user=root
Jan  2 11:43:30 host sshd[32039]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 11:43:32 host sshd[32039]: Failed password for invalid user root from 45.128.234.195 port 42124 ssh2
Jan  2 12:02:27 host sshd[3133]: User root from 107.189.1.155 not allowed because not listed in AllowUsers
Jan  2 12:02:27 host sshd[3133]: input_userauth_request: invalid user root [preauth]
Jan  2 12:02:27 host sshd[3133]: Failed none for invalid user root from 107.189.1.155 port 42662 ssh2
Jan  2 12:02:27 host sshd[3133]: Connection closed by 107.189.1.155 port 42662 [preauth]
Jan  2 12:02:29 host sshd[3140]: User root from 107.189.1.155 not allowed because not listed in AllowUsers
Jan  2 12:02:29 host sshd[3140]: input_userauth_request: invalid user root [preauth]
Jan  2 12:02:29 host unix_chkpwd[3144]: password check failed for user (root)
Jan  2 12:02:29 host sshd[3140]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.1.155  user=root
Jan  2 12:02:29 host sshd[3140]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 12:02:31 host sshd[3140]: Failed password for invalid user root from 107.189.1.155 port 45080 ssh2
Jan  2 12:02:31 host sshd[3140]: Connection closed by 107.189.1.155 port 45080 [preauth]
Jan  2 12:02:32 host sshd[3147]: User root from 107.189.1.155 not allowed because not listed in AllowUsers
Jan  2 12:02:32 host sshd[3147]: input_userauth_request: invalid user root [preauth]
Jan  2 12:02:33 host unix_chkpwd[3155]: password check failed for user (root)
Jan  2 12:02:33 host sshd[3147]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.1.155  user=root
Jan  2 12:02:33 host sshd[3147]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 12:02:34 host sshd[3147]: Failed password for invalid user root from 107.189.1.155 port 49312 ssh2
Jan  2 12:02:34 host sshd[3147]: Connection closed by 107.189.1.155 port 49312 [preauth]
Jan  2 12:02:36 host sshd[3160]: User root from 107.189.1.155 not allowed because not listed in AllowUsers
Jan  2 12:02:36 host sshd[3160]: input_userauth_request: invalid user root [preauth]
Jan  2 12:02:36 host unix_chkpwd[3167]: password check failed for user (root)
Jan  2 12:02:36 host sshd[3160]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.1.155  user=root
Jan  2 12:02:36 host sshd[3160]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 12:02:38 host sshd[3160]: Failed password for invalid user root from 107.189.1.155 port 54128 ssh2
Jan  2 12:08:10 host sshd[4468]: User root from 92.46.108.20 not allowed because not listed in AllowUsers
Jan  2 12:08:10 host sshd[4468]: input_userauth_request: invalid user root [preauth]
Jan  2 12:08:11 host unix_chkpwd[4473]: password check failed for user (root)
Jan  2 12:08:11 host sshd[4468]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20  user=root
Jan  2 12:08:11 host sshd[4468]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 12:08:13 host sshd[4468]: Failed password for invalid user root from 92.46.108.20 port 50450 ssh2
Jan  2 12:08:14 host sshd[4468]: Connection closed by 92.46.108.20 port 50450 [preauth]
Jan  2 12:08:44 host sshd[4541]: Invalid user lyl from 41.197.31.178 port 47746
Jan  2 12:08:44 host sshd[4541]: input_userauth_request: invalid user lyl [preauth]
Jan  2 12:08:44 host sshd[4541]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 12:08:44 host sshd[4541]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178
Jan  2 12:08:46 host sshd[4541]: Failed password for invalid user lyl from 41.197.31.178 port 47746 ssh2
Jan  2 12:08:46 host sshd[4541]: Connection closed by 41.197.31.178 port 47746 [preauth]
Jan  2 12:15:06 host sshd[5481]: Connection closed by 66.175.213.4 port 59360 [preauth]
Jan  2 12:15:07 host sshd[5484]: Connection closed by 66.175.213.4 port 59388 [preauth]
Jan  2 12:15:09 host sshd[5487]: Connection closed by 66.175.213.4 port 59394 [preauth]
Jan  2 12:21:11 host sshd[6344]: Connection closed by 66.240.236.116 port 51290 [preauth]
Jan  2 12:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  2 12:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 12:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 12:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  2 12:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 12:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 12:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  2 12:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 12:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 12:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  2 12:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 12:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 12:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  2 12:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 12:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 12:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  2 12:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 12:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 12:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  2 12:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 12:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 12:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  2 12:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 12:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 12:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  2 12:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 12:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 12:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  2 12:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 12:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 12:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  2 12:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 12:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 12:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  2 12:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 12:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 12:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  2 12:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 12:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 12:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=wwwrmswll user-3=keralaholi user-4=wwwresourcehunte user-5=ugotscom user-6=travelboniface user-7=wwwkaretakers user-8=cochintaxi user-9=laundryboniface user-10=dartsimp user-11=a2zgroup user-12=straightcurve user-13=wwwletsstalkfood user-14=bonifacegroup user-15=wwwevmhonda user-16=mrsclean user-17=wwwnexidigital user-18=gifterman user-19=palco123 user-20=kottayamcalldriv user-21=phmetals user-22=woodpeck user-23=wwwkapin user-24=wwwkmaorg user-25=disposeat user-26=remysagr user-27=pmcresources user-28=vfmassets user-29=wwwtestugo user-30=shalinijames feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  2 12:21:51 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  2 12:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 12:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 12:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  2 12:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 12:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 12:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-UhwLmZuO3RADnP9w.~
Jan  2 12:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 12:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 12:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-UhwLmZuO3RADnP9w.~'
Jan  2 12:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 12:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 12:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-UhwLmZuO3RADnP9w.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  2 12:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 12:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 12:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  2 12:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 12:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 12:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  2 12:21:52 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 12:21:52 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 12:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  2 12:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 12:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 12:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  2 12:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 12:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 12:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  2 12:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 12:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 12:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  2 12:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 12:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 12:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  2 12:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 12:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 12:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  2 12:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  2 12:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  2 12:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  2 12:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  2 12:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  2 12:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  2 12:22:00 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  2 12:22:04 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  2 12:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  2 12:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 12:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 12:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  2 12:22:08 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 12:22:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 12:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  2 12:22:09 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 12:22:14 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 12:22:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  2 12:22:14 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 12:22:20 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 12:22:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  2 12:22:21 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 12:22:27 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 12:22:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  2 12:22:28 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  2 12:22:29 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  2 12:24:44 host sshd[6954]: Connection closed by 192.241.236.45 port 39134 [preauth]
Jan  2 12:28:52 host sshd[7569]: User root from 162.218.126.136 not allowed because not listed in AllowUsers
Jan  2 12:28:52 host sshd[7569]: input_userauth_request: invalid user root [preauth]
Jan  2 12:28:53 host unix_chkpwd[7572]: password check failed for user (root)
Jan  2 12:28:53 host sshd[7569]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136  user=root
Jan  2 12:28:53 host sshd[7569]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 12:28:55 host sshd[7569]: Failed password for invalid user root from 162.218.126.136 port 49558 ssh2
Jan  2 12:28:55 host sshd[7569]: Connection closed by 162.218.126.136 port 49558 [preauth]
Jan  2 12:48:36 host sshd[10377]: User root from 106.10.122.53 not allowed because not listed in AllowUsers
Jan  2 12:48:36 host sshd[10377]: input_userauth_request: invalid user root [preauth]
Jan  2 12:48:36 host unix_chkpwd[10379]: password check failed for user (root)
Jan  2 12:48:36 host sshd[10377]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53  user=root
Jan  2 12:48:36 host sshd[10377]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 12:48:38 host sshd[10377]: Failed password for invalid user root from 106.10.122.53 port 35934 ssh2
Jan  2 12:48:38 host sshd[10377]: Connection closed by 106.10.122.53 port 35934 [preauth]
Jan  2 13:05:22 host sshd[12753]: Invalid user ljli from 103.13.40.2 port 42408
Jan  2 13:05:22 host sshd[12753]: input_userauth_request: invalid user ljli [preauth]
Jan  2 13:05:22 host sshd[12753]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 13:05:22 host sshd[12753]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2
Jan  2 13:05:24 host sshd[12753]: Failed password for invalid user ljli from 103.13.40.2 port 42408 ssh2
Jan  2 13:05:24 host sshd[12753]: Connection closed by 103.13.40.2 port 42408 [preauth]
Jan  2 13:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  2 13:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 13:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 13:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  2 13:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 13:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 13:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  2 13:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 13:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 13:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  2 13:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 13:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 13:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  2 13:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 13:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 13:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  2 13:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 13:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 13:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  2 13:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 13:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 13:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  2 13:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 13:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 13:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  2 13:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 13:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 13:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  2 13:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 13:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 13:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  2 13:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 13:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 13:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  2 13:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 13:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 13:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  2 13:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 13:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 13:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=gifterman user-2=palco123 user-3=kottayamcalldriv user-4=phmetals user-5=mrsclean user-6=wwwnexidigital user-7=bonifacegroup user-8=wwwevmhonda user-9=straightcurve user-10=wwwletsstalkfood user-11=vfmassets user-12=wwwtestugo user-13=shalinijames user-14=pmcresources user-15=wwwkmaorg user-16=disposeat user-17=remysagr user-18=wwwkapin user-19=woodpeck user-20=travelboniface user-21=wwwrmswll user-22=wwwresourcehunte user-23=keralaholi user-24=ugotscom user-25=wwwpmcresource user-26=dartsimp user-27=a2zgroup user-28=laundryboniface user-29=wwwkaretakers user-30=cochintaxi feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  2 13:21:51 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  2 13:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 13:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 13:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  2 13:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 13:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 13:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-8mHhoxLmkBklhi6l.~
Jan  2 13:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 13:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 13:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-8mHhoxLmkBklhi6l.~'
Jan  2 13:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 13:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 13:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-8mHhoxLmkBklhi6l.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  2 13:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 13:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 13:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  2 13:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 13:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 13:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  2 13:21:52 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 13:21:52 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 13:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  2 13:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 13:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 13:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  2 13:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 13:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 13:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  2 13:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 13:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 13:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  2 13:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 13:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 13:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  2 13:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 13:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 13:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  2 13:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  2 13:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  2 13:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  2 13:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  2 13:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  2 13:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  2 13:21:56 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  2 13:21:58 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  2 13:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  2 13:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 13:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 13:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  2 13:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 13:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 13:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  2 13:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 13:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 13:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  2 13:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 13:22:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 13:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  2 13:22:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 13:22:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 13:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  2 13:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  2 13:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  2 13:34:45 host sshd[18080]: User root from 162.218.126.136 not allowed because not listed in AllowUsers
Jan  2 13:34:45 host sshd[18080]: input_userauth_request: invalid user root [preauth]
Jan  2 13:34:45 host unix_chkpwd[18083]: password check failed for user (root)
Jan  2 13:34:45 host sshd[18080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136  user=root
Jan  2 13:34:45 host sshd[18080]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 13:34:47 host sshd[18080]: Failed password for invalid user root from 162.218.126.136 port 48466 ssh2
Jan  2 13:34:47 host sshd[18080]: Connection closed by 162.218.126.136 port 48466 [preauth]
Jan  2 13:49:39 host sshd[20537]: Invalid user postgres from 41.197.31.178 port 60022
Jan  2 13:49:39 host sshd[20537]: input_userauth_request: invalid user postgres [preauth]
Jan  2 13:49:39 host sshd[20537]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 13:49:39 host sshd[20537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178
Jan  2 13:49:41 host sshd[20537]: Failed password for invalid user postgres from 41.197.31.178 port 60022 ssh2
Jan  2 13:49:41 host sshd[20537]: Connection closed by 41.197.31.178 port 60022 [preauth]
Jan  2 13:53:13 host sshd[21096]: Invalid user dennis from 107.189.30.59 port 46984
Jan  2 13:53:13 host sshd[21096]: input_userauth_request: invalid user dennis [preauth]
Jan  2 13:53:13 host sshd[21096]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 13:53:13 host sshd[21096]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59
Jan  2 13:53:16 host sshd[21096]: Failed password for invalid user dennis from 107.189.30.59 port 46984 ssh2
Jan  2 13:53:16 host sshd[21096]: Connection closed by 107.189.30.59 port 46984 [preauth]
Jan  2 14:11:09 host sshd[23664]: Invalid user admin from 106.10.122.53 port 43004
Jan  2 14:11:09 host sshd[23664]: input_userauth_request: invalid user admin [preauth]
Jan  2 14:11:10 host sshd[23664]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 14:11:10 host sshd[23664]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53
Jan  2 14:11:12 host sshd[23664]: Failed password for invalid user admin from 106.10.122.53 port 43004 ssh2
Jan  2 14:11:12 host sshd[23664]: Connection closed by 106.10.122.53 port 43004 [preauth]
Jan  2 14:12:31 host sshd[23919]: Invalid user altibase from 131.0.0.11 port 36236
Jan  2 14:12:31 host sshd[23919]: input_userauth_request: invalid user altibase [preauth]
Jan  2 14:12:32 host sshd[23919]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 14:12:32 host sshd[23919]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=131.0.0.11
Jan  2 14:12:34 host sshd[23919]: Failed password for invalid user altibase from 131.0.0.11 port 36236 ssh2
Jan  2 14:12:35 host sshd[23919]: Connection closed by 131.0.0.11 port 36236 [preauth]
Jan  2 14:13:20 host sshd[24022]: Invalid user test from 193.169.255.30 port 40400
Jan  2 14:13:20 host sshd[24022]: input_userauth_request: invalid user test [preauth]
Jan  2 14:13:20 host sshd[24022]: Failed none for invalid user test from 193.169.255.30 port 40400 ssh2
Jan  2 14:13:23 host sshd[24022]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 14:13:23 host sshd[24022]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.169.255.30
Jan  2 14:13:26 host sshd[24022]: Failed password for invalid user test from 193.169.255.30 port 40400 ssh2
Jan  2 14:13:29 host sshd[24022]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 14:13:31 host sshd[24022]: Failed password for invalid user test from 193.169.255.30 port 40400 ssh2
Jan  2 14:13:34 host sshd[24022]: Connection closed by 193.169.255.30 port 40400 [preauth]
Jan  2 14:13:34 host sshd[24022]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.169.255.30
Jan  2 14:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  2 14:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 14:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 14:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  2 14:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 14:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 14:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  2 14:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 14:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 14:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  2 14:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 14:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 14:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  2 14:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 14:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 14:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  2 14:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 14:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 14:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  2 14:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 14:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 14:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  2 14:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 14:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 14:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  2 14:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 14:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 14:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  2 14:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 14:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 14:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  2 14:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 14:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 14:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  2 14:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 14:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 14:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  2 14:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 14:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 14:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=shalinijames user-2=wwwtestugo user-3=vfmassets user-4=pmcresources user-5=disposeat user-6=wwwkmaorg user-7=remysagr user-8=woodpeck user-9=wwwkapin user-10=phmetals user-11=kottayamcalldriv user-12=palco123 user-13=gifterman user-14=wwwnexidigital user-15=mrsclean user-16=wwwevmhonda user-17=bonifacegroup user-18=straightcurve user-19=wwwletsstalkfood user-20=a2zgroup user-21=dartsimp user-22=laundryboniface user-23=cochintaxi user-24=wwwkaretakers user-25=travelboniface user-26=ugotscom user-27=keralaholi user-28=wwwresourcehunte user-29=wwwrmswll user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  2 14:21:52 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  2 14:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 14:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 14:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  2 14:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 14:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 14:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-u2wfjPjRb2LGTtgQ.~
Jan  2 14:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 14:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 14:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-u2wfjPjRb2LGTtgQ.~'
Jan  2 14:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 14:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 14:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-u2wfjPjRb2LGTtgQ.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  2 14:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 14:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 14:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  2 14:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 14:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 14:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  2 14:21:53 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 14:21:53 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 14:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  2 14:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 14:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 14:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  2 14:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 14:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 14:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  2 14:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 14:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 14:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  2 14:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 14:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 14:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  2 14:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 14:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 14:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  2 14:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  2 14:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  2 14:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  2 14:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  2 14:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  2 14:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  2 14:22:03 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  2 14:22:05 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  2 14:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  2 14:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 14:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 14:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  2 14:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 14:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 14:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  2 14:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 14:22:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 14:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  2 14:22:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 14:22:10 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 14:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  2 14:22:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 14:22:17 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 14:22:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  2 14:22:18 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  2 14:22:22 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  2 14:32:58 host sshd[26942]: User root from 103.13.40.2 not allowed because not listed in AllowUsers
Jan  2 14:32:58 host sshd[26942]: input_userauth_request: invalid user root [preauth]
Jan  2 14:32:58 host unix_chkpwd[26944]: password check failed for user (root)
Jan  2 14:32:58 host sshd[26942]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2  user=root
Jan  2 14:32:58 host sshd[26942]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 14:32:59 host sshd[26942]: Failed password for invalid user root from 103.13.40.2 port 53982 ssh2
Jan  2 14:32:59 host sshd[26942]: Connection closed by 103.13.40.2 port 53982 [preauth]
Jan  2 14:40:05 host sshd[28039]: Invalid user hyh from 162.218.126.136 port 37676
Jan  2 14:40:05 host sshd[28039]: input_userauth_request: invalid user hyh [preauth]
Jan  2 14:40:05 host sshd[28039]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 14:40:05 host sshd[28039]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136
Jan  2 14:40:07 host sshd[28039]: Failed password for invalid user hyh from 162.218.126.136 port 37676 ssh2
Jan  2 14:40:08 host sshd[28039]: Connection closed by 162.218.126.136 port 37676 [preauth]
Jan  2 14:46:36 host sshd[28952]: Invalid user user from 92.46.108.20 port 60206
Jan  2 14:46:36 host sshd[28952]: input_userauth_request: invalid user user [preauth]
Jan  2 14:46:37 host sshd[28952]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 14:46:37 host sshd[28952]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20
Jan  2 14:46:38 host sshd[28952]: Failed password for invalid user user from 92.46.108.20 port 60206 ssh2
Jan  2 14:46:39 host sshd[28952]: Connection closed by 92.46.108.20 port 60206 [preauth]
Jan  2 14:49:37 host sshd[29346]: Did not receive identification string from 46.101.97.107 port 61000
Jan  2 14:53:45 host sshd[29959]: Did not receive identification string from 150.158.80.80 port 56658
Jan  2 14:53:47 host sshd[29965]: Invalid user linux from 150.158.80.80 port 60088
Jan  2 14:53:47 host sshd[29964]: Invalid user devops from 150.158.80.80 port 60082
Jan  2 14:53:47 host sshd[29964]: input_userauth_request: invalid user devops [preauth]
Jan  2 14:53:47 host sshd[29965]: input_userauth_request: invalid user linux [preauth]
Jan  2 14:53:47 host sshd[29963]: User centos from 150.158.80.80 not allowed because not listed in AllowUsers
Jan  2 14:53:47 host sshd[29963]: input_userauth_request: invalid user centos [preauth]
Jan  2 14:53:47 host sshd[29968]: Invalid user dockeradmin from 150.158.80.80 port 60076
Jan  2 14:53:47 host sshd[29968]: input_userauth_request: invalid user dockeradmin [preauth]
Jan  2 14:53:47 host sshd[29984]: Invalid user user from 150.158.80.80 port 60074
Jan  2 14:53:47 host sshd[29984]: input_userauth_request: invalid user user [preauth]
Jan  2 14:53:47 host sshd[29988]: Invalid user casadiagnosis from 150.158.80.80 port 60042
Jan  2 14:53:47 host sshd[29988]: input_userauth_request: invalid user casadiagnosis [preauth]
Jan  2 14:53:47 host sshd[29983]: User centos from 150.158.80.80 not allowed because not listed in AllowUsers
Jan  2 14:53:47 host sshd[29976]: Invalid user elastic from 150.158.80.80 port 60038
Jan  2 14:53:47 host sshd[29983]: input_userauth_request: invalid user centos [preauth]
Jan  2 14:53:47 host sshd[29976]: input_userauth_request: invalid user elastic [preauth]
Jan  2 14:53:47 host sshd[29987]: Invalid user user from 150.158.80.80 port 60054
Jan  2 14:53:47 host sshd[29987]: input_userauth_request: invalid user user [preauth]
Jan  2 14:53:47 host sshd[29980]: Invalid user oracle from 150.158.80.80 port 60084
Jan  2 14:53:47 host sshd[29980]: input_userauth_request: invalid user oracle [preauth]
Jan  2 14:53:47 host sshd[29990]: Invalid user tester from 150.158.80.80 port 60070
Jan  2 14:53:47 host sshd[29990]: input_userauth_request: invalid user tester [preauth]
Jan  2 14:53:47 host sshd[29991]: Invalid user ftpuser from 150.158.80.80 port 60020
Jan  2 14:53:47 host sshd[29991]: input_userauth_request: invalid user ftpuser [preauth]
Jan  2 14:53:48 host sshd[29960]: Invalid user mcserver from 150.158.80.80 port 60026
Jan  2 14:53:48 host sshd[29960]: input_userauth_request: invalid user mcserver [preauth]
Jan  2 14:53:48 host sshd[29964]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 14:53:48 host sshd[29964]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.158.80.80
Jan  2 14:53:48 host sshd[29965]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 14:53:48 host sshd[29965]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.158.80.80
Jan  2 14:53:48 host unix_chkpwd[30017]: password check failed for user (centos)
Jan  2 14:53:48 host sshd[29963]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.158.80.80  user=centos
Jan  2 14:53:48 host sshd[29968]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 14:53:48 host sshd[29968]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.158.80.80
Jan  2 14:53:48 host sshd[29977]: User ftp from 150.158.80.80 not allowed because not listed in AllowUsers
Jan  2 14:53:48 host sshd[29977]: input_userauth_request: invalid user ftp [preauth]
Jan  2 14:53:48 host sshd[29984]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 14:53:48 host sshd[29984]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.158.80.80
Jan  2 14:53:48 host sshd[29988]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 14:53:48 host sshd[29988]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.158.80.80
Jan  2 14:53:48 host unix_chkpwd[30018]: password check failed for user (centos)
Jan  2 14:53:48 host sshd[29983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.158.80.80  user=centos
Jan  2 14:53:48 host sshd[29980]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 14:53:48 host sshd[29980]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.158.80.80
Jan  2 14:53:48 host sshd[29989]: Invalid user oracle from 150.158.80.80 port 60066
Jan  2 14:53:48 host sshd[29989]: input_userauth_request: invalid user oracle [preauth]
Jan  2 14:53:48 host sshd[29991]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 14:53:48 host sshd[29991]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.158.80.80
Jan  2 14:53:48 host sshd[29995]: Invalid user guest from 150.158.80.80 port 60032
Jan  2 14:53:48 host sshd[29995]: input_userauth_request: invalid user guest [preauth]
Jan  2 14:53:48 host sshd[29960]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 14:53:48 host sshd[29960]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.158.80.80
Jan  2 14:53:48 host sshd[29989]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 14:53:48 host sshd[29989]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.158.80.80
Jan  2 14:53:48 host sshd[29969]: Invalid user hadoop from 150.158.80.80 port 60072
Jan  2 14:53:48 host sshd[29969]: input_userauth_request: invalid user hadoop [preauth]
Jan  2 14:53:48 host sshd[29967]: Invalid user user from 150.158.80.80 port 60014
Jan  2 14:53:48 host sshd[29967]: input_userauth_request: invalid user user [preauth]
Jan  2 14:53:48 host sshd[29985]: Invalid user oracle from 150.158.80.80 port 60048
Jan  2 14:53:48 host sshd[29985]: input_userauth_request: invalid user oracle [preauth]
Jan  2 14:53:48 host sshd[29979]: User centos from 150.158.80.80 not allowed because not listed in AllowUsers
Jan  2 14:53:48 host sshd[29979]: input_userauth_request: invalid user centos [preauth]
Jan  2 14:53:48 host sshd[29995]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 14:53:48 host sshd[29995]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.158.80.80
Jan  2 14:53:48 host sshd[29966]: Invalid user ansadmin from 150.158.80.80 port 60056
Jan  2 14:53:48 host sshd[29966]: input_userauth_request: invalid user ansadmin [preauth]
Jan  2 14:53:48 host sshd[29961]: Invalid user www from 150.158.80.80 port 60034
Jan  2 14:53:48 host sshd[29961]: input_userauth_request: invalid user www [preauth]
Jan  2 14:53:48 host sshd[29967]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 14:53:48 host sshd[29967]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.158.80.80
Jan  2 14:53:48 host sshd[29987]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 14:53:48 host sshd[29987]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.158.80.80
Jan  2 14:53:48 host sshd[29985]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 14:53:48 host sshd[29985]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.158.80.80
Jan  2 14:53:48 host sshd[29969]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 14:53:48 host sshd[29969]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.158.80.80
Jan  2 14:53:50 host sshd[29964]: Failed password for invalid user devops from 150.158.80.80 port 60082 ssh2
Jan  2 14:53:50 host sshd[29965]: Failed password for invalid user linux from 150.158.80.80 port 60088 ssh2
Jan  2 14:53:50 host sshd[29963]: Failed password for invalid user centos from 150.158.80.80 port 60012 ssh2
Jan  2 14:53:50 host sshd[29968]: Failed password for invalid user dockeradmin from 150.158.80.80 port 60076 ssh2
Jan  2 14:53:50 host sshd[29984]: Failed password for invalid user user from 150.158.80.80 port 60074 ssh2
Jan  2 14:53:50 host sshd[29988]: Failed password for invalid user casadiagnosis from 150.158.80.80 port 60042 ssh2
Jan  2 14:53:50 host sshd[29983]: Failed password for invalid user centos from 150.158.80.80 port 60046 ssh2
Jan  2 14:53:50 host sshd[29980]: Failed password for invalid user oracle from 150.158.80.80 port 60084 ssh2
Jan  2 14:53:50 host sshd[29991]: Failed password for invalid user ftpuser from 150.158.80.80 port 60020 ssh2
Jan  2 14:53:50 host sshd[29960]: Failed password for invalid user mcserver from 150.158.80.80 port 60026 ssh2
Jan  2 14:53:50 host sshd[29989]: Failed password for invalid user oracle from 150.158.80.80 port 60066 ssh2
Jan  2 14:53:50 host sshd[29995]: Failed password for invalid user guest from 150.158.80.80 port 60032 ssh2
Jan  2 14:53:50 host sshd[29967]: Failed password for invalid user user from 150.158.80.80 port 60014 ssh2
Jan  2 14:53:50 host sshd[29987]: Failed password for invalid user user from 150.158.80.80 port 60054 ssh2
Jan  2 14:53:50 host sshd[29985]: Failed password for invalid user oracle from 150.158.80.80 port 60048 ssh2
Jan  2 14:53:50 host sshd[29969]: Failed password for invalid user hadoop from 150.158.80.80 port 60072 ssh2
Jan  2 14:56:54 host sshd[30652]: User root from 193.42.33.5 not allowed because not listed in AllowUsers
Jan  2 14:56:54 host sshd[30652]: input_userauth_request: invalid user root [preauth]
Jan  2 14:56:54 host unix_chkpwd[30657]: password check failed for user (root)
Jan  2 14:56:54 host sshd[30652]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.42.33.5  user=root
Jan  2 14:56:54 host sshd[30652]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 14:56:57 host sshd[30652]: Failed password for invalid user root from 193.42.33.5 port 41710 ssh2
Jan  2 14:56:57 host sshd[30652]: Received disconnect from 193.42.33.5 port 41710:11: Bye Bye [preauth]
Jan  2 14:56:57 host sshd[30652]: Disconnected from 193.42.33.5 port 41710 [preauth]
Jan  2 14:57:04 host sshd[30661]: Invalid user admin from 193.42.33.5 port 48302
Jan  2 14:57:04 host sshd[30661]: input_userauth_request: invalid user admin [preauth]
Jan  2 14:57:04 host sshd[30661]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 14:57:04 host sshd[30661]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.42.33.5
Jan  2 14:57:06 host sshd[30661]: Failed password for invalid user admin from 193.42.33.5 port 48302 ssh2
Jan  2 14:57:06 host sshd[30661]: Received disconnect from 193.42.33.5 port 48302:11: Bye Bye [preauth]
Jan  2 14:57:06 host sshd[30661]: Disconnected from 193.42.33.5 port 48302 [preauth]
Jan  2 15:05:25 host sshd[31831]: Did not receive identification string from 125.212.235.215 port 43170
Jan  2 15:05:26 host sshd[31838]: Invalid user test from 125.212.235.215 port 44058
Jan  2 15:05:26 host sshd[31835]: User centos from 125.212.235.215 not allowed because not listed in AllowUsers
Jan  2 15:05:26 host sshd[31838]: input_userauth_request: invalid user test [preauth]
Jan  2 15:05:26 host sshd[31835]: input_userauth_request: invalid user centos [preauth]
Jan  2 15:05:26 host sshd[31833]: Invalid user guest from 125.212.235.215 port 44062
Jan  2 15:05:26 host sshd[31833]: input_userauth_request: invalid user guest [preauth]
Jan  2 15:05:26 host sshd[31842]: Invalid user hello from 125.212.235.215 port 44606
Jan  2 15:05:26 host sshd[31842]: input_userauth_request: invalid user hello [preauth]
Jan  2 15:05:26 host sshd[31840]: Invalid user esuser from 125.212.235.215 port 44092
Jan  2 15:05:26 host sshd[31843]: Invalid user ts3 from 125.212.235.215 port 44620
Jan  2 15:05:26 host sshd[31840]: input_userauth_request: invalid user esuser [preauth]
Jan  2 15:05:26 host sshd[31843]: input_userauth_request: invalid user ts3 [preauth]
Jan  2 15:05:26 host sshd[31836]: User centos from 125.212.235.215 not allowed because not listed in AllowUsers
Jan  2 15:05:26 host sshd[31836]: input_userauth_request: invalid user centos [preauth]
Jan  2 15:05:26 host sshd[31834]: User centos from 125.212.235.215 not allowed because not listed in AllowUsers
Jan  2 15:05:26 host sshd[31837]: Invalid user guest from 125.212.235.215 port 44056
Jan  2 15:05:26 host sshd[31834]: input_userauth_request: invalid user centos [preauth]
Jan  2 15:05:26 host sshd[31837]: input_userauth_request: invalid user guest [preauth]
Jan  2 15:05:26 host sshd[31839]: Invalid user casadiagnosis from 125.212.235.215 port 44080
Jan  2 15:05:26 host sshd[31841]: Invalid user ftpuser from 125.212.235.215 port 44612
Jan  2 15:05:26 host sshd[31839]: input_userauth_request: invalid user casadiagnosis [preauth]
Jan  2 15:05:26 host sshd[31841]: input_userauth_request: invalid user ftpuser [preauth]
Jan  2 15:05:26 host sshd[31838]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 15:05:26 host sshd[31838]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.212.235.215
Jan  2 15:05:26 host sshd[31833]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 15:05:26 host sshd[31833]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.212.235.215
Jan  2 15:05:26 host sshd[31842]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 15:05:26 host sshd[31842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.212.235.215
Jan  2 15:05:26 host unix_chkpwd[31876]: password check failed for user (centos)
Jan  2 15:05:26 host sshd[31835]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.212.235.215  user=centos
Jan  2 15:05:26 host sshd[31843]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 15:05:26 host sshd[31840]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 15:05:26 host sshd[31843]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.212.235.215
Jan  2 15:05:26 host sshd[31840]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.212.235.215
Jan  2 15:05:26 host sshd[31841]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 15:05:26 host sshd[31841]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.212.235.215
Jan  2 15:05:26 host sshd[31839]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 15:05:26 host sshd[31839]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.212.235.215
Jan  2 15:05:26 host unix_chkpwd[31878]: password check failed for user (centos)
Jan  2 15:05:26 host sshd[31836]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.212.235.215  user=centos
Jan  2 15:05:26 host unix_chkpwd[31877]: password check failed for user (centos)
Jan  2 15:05:26 host sshd[31834]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.212.235.215  user=centos
Jan  2 15:05:26 host sshd[31837]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 15:05:26 host sshd[31837]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.212.235.215
Jan  2 15:05:27 host sshd[31879]: Invalid user posiflex from 125.212.235.215 port 43910
Jan  2 15:05:27 host sshd[31881]: Invalid user admin from 125.212.235.215 port 44084
Jan  2 15:05:27 host sshd[31881]: input_userauth_request: invalid user admin [preauth]
Jan  2 15:05:27 host sshd[31879]: input_userauth_request: invalid user posiflex [preauth]
Jan  2 15:05:27 host sshd[31882]: Invalid user dockeradmin from 125.212.235.215 port 44060
Jan  2 15:05:27 host sshd[31882]: input_userauth_request: invalid user dockeradmin [preauth]
Jan  2 15:05:27 host sshd[31880]: Invalid user ansadmin from 125.212.235.215 port 44054
Jan  2 15:05:27 host sshd[31886]: Invalid user ubuntu from 125.212.235.215 port 44082
Jan  2 15:05:27 host sshd[31880]: input_userauth_request: invalid user ansadmin [preauth]
Jan  2 15:05:27 host sshd[31886]: input_userauth_request: invalid user ubuntu [preauth]
Jan  2 15:05:27 host sshd[31879]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 15:05:27 host sshd[31879]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.212.235.215
Jan  2 15:05:27 host sshd[31881]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 15:05:27 host sshd[31881]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.212.235.215
Jan  2 15:05:27 host sshd[31882]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 15:05:27 host sshd[31882]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.212.235.215
Jan  2 15:05:27 host sshd[31880]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 15:05:27 host sshd[31880]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.212.235.215
Jan  2 15:05:27 host sshd[31883]: Invalid user casadiagnosis from 125.212.235.215 port 44074
Jan  2 15:05:27 host sshd[31883]: input_userauth_request: invalid user casadiagnosis [preauth]
Jan  2 15:05:27 host sshd[31884]: Invalid user test from 125.212.235.215 port 44052
Jan  2 15:05:27 host sshd[31886]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 15:05:27 host sshd[31886]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.212.235.215
Jan  2 15:05:27 host sshd[31884]: input_userauth_request: invalid user test [preauth]
Jan  2 15:05:27 host sshd[31883]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 15:05:27 host sshd[31883]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.212.235.215
Jan  2 15:05:27 host sshd[31884]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 15:05:27 host sshd[31884]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.212.235.215
Jan  2 15:05:27 host sshd[31885]: Invalid user web from 125.212.235.215 port 44086
Jan  2 15:05:27 host sshd[31885]: input_userauth_request: invalid user web [preauth]
Jan  2 15:05:28 host sshd[31885]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 15:05:28 host sshd[31885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.212.235.215
Jan  2 15:05:28 host sshd[31838]: Failed password for invalid user test from 125.212.235.215 port 44058 ssh2
Jan  2 15:05:28 host sshd[31833]: Failed password for invalid user guest from 125.212.235.215 port 44062 ssh2
Jan  2 15:05:28 host sshd[31842]: Failed password for invalid user hello from 125.212.235.215 port 44606 ssh2
Jan  2 15:05:28 host sshd[31835]: Failed password for invalid user centos from 125.212.235.215 port 44068 ssh2
Jan  2 15:05:28 host sshd[31840]: Failed password for invalid user esuser from 125.212.235.215 port 44092 ssh2
Jan  2 15:05:28 host sshd[31841]: Failed password for invalid user ftpuser from 125.212.235.215 port 44612 ssh2
Jan  2 15:05:28 host sshd[31843]: Failed password for invalid user ts3 from 125.212.235.215 port 44620 ssh2
Jan  2 15:05:28 host sshd[31839]: Failed password for invalid user casadiagnosis from 125.212.235.215 port 44080 ssh2
Jan  2 15:05:28 host sshd[31836]: Failed password for invalid user centos from 125.212.235.215 port 44064 ssh2
Jan  2 15:05:28 host sshd[31834]: Failed password for invalid user centos from 125.212.235.215 port 44048 ssh2
Jan  2 15:05:28 host sshd[31833]: Connection closed by 125.212.235.215 port 44062 [preauth]
Jan  2 15:05:28 host sshd[31838]: Connection closed by 125.212.235.215 port 44058 [preauth]
Jan  2 15:05:28 host sshd[31842]: Connection closed by 125.212.235.215 port 44606 [preauth]
Jan  2 15:05:28 host sshd[31835]: Connection closed by 125.212.235.215 port 44068 [preauth]
Jan  2 15:05:28 host sshd[31841]: Connection closed by 125.212.235.215 port 44612 [preauth]
Jan  2 15:05:28 host sshd[31843]: Connection closed by 125.212.235.215 port 44620 [preauth]
Jan  2 15:05:28 host sshd[31839]: Connection closed by 125.212.235.215 port 44080 [preauth]
Jan  2 15:05:28 host sshd[31840]: Connection closed by 125.212.235.215 port 44092 [preauth]
Jan  2 15:05:28 host sshd[31836]: Connection closed by 125.212.235.215 port 44064 [preauth]
Jan  2 15:05:28 host sshd[31834]: Connection closed by 125.212.235.215 port 44048 [preauth]
Jan  2 15:05:28 host sshd[31837]: Failed password for invalid user guest from 125.212.235.215 port 44056 ssh2
Jan  2 15:05:28 host sshd[31837]: Connection closed by 125.212.235.215 port 44056 [preauth]
Jan  2 15:05:29 host sshd[31879]: Failed password for invalid user posiflex from 125.212.235.215 port 43910 ssh2
Jan  2 15:05:29 host sshd[31881]: Failed password for invalid user admin from 125.212.235.215 port 44084 ssh2
Jan  2 15:05:29 host sshd[31882]: Failed password for invalid user dockeradmin from 125.212.235.215 port 44060 ssh2
Jan  2 15:05:29 host sshd[31880]: Failed password for invalid user ansadmin from 125.212.235.215 port 44054 ssh2
Jan  2 15:05:29 host sshd[31886]: Failed password for invalid user ubuntu from 125.212.235.215 port 44082 ssh2
Jan  2 15:05:29 host sshd[31881]: Connection closed by 125.212.235.215 port 44084 [preauth]
Jan  2 15:05:29 host sshd[31879]: Connection closed by 125.212.235.215 port 43910 [preauth]
Jan  2 15:05:29 host sshd[31882]: Connection closed by 125.212.235.215 port 44060 [preauth]
Jan  2 15:05:29 host sshd[31880]: Connection closed by 125.212.235.215 port 44054 [preauth]
Jan  2 15:05:29 host sshd[31886]: Connection closed by 125.212.235.215 port 44082 [preauth]
Jan  2 15:05:29 host sshd[31883]: Failed password for invalid user casadiagnosis from 125.212.235.215 port 44074 ssh2
Jan  2 15:05:29 host sshd[31883]: Connection closed by 125.212.235.215 port 44074 [preauth]
Jan  2 15:05:29 host sshd[31884]: Failed password for invalid user test from 125.212.235.215 port 44052 ssh2
Jan  2 15:05:29 host sshd[31884]: Connection closed by 125.212.235.215 port 44052 [preauth]
Jan  2 15:05:29 host sshd[31885]: Failed password for invalid user web from 125.212.235.215 port 44086 ssh2
Jan  2 15:05:29 host sshd[31885]: Connection closed by 125.212.235.215 port 44086 [preauth]
Jan  2 15:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  2 15:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 15:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 15:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  2 15:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 15:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 15:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  2 15:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 15:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 15:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  2 15:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 15:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 15:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  2 15:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 15:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 15:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  2 15:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 15:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 15:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  2 15:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 15:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 15:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  2 15:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 15:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 15:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  2 15:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 15:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 15:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  2 15:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 15:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 15:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  2 15:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 15:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 15:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  2 15:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 15:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 15:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  2 15:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 15:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 15:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=travelboniface user-3=ugotscom user-4=keralaholi user-5=wwwresourcehunte user-6=wwwrmswll user-7=cochintaxi user-8=wwwkaretakers user-9=a2zgroup user-10=dartsimp user-11=laundryboniface user-12=wwwevmhonda user-13=bonifacegroup user-14=straightcurve user-15=wwwletsstalkfood user-16=kottayamcalldriv user-17=phmetals user-18=palco123 user-19=gifterman user-20=mrsclean user-21=wwwnexidigital user-22=disposeat user-23=wwwkmaorg user-24=remysagr user-25=woodpeck user-26=wwwkapin user-27=shalinijames user-28=wwwtestugo user-29=vfmassets user-30=pmcresources feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  2 15:21:51 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  2 15:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 15:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 15:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  2 15:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 15:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 15:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-GUsAPmv23bFWn4e4.~
Jan  2 15:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 15:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 15:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-GUsAPmv23bFWn4e4.~'
Jan  2 15:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 15:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 15:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-GUsAPmv23bFWn4e4.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  2 15:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 15:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 15:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  2 15:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 15:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 15:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  2 15:21:52 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 15:21:52 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 15:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  2 15:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 15:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 15:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  2 15:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 15:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 15:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  2 15:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 15:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 15:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  2 15:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 15:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 15:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  2 15:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 15:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 15:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  2 15:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  2 15:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  2 15:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  2 15:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  2 15:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  2 15:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  2 15:22:02 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  2 15:22:09 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  2 15:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  2 15:22:09 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 15:22:10 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 15:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  2 15:22:10 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 15:22:11 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 15:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  2 15:22:11 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 15:22:16 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 15:22:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  2 15:22:16 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 15:22:22 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 15:22:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  2 15:22:22 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 15:22:23 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 15:22:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  2 15:22:24 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  2 15:22:26 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  2 15:23:04 host sshd[2334]: Invalid user user1 from 41.197.31.178 port 39820
Jan  2 15:23:04 host sshd[2334]: input_userauth_request: invalid user user1 [preauth]
Jan  2 15:23:04 host sshd[2334]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 15:23:04 host sshd[2334]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178
Jan  2 15:23:06 host sshd[2334]: Failed password for invalid user user1 from 41.197.31.178 port 39820 ssh2
Jan  2 15:23:07 host sshd[2334]: Connection closed by 41.197.31.178 port 39820 [preauth]
Jan  2 15:33:22 host sshd[3617]: Invalid user ntpo from 106.10.122.53 port 52542
Jan  2 15:33:22 host sshd[3617]: input_userauth_request: invalid user ntpo [preauth]
Jan  2 15:33:22 host sshd[3617]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 15:33:22 host sshd[3617]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53
Jan  2 15:33:23 host sshd[3617]: Failed password for invalid user ntpo from 106.10.122.53 port 52542 ssh2
Jan  2 15:33:23 host sshd[3617]: Connection closed by 106.10.122.53 port 52542 [preauth]
Jan  2 15:44:58 host sshd[5304]: Invalid user test from 165.227.173.102 port 57286
Jan  2 15:44:58 host sshd[5304]: input_userauth_request: invalid user test [preauth]
Jan  2 15:45:00 host sshd[5304]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 15:45:00 host sshd[5304]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.173.102
Jan  2 15:45:02 host sshd[5304]: Failed password for invalid user test from 165.227.173.102 port 57286 ssh2
Jan  2 15:45:05 host sshd[5304]: Connection closed by 165.227.173.102 port 57286 [preauth]
Jan  2 15:45:09 host sshd[5342]: Invalid user www from 162.218.126.136 port 43478
Jan  2 15:45:09 host sshd[5342]: input_userauth_request: invalid user www [preauth]
Jan  2 15:45:09 host sshd[5342]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 15:45:09 host sshd[5342]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136
Jan  2 15:45:11 host sshd[5342]: Failed password for invalid user www from 162.218.126.136 port 43478 ssh2
Jan  2 15:45:11 host sshd[5342]: Connection closed by 162.218.126.136 port 43478 [preauth]
Jan  2 15:49:02 host sshd[5763]: Invalid user service from 194.169.175.102 port 57792
Jan  2 15:49:02 host sshd[5763]: input_userauth_request: invalid user service [preauth]
Jan  2 15:49:02 host sshd[5763]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 15:49:02 host sshd[5763]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.169.175.102
Jan  2 15:49:03 host sshd[5763]: Failed password for invalid user service from 194.169.175.102 port 57792 ssh2
Jan  2 15:49:03 host sshd[5763]: Received disconnect from 194.169.175.102 port 57792:11: Client disconnecting normally [preauth]
Jan  2 15:49:03 host sshd[5763]: Disconnected from 194.169.175.102 port 57792 [preauth]
Jan  2 16:00:20 host sshd[7526]: User root from 103.13.40.2 not allowed because not listed in AllowUsers
Jan  2 16:00:20 host sshd[7526]: input_userauth_request: invalid user root [preauth]
Jan  2 16:00:20 host unix_chkpwd[7528]: password check failed for user (root)
Jan  2 16:00:20 host sshd[7526]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2  user=root
Jan  2 16:00:20 host sshd[7526]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 16:00:22 host sshd[7526]: Failed password for invalid user root from 103.13.40.2 port 52526 ssh2
Jan  2 16:00:22 host sshd[7526]: Connection closed by 103.13.40.2 port 52526 [preauth]
Jan  2 16:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  2 16:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 16:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 16:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  2 16:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 16:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 16:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  2 16:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 16:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 16:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  2 16:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 16:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 16:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  2 16:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 16:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 16:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  2 16:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 16:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 16:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  2 16:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 16:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 16:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  2 16:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 16:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 16:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  2 16:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 16:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 16:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  2 16:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 16:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 16:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  2 16:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 16:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 16:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  2 16:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 16:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 16:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  2 16:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 16:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 16:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=cochintaxi user-2=wwwkaretakers user-3=laundryboniface user-4=dartsimp user-5=a2zgroup user-6=wwwpmcresource user-7=ugotscom user-8=wwwrmswll user-9=wwwresourcehunte user-10=keralaholi user-11=travelboniface user-12=woodpeck user-13=wwwkapin user-14=wwwkmaorg user-15=disposeat user-16=remysagr user-17=pmcresources user-18=wwwtestugo user-19=shalinijames user-20=vfmassets user-21=wwwletsstalkfood user-22=straightcurve user-23=wwwevmhonda user-24=bonifacegroup user-25=mrsclean user-26=wwwnexidigital user-27=phmetals user-28=kottayamcalldriv user-29=gifterman user-30=palco123 feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  2 16:21:51 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  2 16:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 16:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 16:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  2 16:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 16:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 16:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-NpOTVpUjH8eiyzbE.~
Jan  2 16:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 16:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 16:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-NpOTVpUjH8eiyzbE.~'
Jan  2 16:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 16:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 16:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-NpOTVpUjH8eiyzbE.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  2 16:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 16:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 16:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  2 16:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 16:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 16:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  2 16:21:52 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 16:21:52 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 16:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  2 16:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 16:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 16:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  2 16:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 16:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 16:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  2 16:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 16:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 16:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  2 16:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 16:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 16:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  2 16:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 16:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 16:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  2 16:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  2 16:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  2 16:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  2 16:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  2 16:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  2 16:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  2 16:21:56 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  2 16:21:58 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  2 16:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  2 16:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 16:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 16:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  2 16:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 16:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 16:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  2 16:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 16:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 16:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  2 16:22:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 16:22:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 16:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  2 16:22:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 16:22:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 16:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  2 16:22:09 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  2 16:22:15 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  2 16:39:53 host sshd[13254]: Invalid user user from 171.225.184.189 port 4878
Jan  2 16:39:53 host sshd[13254]: input_userauth_request: invalid user user [preauth]
Jan  2 16:39:53 host sshd[13254]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 16:39:53 host sshd[13254]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.225.184.189
Jan  2 16:39:55 host sshd[13254]: Failed password for invalid user user from 171.225.184.189 port 4878 ssh2
Jan  2 16:39:55 host sshd[13254]: Connection closed by 171.225.184.189 port 4878 [preauth]
Jan  2 16:40:11 host sshd[13298]: Invalid user installer from 171.225.184.189 port 44768
Jan  2 16:40:11 host sshd[13298]: input_userauth_request: invalid user installer [preauth]
Jan  2 16:40:11 host sshd[13298]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 16:40:11 host sshd[13298]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.225.184.189
Jan  2 16:40:13 host sshd[13298]: Failed password for invalid user installer from 171.225.184.189 port 44768 ssh2
Jan  2 16:40:13 host sshd[13298]: Connection closed by 171.225.184.189 port 44768 [preauth]
Jan  2 16:40:37 host sshd[13363]: Invalid user admin from 171.225.184.189 port 21558
Jan  2 16:40:37 host sshd[13363]: input_userauth_request: invalid user admin [preauth]
Jan  2 16:40:37 host sshd[13363]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 16:40:37 host sshd[13363]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.225.184.189
Jan  2 16:40:40 host sshd[13363]: Failed password for invalid user admin from 171.225.184.189 port 21558 ssh2
Jan  2 16:42:55 host sshd[13610]: Did not receive identification string from 119.91.144.33 port 54212
Jan  2 16:42:58 host sshd[13622]: User centos from 119.91.144.33 not allowed because not listed in AllowUsers
Jan  2 16:42:58 host sshd[13622]: input_userauth_request: invalid user centos [preauth]
Jan  2 16:42:58 host sshd[13620]: Invalid user teamspeak3 from 119.91.144.33 port 35236
Jan  2 16:42:58 host sshd[13620]: input_userauth_request: invalid user teamspeak3 [preauth]
Jan  2 16:42:58 host sshd[13623]: Invalid user ec2-user from 119.91.144.33 port 35186
Jan  2 16:42:58 host sshd[13623]: input_userauth_request: invalid user ec2-user [preauth]
Jan  2 16:42:58 host sshd[13626]: Invalid user ec2-user from 119.91.144.33 port 35240
Jan  2 16:42:58 host sshd[13626]: input_userauth_request: invalid user ec2-user [preauth]
Jan  2 16:42:58 host sshd[13630]: Invalid user test from 119.91.144.33 port 35184
Jan  2 16:42:58 host sshd[13630]: input_userauth_request: invalid user test [preauth]
Jan  2 16:42:59 host sshd[13620]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 16:42:59 host sshd[13620]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.91.144.33
Jan  2 16:42:59 host unix_chkpwd[13716]: password check failed for user (centos)
Jan  2 16:42:59 host sshd[13622]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.91.144.33  user=centos
Jan  2 16:42:59 host sshd[13623]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 16:42:59 host sshd[13623]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.91.144.33
Jan  2 16:42:59 host sshd[13626]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 16:42:59 host sshd[13626]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.91.144.33
Jan  2 16:42:59 host sshd[13625]: Invalid user systems from 119.91.144.33 port 35256
Jan  2 16:42:59 host sshd[13625]: input_userauth_request: invalid user systems [preauth]
Jan  2 16:42:59 host sshd[13625]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 16:42:59 host sshd[13625]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.91.144.33
Jan  2 16:43:00 host sshd[13630]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 16:43:00 host sshd[13630]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.91.144.33
Jan  2 16:43:01 host sshd[13620]: Failed password for invalid user teamspeak3 from 119.91.144.33 port 35236 ssh2
Jan  2 16:43:01 host sshd[13622]: Failed password for invalid user centos from 119.91.144.33 port 35224 ssh2
Jan  2 16:43:01 host sshd[13623]: Failed password for invalid user ec2-user from 119.91.144.33 port 35186 ssh2
Jan  2 16:43:01 host sshd[13620]: Connection closed by 119.91.144.33 port 35236 [preauth]
Jan  2 16:43:01 host sshd[13622]: Connection closed by 119.91.144.33 port 35224 [preauth]
Jan  2 16:43:01 host sshd[13623]: Connection closed by 119.91.144.33 port 35186 [preauth]
Jan  2 16:43:01 host sshd[13626]: Failed password for invalid user ec2-user from 119.91.144.33 port 35240 ssh2
Jan  2 16:43:01 host sshd[13626]: Connection closed by 119.91.144.33 port 35240 [preauth]
Jan  2 16:43:01 host sshd[13625]: Failed password for invalid user systems from 119.91.144.33 port 35256 ssh2
Jan  2 16:43:01 host sshd[13625]: Connection closed by 119.91.144.33 port 35256 [preauth]
Jan  2 16:43:02 host sshd[13630]: Failed password for invalid user test from 119.91.144.33 port 35184 ssh2
Jan  2 16:43:02 host sshd[13630]: Connection closed by 119.91.144.33 port 35184 [preauth]
Jan  2 16:50:06 host sshd[14770]: Invalid user admin from 162.218.126.136 port 56264
Jan  2 16:50:06 host sshd[14770]: input_userauth_request: invalid user admin [preauth]
Jan  2 16:50:06 host sshd[14770]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 16:50:06 host sshd[14770]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136
Jan  2 16:50:09 host sshd[14770]: Failed password for invalid user admin from 162.218.126.136 port 56264 ssh2
Jan  2 16:50:09 host sshd[14770]: Connection closed by 162.218.126.136 port 56264 [preauth]
Jan  2 16:54:56 host sshd[15464]: Invalid user gpadmin from 41.197.31.178 port 39020
Jan  2 16:54:56 host sshd[15464]: input_userauth_request: invalid user gpadmin [preauth]
Jan  2 16:54:56 host sshd[15464]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 16:54:56 host sshd[15464]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178
Jan  2 16:54:58 host sshd[15464]: Failed password for invalid user gpadmin from 41.197.31.178 port 39020 ssh2
Jan  2 16:54:59 host sshd[15464]: Connection closed by 41.197.31.178 port 39020 [preauth]
Jan  2 16:55:22 host sshd[15522]: Invalid user altibase from 106.10.122.53 port 45676
Jan  2 16:55:22 host sshd[15522]: input_userauth_request: invalid user altibase [preauth]
Jan  2 16:55:22 host sshd[15522]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 16:55:22 host sshd[15522]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53
Jan  2 16:55:24 host sshd[15522]: Failed password for invalid user altibase from 106.10.122.53 port 45676 ssh2
Jan  2 16:55:24 host sshd[15522]: Connection closed by 106.10.122.53 port 45676 [preauth]
Jan  2 17:12:18 host sshd[17851]: Invalid user !!! from 188.156.156.102 port 51580
Jan  2 17:12:18 host sshd[17851]: input_userauth_request: invalid user !!! [preauth]
Jan  2 17:12:18 host sshd[17851]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 17:12:18 host sshd[17851]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.156.156.102
Jan  2 17:12:20 host sshd[17851]: Failed password for invalid user !!! from 188.156.156.102 port 51580 ssh2
Jan  2 17:12:20 host sshd[17851]: Connection closed by 188.156.156.102 port 51580 [preauth]
Jan  2 17:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  2 17:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 17:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 17:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  2 17:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 17:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 17:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  2 17:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 17:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 17:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  2 17:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 17:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 17:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  2 17:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 17:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 17:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  2 17:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 17:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 17:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  2 17:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 17:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 17:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  2 17:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 17:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 17:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  2 17:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 17:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 17:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  2 17:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 17:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 17:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  2 17:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 17:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 17:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  2 17:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 17:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 17:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  2 17:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 17:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 17:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=straightcurve user-2=wwwletsstalkfood user-3=wwwevmhonda user-4=bonifacegroup user-5=mrsclean user-6=wwwnexidigital user-7=phmetals user-8=kottayamcalldriv user-9=gifterman user-10=palco123 user-11=woodpeck user-12=wwwkapin user-13=disposeat user-14=wwwkmaorg user-15=remysagr user-16=pmcresources user-17=wwwtestugo user-18=shalinijames user-19=vfmassets user-20=wwwpmcresource user-21=ugotscom user-22=wwwrmswll user-23=keralaholi user-24=wwwresourcehunte user-25=travelboniface user-26=wwwkaretakers user-27=cochintaxi user-28=laundryboniface user-29=dartsimp user-30=a2zgroup feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  2 17:21:52 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  2 17:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 17:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 17:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  2 17:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 17:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 17:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-1R3AVNxfpnOd1s83.~
Jan  2 17:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 17:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 17:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-1R3AVNxfpnOd1s83.~'
Jan  2 17:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 17:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 17:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-1R3AVNxfpnOd1s83.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  2 17:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 17:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 17:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  2 17:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 17:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 17:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  2 17:21:52 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 17:21:52 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 17:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  2 17:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 17:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 17:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  2 17:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 17:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 17:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  2 17:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 17:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 17:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  2 17:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 17:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 17:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  2 17:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 17:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 17:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  2 17:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  2 17:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  2 17:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  2 17:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  2 17:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  2 17:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  2 17:21:57 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  2 17:21:59 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  2 17:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  2 17:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 17:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 17:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  2 17:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 17:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 17:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  2 17:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 17:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 17:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  2 17:22:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 17:22:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 17:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  2 17:22:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 17:22:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 17:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  2 17:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  2 17:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  2 17:23:26 host sshd[19738]: Invalid user db2inst1 from 92.46.108.20 port 47546
Jan  2 17:23:26 host sshd[19738]: input_userauth_request: invalid user db2inst1 [preauth]
Jan  2 17:23:27 host sshd[19738]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 17:23:27 host sshd[19738]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20
Jan  2 17:23:28 host sshd[19738]: Failed password for invalid user db2inst1 from 92.46.108.20 port 47546 ssh2
Jan  2 17:23:29 host sshd[19738]: Connection closed by 92.46.108.20 port 47546 [preauth]
Jan  2 17:27:01 host sshd[20258]: Invalid user user1 from 103.13.40.2 port 44768
Jan  2 17:27:01 host sshd[20258]: input_userauth_request: invalid user user1 [preauth]
Jan  2 17:27:01 host sshd[20258]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 17:27:01 host sshd[20258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2
Jan  2 17:27:03 host sshd[20258]: Failed password for invalid user user1 from 103.13.40.2 port 44768 ssh2
Jan  2 17:27:03 host sshd[20258]: Connection closed by 103.13.40.2 port 44768 [preauth]
Jan  2 17:54:52 host sshd[24317]: User root from 162.218.126.136 not allowed because not listed in AllowUsers
Jan  2 17:54:52 host sshd[24317]: input_userauth_request: invalid user root [preauth]
Jan  2 17:54:52 host unix_chkpwd[24321]: password check failed for user (root)
Jan  2 17:54:52 host sshd[24317]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136  user=root
Jan  2 17:54:52 host sshd[24317]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 17:54:54 host sshd[24317]: Failed password for invalid user root from 162.218.126.136 port 51150 ssh2
Jan  2 17:54:54 host sshd[24317]: Connection closed by 162.218.126.136 port 51150 [preauth]
Jan  2 18:01:10 host sshd[25317]: Invalid user admin from 45.93.201.90 port 51904
Jan  2 18:01:10 host sshd[25317]: input_userauth_request: invalid user admin [preauth]
Jan  2 18:01:10 host sshd[25317]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 18:01:10 host sshd[25317]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90
Jan  2 18:01:12 host sshd[25317]: Failed password for invalid user admin from 45.93.201.90 port 51904 ssh2
Jan  2 18:01:15 host sshd[25317]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 18:01:17 host sshd[25317]: Failed password for invalid user admin from 45.93.201.90 port 51904 ssh2
Jan  2 18:01:20 host sshd[25317]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 18:01:22 host sshd[25317]: Failed password for invalid user admin from 45.93.201.90 port 51904 ssh2
Jan  2 18:01:25 host sshd[25317]: Connection closed by 45.93.201.90 port 51904 [preauth]
Jan  2 18:01:25 host sshd[25317]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90
Jan  2 18:13:21 host sshd[27068]: Connection closed by 172.105.128.11 port 26670 [preauth]
Jan  2 18:13:24 host sshd[27074]: Connection closed by 172.105.128.11 port 6906 [preauth]
Jan  2 18:13:27 host sshd[27079]: Connection closed by 172.105.128.11 port 6912 [preauth]
Jan  2 18:17:03 host sshd[27711]: Invalid user user5 from 106.10.122.53 port 40324
Jan  2 18:17:03 host sshd[27711]: input_userauth_request: invalid user user5 [preauth]
Jan  2 18:17:03 host sshd[27711]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 18:17:03 host sshd[27711]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53
Jan  2 18:17:05 host sshd[27711]: Failed password for invalid user user5 from 106.10.122.53 port 40324 ssh2
Jan  2 18:17:05 host sshd[27711]: Connection closed by 106.10.122.53 port 40324 [preauth]
Jan  2 18:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  2 18:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 18:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 18:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  2 18:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 18:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 18:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  2 18:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 18:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 18:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  2 18:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 18:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 18:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  2 18:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 18:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 18:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  2 18:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 18:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 18:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  2 18:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 18:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 18:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  2 18:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 18:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 18:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  2 18:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 18:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 18:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  2 18:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 18:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 18:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  2 18:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 18:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 18:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  2 18:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 18:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 18:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  2 18:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 18:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 18:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=dartsimp user-2=a2zgroup user-3=laundryboniface user-4=cochintaxi user-5=wwwkaretakers user-6=travelboniface user-7=ugotscom user-8=wwwrmswll user-9=wwwresourcehunte user-10=keralaholi user-11=wwwpmcresource user-12=wwwtestugo user-13=shalinijames user-14=vfmassets user-15=pmcresources user-16=wwwkmaorg user-17=disposeat user-18=remysagr user-19=woodpeck user-20=wwwkapin user-21=phmetals user-22=kottayamcalldriv user-23=gifterman user-24=palco123 user-25=mrsclean user-26=wwwnexidigital user-27=wwwevmhonda user-28=bonifacegroup user-29=wwwletsstalkfood user-30=straightcurve feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  2 18:21:51 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  2 18:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 18:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 18:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  2 18:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 18:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 18:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-O0oUksGdSke0nRPq.~
Jan  2 18:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 18:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 18:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-O0oUksGdSke0nRPq.~'
Jan  2 18:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 18:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 18:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-O0oUksGdSke0nRPq.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  2 18:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 18:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 18:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  2 18:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 18:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 18:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  2 18:21:52 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 18:21:52 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 18:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  2 18:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 18:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 18:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  2 18:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 18:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 18:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  2 18:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 18:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 18:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  2 18:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 18:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 18:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  2 18:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 18:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 18:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  2 18:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  2 18:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  2 18:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  2 18:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  2 18:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  2 18:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  2 18:21:57 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  2 18:21:59 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  2 18:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  2 18:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 18:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 18:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  2 18:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 18:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 18:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  2 18:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 18:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 18:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  2 18:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 18:22:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 18:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  2 18:22:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 18:22:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 18:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  2 18:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  2 18:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  2 18:26:19 host sshd[29294]: User root from 41.197.31.178 not allowed because not listed in AllowUsers
Jan  2 18:26:19 host sshd[29294]: input_userauth_request: invalid user root [preauth]
Jan  2 18:26:20 host unix_chkpwd[29297]: password check failed for user (root)
Jan  2 18:26:20 host sshd[29294]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178  user=root
Jan  2 18:26:20 host sshd[29294]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 18:26:22 host sshd[29294]: Failed password for invalid user root from 41.197.31.178 port 47462 ssh2
Jan  2 18:26:22 host sshd[29294]: Connection closed by 41.197.31.178 port 47462 [preauth]
Jan  2 18:50:18 host sshd[390]: Did not receive identification string from 58.72.18.130 port 4809
Jan  2 18:52:12 host sshd[814]: Invalid user user1 from 103.13.40.2 port 57862
Jan  2 18:52:12 host sshd[814]: input_userauth_request: invalid user user1 [preauth]
Jan  2 18:52:12 host sshd[814]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 18:52:12 host sshd[814]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2
Jan  2 18:52:15 host sshd[814]: Failed password for invalid user user1 from 103.13.40.2 port 57862 ssh2
Jan  2 18:52:15 host sshd[814]: Connection closed by 103.13.40.2 port 57862 [preauth]
Jan  2 18:59:02 host sshd[1851]: User root from 162.218.126.136 not allowed because not listed in AllowUsers
Jan  2 18:59:02 host sshd[1851]: input_userauth_request: invalid user root [preauth]
Jan  2 18:59:02 host unix_chkpwd[1881]: password check failed for user (root)
Jan  2 18:59:02 host sshd[1851]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136  user=root
Jan  2 18:59:02 host sshd[1851]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 18:59:04 host sshd[1851]: Failed password for invalid user root from 162.218.126.136 port 44516 ssh2
Jan  2 18:59:05 host sshd[1851]: Connection closed by 162.218.126.136 port 44516 [preauth]
Jan  2 19:02:26 host sshd[2330]: Invalid user walter from 107.189.30.59 port 33444
Jan  2 19:02:26 host sshd[2330]: input_userauth_request: invalid user walter [preauth]
Jan  2 19:02:26 host sshd[2330]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 19:02:26 host sshd[2330]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59
Jan  2 19:02:28 host sshd[2330]: Failed password for invalid user walter from 107.189.30.59 port 33444 ssh2
Jan  2 19:02:29 host sshd[2330]: Connection closed by 107.189.30.59 port 33444 [preauth]
Jan  2 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  2 19:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 19:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  2 19:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 19:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  2 19:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 19:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  2 19:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 19:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  2 19:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 19:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  2 19:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 19:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  2 19:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 19:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  2 19:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 19:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  2 19:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 19:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  2 19:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 19:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  2 19:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 19:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 19:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  2 19:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 19:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 19:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  2 19:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 19:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 19:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkmaorg user-2=disposeat user-3=remysagr user-4=woodpeck user-5=wwwkapin user-6=vfmassets user-7=wwwtestugo user-8=shalinijames user-9=pmcresources user-10=bonifacegroup user-11=wwwevmhonda user-12=straightcurve user-13=wwwletsstalkfood user-14=gifterman user-15=palco123 user-16=phmetals user-17=kottayamcalldriv user-18=mrsclean user-19=wwwnexidigital user-20=wwwkaretakers user-21=cochintaxi user-22=dartsimp user-23=a2zgroup user-24=laundryboniface user-25=wwwpmcresource user-26=travelboniface user-27=wwwrmswll user-28=wwwresourcehunte user-29=keralaholi user-30=ugotscom feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  2 19:21:51 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  2 19:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 19:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 19:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  2 19:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 19:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 19:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-DV6M956aI9DT8vzE.~
Jan  2 19:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 19:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 19:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-DV6M956aI9DT8vzE.~'
Jan  2 19:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 19:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 19:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-DV6M956aI9DT8vzE.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  2 19:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 19:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 19:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  2 19:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 19:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 19:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  2 19:21:52 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 19:21:52 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 19:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  2 19:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 19:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 19:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  2 19:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 19:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 19:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  2 19:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 19:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 19:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  2 19:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 19:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 19:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  2 19:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 19:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 19:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  2 19:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  2 19:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  2 19:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  2 19:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  2 19:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  2 19:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  2 19:21:56 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  2 19:21:57 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  2 19:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  2 19:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 19:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 19:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  2 19:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 19:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 19:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  2 19:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 19:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 19:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  2 19:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 19:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 19:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  2 19:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 19:22:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 19:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  2 19:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  2 19:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  2 19:33:17 host sshd[7497]: Did not receive identification string from 81.209.147.5 port 45636
Jan  2 19:33:23 host sshd[7520]: Connection closed by 81.209.147.5 port 46262 [preauth]
Jan  2 19:38:25 host sshd[8598]: Invalid user a from 106.10.122.53 port 38088
Jan  2 19:38:25 host sshd[8598]: input_userauth_request: invalid user a [preauth]
Jan  2 19:38:25 host sshd[8598]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 19:38:25 host sshd[8598]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53
Jan  2 19:38:27 host sshd[8598]: Failed password for invalid user a from 106.10.122.53 port 38088 ssh2
Jan  2 19:38:28 host sshd[8598]: Connection closed by 106.10.122.53 port 38088 [preauth]
Jan  2 19:54:11 host sshd[11231]: User root from 52.157.149.77 not allowed because not listed in AllowUsers
Jan  2 19:54:11 host sshd[11231]: input_userauth_request: invalid user root [preauth]
Jan  2 19:54:11 host unix_chkpwd[11234]: password check failed for user (root)
Jan  2 19:54:11 host sshd[11231]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.157.149.77  user=root
Jan  2 19:54:11 host sshd[11231]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 19:54:13 host sshd[11231]: Failed password for invalid user root from 52.157.149.77 port 33802 ssh2
Jan  2 19:54:13 host sshd[11231]: Received disconnect from 52.157.149.77 port 33802:11: Bye Bye [preauth]
Jan  2 19:54:13 host sshd[11231]: Disconnected from 52.157.149.77 port 33802 [preauth]
Jan  2 19:55:38 host sshd[11408]: User root from 201.15.199.221 not allowed because not listed in AllowUsers
Jan  2 19:55:38 host sshd[11408]: input_userauth_request: invalid user root [preauth]
Jan  2 19:55:38 host unix_chkpwd[11415]: password check failed for user (root)
Jan  2 19:55:38 host sshd[11408]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.15.199.221  user=root
Jan  2 19:55:38 host sshd[11408]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 19:55:41 host sshd[11408]: Failed password for invalid user root from 201.15.199.221 port 40368 ssh2
Jan  2 19:55:41 host sshd[11408]: Received disconnect from 201.15.199.221 port 40368:11: Bye Bye [preauth]
Jan  2 19:55:41 host sshd[11408]: Disconnected from 201.15.199.221 port 40368 [preauth]
Jan  2 19:59:01 host sshd[11926]: User root from 134.209.211.170 not allowed because not listed in AllowUsers
Jan  2 19:59:01 host sshd[11926]: input_userauth_request: invalid user root [preauth]
Jan  2 19:59:01 host unix_chkpwd[11937]: password check failed for user (root)
Jan  2 19:59:01 host sshd[11926]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.211.170  user=root
Jan  2 19:59:01 host sshd[11926]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 19:59:02 host sshd[11926]: Failed password for invalid user root from 134.209.211.170 port 54576 ssh2
Jan  2 19:59:03 host sshd[11926]: Received disconnect from 134.209.211.170 port 54576:11: Bye Bye [preauth]
Jan  2 19:59:03 host sshd[11926]: Disconnected from 134.209.211.170 port 54576 [preauth]
Jan  2 19:59:21 host sshd[11969]: User root from 52.157.149.77 not allowed because not listed in AllowUsers
Jan  2 19:59:21 host sshd[11969]: input_userauth_request: invalid user root [preauth]
Jan  2 19:59:21 host unix_chkpwd[11972]: password check failed for user (root)
Jan  2 19:59:21 host sshd[11969]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.157.149.77  user=root
Jan  2 19:59:21 host sshd[11969]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 19:59:23 host sshd[11969]: Failed password for invalid user root from 52.157.149.77 port 55828 ssh2
Jan  2 19:59:23 host sshd[11969]: Received disconnect from 52.157.149.77 port 55828:11: Bye Bye [preauth]
Jan  2 19:59:23 host sshd[11969]: Disconnected from 52.157.149.77 port 55828 [preauth]
Jan  2 20:00:08 host sshd[12114]: User root from 134.209.211.170 not allowed because not listed in AllowUsers
Jan  2 20:00:08 host sshd[12114]: input_userauth_request: invalid user root [preauth]
Jan  2 20:00:08 host unix_chkpwd[12118]: password check failed for user (root)
Jan  2 20:00:08 host sshd[12114]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.211.170  user=root
Jan  2 20:00:08 host sshd[12114]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 20:00:10 host sshd[12114]: Failed password for invalid user root from 134.209.211.170 port 49814 ssh2
Jan  2 20:00:38 host sshd[12211]: Invalid user redis from 41.197.31.178 port 44712
Jan  2 20:00:38 host sshd[12211]: input_userauth_request: invalid user redis [preauth]
Jan  2 20:00:38 host sshd[12211]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 20:00:38 host sshd[12211]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178
Jan  2 20:00:41 host sshd[12211]: Failed password for invalid user redis from 41.197.31.178 port 44712 ssh2
Jan  2 20:00:41 host sshd[12211]: Connection closed by 41.197.31.178 port 44712 [preauth]
Jan  2 20:00:45 host sshd[12225]: Did not receive identification string from 149.129.220.222 port 61000
Jan  2 20:01:06 host sshd[12282]: User root from 201.15.199.221 not allowed because not listed in AllowUsers
Jan  2 20:01:06 host sshd[12282]: input_userauth_request: invalid user root [preauth]
Jan  2 20:01:06 host unix_chkpwd[12288]: password check failed for user (root)
Jan  2 20:01:06 host sshd[12282]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.15.199.221  user=root
Jan  2 20:01:06 host sshd[12282]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 20:01:07 host sshd[12282]: Failed password for invalid user root from 201.15.199.221 port 59116 ssh2
Jan  2 20:01:08 host sshd[12282]: Received disconnect from 201.15.199.221 port 59116:11: Bye Bye [preauth]
Jan  2 20:01:08 host sshd[12282]: Disconnected from 201.15.199.221 port 59116 [preauth]
Jan  2 20:01:20 host sshd[12339]: Invalid user yxd from 92.46.108.20 port 48204
Jan  2 20:01:20 host sshd[12339]: input_userauth_request: invalid user yxd [preauth]
Jan  2 20:01:21 host sshd[12339]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 20:01:21 host sshd[12339]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20
Jan  2 20:01:23 host sshd[12339]: Failed password for invalid user yxd from 92.46.108.20 port 48204 ssh2
Jan  2 20:01:24 host sshd[12339]: Connection closed by 92.46.108.20 port 48204 [preauth]
Jan  2 20:03:38 host sshd[12688]: Invalid user user1 from 162.218.126.136 port 60334
Jan  2 20:03:38 host sshd[12688]: input_userauth_request: invalid user user1 [preauth]
Jan  2 20:03:38 host sshd[12688]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 20:03:38 host sshd[12688]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136
Jan  2 20:03:40 host sshd[12688]: Failed password for invalid user user1 from 162.218.126.136 port 60334 ssh2
Jan  2 20:03:41 host sshd[12688]: Connection closed by 162.218.126.136 port 60334 [preauth]
Jan  2 20:13:53 host sshd[14152]: Invalid user db2inst1 from 103.13.40.2 port 40136
Jan  2 20:13:53 host sshd[14152]: input_userauth_request: invalid user db2inst1 [preauth]
Jan  2 20:13:54 host sshd[14152]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 20:13:54 host sshd[14152]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2
Jan  2 20:13:56 host sshd[14152]: Failed password for invalid user db2inst1 from 103.13.40.2 port 40136 ssh2
Jan  2 20:13:56 host sshd[14152]: Connection closed by 103.13.40.2 port 40136 [preauth]
Jan  2 20:18:58 host sshd[14887]: Invalid user admin from 45.93.201.90 port 34650
Jan  2 20:18:58 host sshd[14887]: input_userauth_request: invalid user admin [preauth]
Jan  2 20:18:58 host sshd[14887]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 20:18:58 host sshd[14887]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90
Jan  2 20:18:59 host sshd[14887]: Failed password for invalid user admin from 45.93.201.90 port 34650 ssh2
Jan  2 20:19:03 host sshd[14887]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 20:19:05 host sshd[14887]: Failed password for invalid user admin from 45.93.201.90 port 34650 ssh2
Jan  2 20:19:08 host sshd[14887]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 20:19:10 host sshd[14887]: Failed password for invalid user admin from 45.93.201.90 port 34650 ssh2
Jan  2 20:19:13 host sshd[14887]: Connection closed by 45.93.201.90 port 34650 [preauth]
Jan  2 20:19:13 host sshd[14887]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90
Jan  2 20:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  2 20:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 20:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 20:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  2 20:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 20:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 20:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  2 20:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 20:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 20:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  2 20:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 20:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 20:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  2 20:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 20:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 20:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  2 20:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 20:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 20:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  2 20:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 20:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 20:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  2 20:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 20:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 20:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  2 20:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 20:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 20:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  2 20:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 20:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 20:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  2 20:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 20:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 20:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  2 20:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 20:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 20:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  2 20:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 20:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 20:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=ugotscom user-3=wwwrmswll user-4=keralaholi user-5=wwwresourcehunte user-6=travelboniface user-7=wwwkaretakers user-8=cochintaxi user-9=laundryboniface user-10=dartsimp user-11=a2zgroup user-12=straightcurve user-13=wwwletsstalkfood user-14=wwwevmhonda user-15=bonifacegroup user-16=wwwnexidigital user-17=mrsclean user-18=kottayamcalldriv user-19=phmetals user-20=gifterman user-21=palco123 user-22=woodpeck user-23=wwwkapin user-24=disposeat user-25=wwwkmaorg user-26=remysagr user-27=pmcresources user-28=wwwtestugo user-29=shalinijames user-30=vfmassets feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  2 20:21:51 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  2 20:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 20:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 20:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  2 20:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 20:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 20:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ymkxR2tKlbxGLyip.~
Jan  2 20:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 20:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 20:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ymkxR2tKlbxGLyip.~'
Jan  2 20:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 20:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 20:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ymkxR2tKlbxGLyip.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  2 20:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 20:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 20:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  2 20:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 20:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 20:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  2 20:21:52 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 20:21:52 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 20:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  2 20:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 20:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 20:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  2 20:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 20:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 20:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  2 20:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 20:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 20:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  2 20:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 20:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 20:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  2 20:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 20:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 20:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  2 20:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  2 20:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  2 20:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  2 20:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  2 20:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  2 20:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  2 20:21:57 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  2 20:21:59 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  2 20:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  2 20:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 20:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 20:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  2 20:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 20:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 20:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  2 20:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 20:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 20:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  2 20:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 20:22:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 20:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  2 20:22:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 20:22:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 20:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  2 20:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  2 20:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  2 20:29:23 host sshd[16602]: Connection reset by 143.244.147.166 port 25848 [preauth]
Jan  2 20:59:37 host sshd[21869]: Invalid user sambit from 106.10.122.53 port 44132
Jan  2 20:59:37 host sshd[21869]: input_userauth_request: invalid user sambit [preauth]
Jan  2 20:59:37 host sshd[21869]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 20:59:37 host sshd[21869]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53
Jan  2 20:59:40 host sshd[21869]: Failed password for invalid user sambit from 106.10.122.53 port 44132 ssh2
Jan  2 20:59:40 host sshd[21869]: Connection closed by 106.10.122.53 port 44132 [preauth]
Jan  2 21:10:41 host sshd[23571]: Invalid user user from 193.169.255.30 port 52686
Jan  2 21:10:41 host sshd[23571]: input_userauth_request: invalid user user [preauth]
Jan  2 21:10:41 host sshd[23571]: Failed none for invalid user user from 193.169.255.30 port 52686 ssh2
Jan  2 21:10:45 host sshd[23571]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 21:10:45 host sshd[23571]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.169.255.30
Jan  2 21:10:46 host sshd[23571]: Failed password for invalid user user from 193.169.255.30 port 52686 ssh2
Jan  2 21:10:50 host sshd[23571]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 21:10:52 host sshd[23571]: Failed password for invalid user user from 193.169.255.30 port 52686 ssh2
Jan  2 21:10:55 host sshd[23571]: Connection closed by 193.169.255.30 port 52686 [preauth]
Jan  2 21:10:55 host sshd[23571]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.169.255.30
Jan  2 21:13:27 host sshd[23868]: Invalid user zabbix from 162.218.126.136 port 49536
Jan  2 21:13:27 host sshd[23868]: input_userauth_request: invalid user zabbix [preauth]
Jan  2 21:13:27 host sshd[23868]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 21:13:27 host sshd[23868]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136
Jan  2 21:13:29 host sshd[23868]: Failed password for invalid user zabbix from 162.218.126.136 port 49536 ssh2
Jan  2 21:13:29 host sshd[23868]: Connection closed by 162.218.126.136 port 49536 [preauth]
Jan  2 21:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  2 21:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 21:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 21:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  2 21:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 21:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 21:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  2 21:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 21:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 21:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  2 21:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 21:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 21:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  2 21:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 21:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 21:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  2 21:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 21:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 21:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  2 21:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 21:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 21:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  2 21:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 21:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 21:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  2 21:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 21:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 21:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  2 21:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 21:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 21:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  2 21:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 21:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 21:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  2 21:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 21:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 21:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  2 21:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 21:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 21:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=travelboniface user-3=wwwrmswll user-4=keralaholi user-5=wwwresourcehunte user-6=ugotscom user-7=cochintaxi user-8=wwwkaretakers user-9=dartsimp user-10=a2zgroup user-11=laundryboniface user-12=bonifacegroup user-13=wwwevmhonda user-14=wwwletsstalkfood user-15=straightcurve user-16=gifterman user-17=palco123 user-18=phmetals user-19=kottayamcalldriv user-20=wwwnexidigital user-21=mrsclean user-22=wwwkmaorg user-23=disposeat user-24=remysagr user-25=woodpeck user-26=wwwkapin user-27=vfmassets user-28=wwwtestugo user-29=shalinijames user-30=pmcresources feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  2 21:21:51 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  2 21:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 21:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 21:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  2 21:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 21:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 21:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-vTrzwHJzlfiIk8aI.~
Jan  2 21:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 21:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 21:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-vTrzwHJzlfiIk8aI.~'
Jan  2 21:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 21:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 21:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-vTrzwHJzlfiIk8aI.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  2 21:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 21:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 21:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  2 21:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 21:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 21:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  2 21:21:52 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 21:21:52 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 21:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  2 21:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 21:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 21:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  2 21:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 21:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 21:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  2 21:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 21:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 21:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  2 21:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 21:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 21:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  2 21:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 21:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 21:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  2 21:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  2 21:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  2 21:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  2 21:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  2 21:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  2 21:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  2 21:21:56 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  2 21:21:58 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  2 21:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  2 21:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 21:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 21:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  2 21:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 21:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 21:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  2 21:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 21:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 21:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  2 21:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 21:22:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 21:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  2 21:22:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 21:22:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 21:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  2 21:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  2 21:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  2 21:31:04 host sshd[26713]: Invalid user user from 41.197.31.178 port 39344
Jan  2 21:31:04 host sshd[26713]: input_userauth_request: invalid user user [preauth]
Jan  2 21:31:04 host sshd[26713]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 21:31:04 host sshd[26713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178
Jan  2 21:31:06 host sshd[26713]: Failed password for invalid user user from 41.197.31.178 port 39344 ssh2
Jan  2 21:31:06 host sshd[26713]: Connection closed by 41.197.31.178 port 39344 [preauth]
Jan  2 21:34:22 host sshd[27179]: Invalid user user from 103.13.40.2 port 34998
Jan  2 21:34:22 host sshd[27179]: input_userauth_request: invalid user user [preauth]
Jan  2 21:34:22 host sshd[27179]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 21:34:22 host sshd[27179]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2
Jan  2 21:34:23 host sshd[27179]: Failed password for invalid user user from 103.13.40.2 port 34998 ssh2
Jan  2 21:34:23 host sshd[27179]: Connection closed by 103.13.40.2 port 34998 [preauth]
Jan  2 21:50:25 host sshd[29424]: User root from 185.69.144.200 not allowed because not listed in AllowUsers
Jan  2 21:50:25 host sshd[29424]: input_userauth_request: invalid user root [preauth]
Jan  2 21:50:25 host unix_chkpwd[29427]: password check failed for user (root)
Jan  2 21:50:25 host sshd[29424]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.69.144.200  user=root
Jan  2 21:50:25 host sshd[29424]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 21:50:27 host sshd[29424]: Failed password for invalid user root from 185.69.144.200 port 58576 ssh2
Jan  2 21:50:27 host sshd[29424]: Received disconnect from 185.69.144.200 port 58576:11: Bye Bye [preauth]
Jan  2 21:50:27 host sshd[29424]: Disconnected from 185.69.144.200 port 58576 [preauth]
Jan  2 21:50:28 host sshd[29451]: User root from 185.69.144.200 not allowed because not listed in AllowUsers
Jan  2 21:50:28 host sshd[29451]: input_userauth_request: invalid user root [preauth]
Jan  2 21:50:28 host unix_chkpwd[29456]: password check failed for user (root)
Jan  2 21:50:28 host sshd[29451]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.69.144.200  user=root
Jan  2 21:50:28 host sshd[29451]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 21:50:30 host sshd[29451]: Failed password for invalid user root from 185.69.144.200 port 35268 ssh2
Jan  2 21:50:31 host sshd[29451]: Received disconnect from 185.69.144.200 port 35268:11: Bye Bye [preauth]
Jan  2 21:50:31 host sshd[29451]: Disconnected from 185.69.144.200 port 35268 [preauth]
Jan  2 21:50:32 host sshd[29462]: Invalid user ubnt from 185.69.144.200 port 6155
Jan  2 21:50:32 host sshd[29462]: input_userauth_request: invalid user ubnt [preauth]
Jan  2 21:50:32 host sshd[29462]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 21:50:32 host sshd[29462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.69.144.200
Jan  2 21:50:34 host sshd[29462]: Failed password for invalid user ubnt from 185.69.144.200 port 6155 ssh2
Jan  2 22:12:52 host sshd[749]: User root from 190.9.130.159 not allowed because not listed in AllowUsers
Jan  2 22:12:52 host sshd[749]: input_userauth_request: invalid user root [preauth]
Jan  2 22:12:52 host unix_chkpwd[752]: password check failed for user (root)
Jan  2 22:12:52 host sshd[749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.9.130.159  user=root
Jan  2 22:12:52 host sshd[749]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 22:12:54 host sshd[749]: Failed password for invalid user root from 190.9.130.159 port 50057 ssh2
Jan  2 22:12:54 host sshd[749]: Received disconnect from 190.9.130.159 port 50057:11: Bye Bye [preauth]
Jan  2 22:12:54 host sshd[749]: Disconnected from 190.9.130.159 port 50057 [preauth]
Jan  2 22:16:35 host sshd[1314]: User root from 190.9.130.159 not allowed because not listed in AllowUsers
Jan  2 22:16:35 host sshd[1314]: input_userauth_request: invalid user root [preauth]
Jan  2 22:16:35 host unix_chkpwd[1321]: password check failed for user (root)
Jan  2 22:16:35 host sshd[1314]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.9.130.159  user=root
Jan  2 22:16:35 host sshd[1314]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 22:16:37 host sshd[1314]: Failed password for invalid user root from 190.9.130.159 port 43539 ssh2
Jan  2 22:16:37 host sshd[1314]: Received disconnect from 190.9.130.159 port 43539:11: Bye Bye [preauth]
Jan  2 22:16:37 host sshd[1314]: Disconnected from 190.9.130.159 port 43539 [preauth]
Jan  2 22:17:27 host sshd[1488]: Invalid user ubuntu from 162.218.126.136 port 57804
Jan  2 22:17:27 host sshd[1488]: input_userauth_request: invalid user ubuntu [preauth]
Jan  2 22:17:28 host sshd[1488]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 22:17:28 host sshd[1488]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136
Jan  2 22:17:30 host sshd[1488]: Failed password for invalid user ubuntu from 162.218.126.136 port 57804 ssh2
Jan  2 22:17:30 host sshd[1488]: Connection closed by 162.218.126.136 port 57804 [preauth]
Jan  2 22:20:45 host sshd[2184]: Invalid user user from 106.10.122.53 port 41284
Jan  2 22:20:45 host sshd[2184]: input_userauth_request: invalid user user [preauth]
Jan  2 22:20:45 host sshd[2184]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 22:20:45 host sshd[2184]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53
Jan  2 22:20:47 host sshd[2184]: Failed password for invalid user user from 106.10.122.53 port 41284 ssh2
Jan  2 22:20:48 host sshd[2184]: Connection closed by 106.10.122.53 port 41284 [preauth]
Jan  2 22:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  2 22:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 22:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 22:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  2 22:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 22:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 22:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  2 22:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 22:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 22:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  2 22:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 22:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 22:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  2 22:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 22:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 22:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  2 22:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 22:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 22:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  2 22:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 22:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 22:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  2 22:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 22:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 22:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  2 22:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 22:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 22:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  2 22:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 22:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 22:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  2 22:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 22:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 22:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  2 22:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 22:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 22:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  2 22:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 22:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 22:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=travelboniface user-3=ugotscom user-4=keralaholi user-5=wwwresourcehunte user-6=wwwrmswll user-7=cochintaxi user-8=wwwkaretakers user-9=a2zgroup user-10=dartsimp user-11=laundryboniface user-12=wwwevmhonda user-13=bonifacegroup user-14=wwwletsstalkfood user-15=straightcurve user-16=phmetals user-17=kottayamcalldriv user-18=palco123 user-19=gifterman user-20=mrsclean user-21=wwwnexidigital user-22=wwwkmaorg user-23=disposeat user-24=remysagr user-25=wwwkapin user-26=woodpeck user-27=shalinijames user-28=wwwtestugo user-29=vfmassets user-30=pmcresources feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  2 22:21:56 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  2 22:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 22:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 22:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  2 22:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 22:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 22:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-E3KiDv7NdfSGYfeh.~
Jan  2 22:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 22:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 22:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-E3KiDv7NdfSGYfeh.~'
Jan  2 22:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 22:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 22:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-E3KiDv7NdfSGYfeh.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  2 22:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 22:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 22:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  2 22:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 22:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 22:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  2 22:21:56 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 22:21:56 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 22:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  2 22:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 22:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 22:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  2 22:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 22:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 22:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  2 22:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 22:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 22:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  2 22:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 22:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 22:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  2 22:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 22:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 22:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  2 22:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  2 22:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  2 22:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  2 22:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  2 22:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  2 22:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  2 22:22:01 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  2 22:22:02 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  2 22:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  2 22:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 22:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 22:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  2 22:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 22:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 22:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  2 22:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 22:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 22:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  2 22:22:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 22:22:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 22:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  2 22:22:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 22:22:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 22:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  2 22:22:10 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  2 22:22:11 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  2 22:24:58 host sshd[3212]: Did not receive identification string from 111.46.195.5 port 40192
Jan  2 22:29:44 host sshd[4497]: Invalid user admin from 45.93.201.90 port 57902
Jan  2 22:29:44 host sshd[4497]: input_userauth_request: invalid user admin [preauth]
Jan  2 22:29:44 host sshd[4497]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 22:29:44 host sshd[4497]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90
Jan  2 22:29:46 host sshd[4497]: Failed password for invalid user admin from 45.93.201.90 port 57902 ssh2
Jan  2 22:29:49 host sshd[4497]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 22:29:51 host sshd[4497]: Failed password for invalid user admin from 45.93.201.90 port 57902 ssh2
Jan  2 22:29:54 host sshd[4497]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 22:29:56 host sshd[4497]: Failed password for invalid user admin from 45.93.201.90 port 57902 ssh2
Jan  2 22:29:59 host sshd[4497]: Connection closed by 45.93.201.90 port 57902 [preauth]
Jan  2 22:29:59 host sshd[4497]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90
Jan  2 22:35:25 host sshd[5608]: Invalid user pi from 195.226.194.142 port 57580
Jan  2 22:35:25 host sshd[5608]: input_userauth_request: invalid user pi [preauth]
Jan  2 22:35:25 host sshd[5608]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 22:35:25 host sshd[5608]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.142
Jan  2 22:35:27 host sshd[5608]: Failed password for invalid user pi from 195.226.194.142 port 57580 ssh2
Jan  2 22:35:27 host sshd[5608]: Received disconnect from 195.226.194.142 port 57580:11: Bye Bye [preauth]
Jan  2 22:35:27 host sshd[5608]: Disconnected from 195.226.194.142 port 57580 [preauth]
Jan  2 22:40:43 host sshd[6432]: User root from 92.46.108.20 not allowed because not listed in AllowUsers
Jan  2 22:40:43 host sshd[6432]: input_userauth_request: invalid user root [preauth]
Jan  2 22:40:44 host unix_chkpwd[6438]: password check failed for user (root)
Jan  2 22:40:44 host sshd[6432]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20  user=root
Jan  2 22:40:44 host sshd[6432]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 22:40:46 host sshd[6432]: Failed password for invalid user root from 92.46.108.20 port 35950 ssh2
Jan  2 22:40:47 host sshd[6432]: Connection closed by 92.46.108.20 port 35950 [preauth]
Jan  2 22:54:07 host sshd[8261]: Invalid user server from 103.13.40.2 port 50756
Jan  2 22:54:07 host sshd[8261]: input_userauth_request: invalid user server [preauth]
Jan  2 22:54:07 host sshd[8261]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 22:54:07 host sshd[8261]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2
Jan  2 22:54:10 host sshd[8261]: Failed password for invalid user server from 103.13.40.2 port 50756 ssh2
Jan  2 22:54:10 host sshd[8261]: Connection closed by 103.13.40.2 port 50756 [preauth]
Jan  2 22:55:18 host sshd[8395]: User root from 179.99.202.158 not allowed because not listed in AllowUsers
Jan  2 22:55:18 host sshd[8395]: input_userauth_request: invalid user root [preauth]
Jan  2 22:55:18 host unix_chkpwd[8399]: password check failed for user (root)
Jan  2 22:55:18 host sshd[8395]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.99.202.158  user=root
Jan  2 22:55:18 host sshd[8395]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 22:55:20 host sshd[8395]: Failed password for invalid user root from 179.99.202.158 port 58598 ssh2
Jan  2 22:55:20 host sshd[8395]: Received disconnect from 179.99.202.158 port 58598:11: Bye Bye [preauth]
Jan  2 22:55:20 host sshd[8395]: Disconnected from 179.99.202.158 port 58598 [preauth]
Jan  2 22:55:55 host sshd[8572]: User root from 107.182.181.15 not allowed because not listed in AllowUsers
Jan  2 22:55:55 host sshd[8572]: input_userauth_request: invalid user root [preauth]
Jan  2 22:55:55 host unix_chkpwd[8575]: password check failed for user (root)
Jan  2 22:55:55 host sshd[8572]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.182.181.15  user=root
Jan  2 22:55:55 host sshd[8572]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 22:55:57 host sshd[8572]: Failed password for invalid user root from 107.182.181.15 port 45778 ssh2
Jan  2 22:55:57 host sshd[8572]: Received disconnect from 107.182.181.15 port 45778:11: Bye Bye [preauth]
Jan  2 22:55:57 host sshd[8572]: Disconnected from 107.182.181.15 port 45778 [preauth]
Jan  2 22:57:35 host sshd[8791]: User root from 200.116.195.123 not allowed because not listed in AllowUsers
Jan  2 22:57:35 host sshd[8791]: input_userauth_request: invalid user root [preauth]
Jan  2 22:57:35 host unix_chkpwd[8795]: password check failed for user (root)
Jan  2 22:57:35 host sshd[8791]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.116.195.123  user=root
Jan  2 22:57:35 host sshd[8791]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 22:57:37 host sshd[8791]: Failed password for invalid user root from 200.116.195.123 port 37970 ssh2
Jan  2 22:57:37 host sshd[8791]: Received disconnect from 200.116.195.123 port 37970:11: Bye Bye [preauth]
Jan  2 22:57:37 host sshd[8791]: Disconnected from 200.116.195.123 port 37970 [preauth]
Jan  2 22:59:27 host sshd[9008]: User root from 200.116.195.123 not allowed because not listed in AllowUsers
Jan  2 22:59:27 host sshd[9008]: input_userauth_request: invalid user root [preauth]
Jan  2 22:59:28 host unix_chkpwd[9032]: password check failed for user (root)
Jan  2 22:59:28 host sshd[9008]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.116.195.123  user=root
Jan  2 22:59:28 host sshd[9008]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 22:59:30 host sshd[9008]: Failed password for invalid user root from 200.116.195.123 port 37296 ssh2
Jan  2 22:59:30 host sshd[9008]: Received disconnect from 200.116.195.123 port 37296:11: Bye Bye [preauth]
Jan  2 22:59:30 host sshd[9008]: Disconnected from 200.116.195.123 port 37296 [preauth]
Jan  2 23:00:59 host sshd[9342]: User root from 179.99.202.158 not allowed because not listed in AllowUsers
Jan  2 23:00:59 host sshd[9342]: input_userauth_request: invalid user root [preauth]
Jan  2 23:00:59 host unix_chkpwd[9345]: password check failed for user (root)
Jan  2 23:00:59 host sshd[9342]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.99.202.158  user=root
Jan  2 23:00:59 host sshd[9342]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 23:01:01 host sshd[9342]: Failed password for invalid user root from 179.99.202.158 port 32904 ssh2
Jan  2 23:01:09 host sshd[9409]: Invalid user scanner from 41.197.31.178 port 48384
Jan  2 23:01:09 host sshd[9409]: input_userauth_request: invalid user scanner [preauth]
Jan  2 23:01:10 host sshd[9409]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 23:01:10 host sshd[9409]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178
Jan  2 23:01:12 host sshd[9409]: Failed password for invalid user scanner from 41.197.31.178 port 48384 ssh2
Jan  2 23:01:13 host sshd[9409]: Connection closed by 41.197.31.178 port 48384 [preauth]
Jan  2 23:01:42 host sshd[9471]: User root from 195.226.194.142 not allowed because not listed in AllowUsers
Jan  2 23:01:42 host sshd[9471]: input_userauth_request: invalid user root [preauth]
Jan  2 23:01:43 host unix_chkpwd[9474]: password check failed for user (root)
Jan  2 23:01:43 host sshd[9471]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.142  user=root
Jan  2 23:01:43 host sshd[9471]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 23:01:45 host sshd[9471]: Failed password for invalid user root from 195.226.194.142 port 58242 ssh2
Jan  2 23:01:45 host sshd[9471]: Received disconnect from 195.226.194.142 port 58242:11: Bye Bye [preauth]
Jan  2 23:01:45 host sshd[9471]: Disconnected from 195.226.194.142 port 58242 [preauth]
Jan  2 23:01:52 host sshd[9510]: User root from 107.182.181.15 not allowed because not listed in AllowUsers
Jan  2 23:01:52 host sshd[9510]: input_userauth_request: invalid user root [preauth]
Jan  2 23:01:52 host unix_chkpwd[9518]: password check failed for user (root)
Jan  2 23:01:52 host sshd[9510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.182.181.15  user=root
Jan  2 23:01:52 host sshd[9510]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 23:01:55 host sshd[9510]: Failed password for invalid user root from 107.182.181.15 port 39190 ssh2
Jan  2 23:01:55 host sshd[9510]: Received disconnect from 107.182.181.15 port 39190:11: Bye Bye [preauth]
Jan  2 23:01:55 host sshd[9510]: Disconnected from 107.182.181.15 port 39190 [preauth]
Jan  2 23:12:44 host sshd[11022]: Did not receive identification string from 192.241.221.20 port 43524
Jan  2 23:21:35 host sshd[12324]: Invalid user zhaoting from 162.218.126.136 port 60786
Jan  2 23:21:35 host sshd[12324]: input_userauth_request: invalid user zhaoting [preauth]
Jan  2 23:21:35 host sshd[12324]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 23:21:35 host sshd[12324]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136
Jan  2 23:21:37 host sshd[12324]: Failed password for invalid user zhaoting from 162.218.126.136 port 60786 ssh2
Jan  2 23:21:37 host sshd[12324]: Connection closed by 162.218.126.136 port 60786 [preauth]
Jan  2 23:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  2 23:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 23:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 23:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  2 23:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 23:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 23:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  2 23:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 23:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 23:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  2 23:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 23:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 23:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  2 23:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 23:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 23:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  2 23:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 23:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 23:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  2 23:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 23:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 23:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  2 23:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 23:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 23:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  2 23:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 23:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 23:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  2 23:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 23:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 23:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  2 23:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 23:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 23:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  2 23:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 23:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 23:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  2 23:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 23:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 23:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=keralaholi user-2=wwwresourcehunte user-3=wwwrmswll user-4=ugotscom user-5=travelboniface user-6=wwwpmcresource user-7=laundryboniface user-8=a2zgroup user-9=dartsimp user-10=wwwkaretakers user-11=cochintaxi user-12=wwwnexidigital user-13=mrsclean user-14=palco123 user-15=gifterman user-16=kottayamcalldriv user-17=phmetals user-18=wwwletsstalkfood user-19=straightcurve user-20=bonifacegroup user-21=wwwevmhonda user-22=pmcresources user-23=vfmassets user-24=shalinijames user-25=wwwtestugo user-26=woodpeck user-27=wwwkapin user-28=disposeat user-29=wwwkmaorg user-30=remysagr feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  2 23:21:51 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  2 23:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 23:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 23:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  2 23:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 23:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 23:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-22L5FV0cpLAaaF2j.~
Jan  2 23:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 23:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 23:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-22L5FV0cpLAaaF2j.~'
Jan  2 23:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 23:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 23:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-22L5FV0cpLAaaF2j.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  2 23:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 23:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 23:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  2 23:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 23:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 23:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  2 23:21:52 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 23:21:52 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 23:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  2 23:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 23:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 23:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  2 23:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 23:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 23:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  2 23:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 23:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 23:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  2 23:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 23:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 23:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  2 23:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  2 23:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  2 23:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  2 23:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  2 23:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  2 23:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  2 23:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  2 23:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  2 23:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  2 23:21:57 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  2 23:21:59 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  2 23:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  2 23:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 23:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 23:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  2 23:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 23:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 23:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  2 23:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  2 23:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  2 23:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  2 23:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 23:22:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 23:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  2 23:22:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  2 23:22:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  2 23:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  2 23:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  2 23:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  2 23:22:07 host sshd[12590]: User root from 113.125.41.74 not allowed because not listed in AllowUsers
Jan  2 23:22:07 host sshd[12590]: input_userauth_request: invalid user root [preauth]
Jan  2 23:22:07 host unix_chkpwd[12603]: password check failed for user (root)
Jan  2 23:22:07 host sshd[12590]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.125.41.74  user=root
Jan  2 23:22:07 host sshd[12590]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 23:22:10 host sshd[12590]: Failed password for invalid user root from 113.125.41.74 port 48746 ssh2
Jan  2 23:22:10 host unix_chkpwd[12606]: password check failed for user (root)
Jan  2 23:22:10 host sshd[12590]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 23:22:12 host sshd[12590]: Failed password for invalid user root from 113.125.41.74 port 48746 ssh2
Jan  2 23:22:12 host unix_chkpwd[12610]: password check failed for user (root)
Jan  2 23:22:12 host sshd[12590]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 23:22:14 host sshd[12590]: Failed password for invalid user root from 113.125.41.74 port 48746 ssh2
Jan  2 23:22:15 host unix_chkpwd[12614]: password check failed for user (root)
Jan  2 23:22:15 host sshd[12590]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 23:22:17 host sshd[12590]: Failed password for invalid user root from 113.125.41.74 port 48746 ssh2
Jan  2 23:28:43 host sshd[13550]: User root from 164.92.94.14 not allowed because not listed in AllowUsers
Jan  2 23:28:43 host sshd[13550]: input_userauth_request: invalid user root [preauth]
Jan  2 23:28:43 host unix_chkpwd[13554]: password check failed for user (root)
Jan  2 23:28:43 host sshd[13550]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.94.14  user=root
Jan  2 23:28:43 host sshd[13550]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 23:28:46 host sshd[13550]: Failed password for invalid user root from 164.92.94.14 port 47262 ssh2
Jan  2 23:28:46 host sshd[13550]: Received disconnect from 164.92.94.14 port 47262:11: Bye Bye [preauth]
Jan  2 23:28:46 host sshd[13550]: Disconnected from 164.92.94.14 port 47262 [preauth]
Jan  2 23:31:35 host sshd[13918]: User root from 164.92.94.14 not allowed because not listed in AllowUsers
Jan  2 23:31:35 host sshd[13918]: input_userauth_request: invalid user root [preauth]
Jan  2 23:31:35 host unix_chkpwd[13922]: password check failed for user (root)
Jan  2 23:31:35 host sshd[13918]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.94.14  user=root
Jan  2 23:31:35 host sshd[13918]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 23:31:37 host sshd[13918]: Failed password for invalid user root from 164.92.94.14 port 50604 ssh2
Jan  2 23:37:04 host sshd[14682]: Invalid user jose from 195.226.194.242 port 57976
Jan  2 23:37:04 host sshd[14682]: input_userauth_request: invalid user jose [preauth]
Jan  2 23:37:04 host sshd[14682]: pam_unix(sshd:auth): check pass; user unknown
Jan  2 23:37:04 host sshd[14682]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.242
Jan  2 23:37:06 host sshd[14682]: Failed password for invalid user jose from 195.226.194.242 port 57976 ssh2
Jan  2 23:37:07 host sshd[14682]: Received disconnect from 195.226.194.242 port 57976:11: Bye Bye [preauth]
Jan  2 23:37:07 host sshd[14682]: Disconnected from 195.226.194.242 port 57976 [preauth]
Jan  2 23:41:53 host sshd[15341]: User root from 106.10.122.53 not allowed because not listed in AllowUsers
Jan  2 23:41:53 host sshd[15341]: input_userauth_request: invalid user root [preauth]
Jan  2 23:41:53 host unix_chkpwd[15344]: password check failed for user (root)
Jan  2 23:41:53 host sshd[15341]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53  user=root
Jan  2 23:41:53 host sshd[15341]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  2 23:41:54 host sshd[15341]: Failed password for invalid user root from 106.10.122.53 port 40148 ssh2
Jan  2 23:41:54 host sshd[15341]: Connection closed by 106.10.122.53 port 40148 [preauth]
Jan  3 00:00:53 host sshd[18245]: Invalid user patrick from 107.189.30.59 port 48136
Jan  3 00:00:53 host sshd[18245]: input_userauth_request: invalid user patrick [preauth]
Jan  3 00:00:53 host sshd[18245]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 00:00:53 host sshd[18245]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59
Jan  3 00:00:55 host sshd[18245]: Failed password for invalid user patrick from 107.189.30.59 port 48136 ssh2
Jan  3 00:00:56 host sshd[18245]: Connection closed by 107.189.30.59 port 48136 [preauth]
Jan  3 00:13:06 host sshd[20115]: Did not receive identification string from 141.98.10.111 port 48274
Jan  3 00:13:07 host sshd[20116]: Invalid user user from 141.98.10.111 port 48300
Jan  3 00:13:07 host sshd[20117]: Invalid user odoo15 from 141.98.10.111 port 48298
Jan  3 00:13:07 host sshd[20116]: input_userauth_request: invalid user user [preauth]
Jan  3 00:13:07 host sshd[20117]: input_userauth_request: invalid user odoo15 [preauth]
Jan  3 00:13:08 host sshd[20116]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 00:13:08 host sshd[20116]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.10.111
Jan  3 00:13:08 host sshd[20117]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 00:13:08 host sshd[20117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.10.111
Jan  3 00:13:09 host sshd[20116]: Failed password for invalid user user from 141.98.10.111 port 48300 ssh2
Jan  3 00:13:09 host sshd[20117]: Failed password for invalid user odoo15 from 141.98.10.111 port 48298 ssh2
Jan  3 00:13:10 host sshd[20116]: Connection closed by 141.98.10.111 port 48300 [preauth]
Jan  3 00:13:10 host sshd[20117]: Connection closed by 141.98.10.111 port 48298 [preauth]
Jan  3 00:13:19 host sshd[20169]: Connection closed by 45.79.181.94 port 31032 [preauth]
Jan  3 00:13:20 host sshd[20173]: Connection closed by 45.79.181.94 port 31046 [preauth]
Jan  3 00:13:22 host sshd[20177]: Connection closed by 45.79.181.94 port 31058 [preauth]
Jan  3 00:14:03 host sshd[20362]: Invalid user user1 from 103.13.40.2 port 39976
Jan  3 00:14:03 host sshd[20362]: input_userauth_request: invalid user user1 [preauth]
Jan  3 00:14:03 host sshd[20362]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 00:14:03 host sshd[20362]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2
Jan  3 00:14:05 host sshd[20362]: Failed password for invalid user user1 from 103.13.40.2 port 39976 ssh2
Jan  3 00:14:05 host sshd[20362]: Connection closed by 103.13.40.2 port 39976 [preauth]
Jan  3 00:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  3 00:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 00:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 00:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  3 00:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 00:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 00:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  3 00:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 00:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 00:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  3 00:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 00:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 00:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  3 00:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 00:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 00:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  3 00:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 00:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 00:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  3 00:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 00:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 00:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  3 00:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 00:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 00:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  3 00:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 00:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 00:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  3 00:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 00:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 00:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  3 00:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 00:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 00:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  3 00:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 00:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 00:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  3 00:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 00:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 00:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=cochintaxi user-2=wwwkaretakers user-3=laundryboniface user-4=a2zgroup user-5=dartsimp user-6=wwwpmcresource user-7=keralaholi user-8=wwwresourcehunte user-9=wwwrmswll user-10=ugotscom user-11=travelboniface user-12=wwwkapin user-13=woodpeck user-14=disposeat user-15=wwwkmaorg user-16=remysagr user-17=pmcresources user-18=vfmassets user-19=shalinijames user-20=wwwtestugo user-21=straightcurve user-22=wwwletsstalkfood user-23=bonifacegroup user-24=wwwevmhonda user-25=mrsclean user-26=wwwnexidigital user-27=palco123 user-28=gifterman user-29=phmetals user-30=kottayamcalldriv feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  3 00:21:51 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  3 00:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 00:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 00:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  3 00:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 00:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 00:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-oK4BGAS6090pucWY.~
Jan  3 00:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 00:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 00:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-oK4BGAS6090pucWY.~'
Jan  3 00:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 00:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 00:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-oK4BGAS6090pucWY.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  3 00:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 00:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 00:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  3 00:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 00:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 00:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  3 00:21:51 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 00:21:51 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 00:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  3 00:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 00:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 00:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  3 00:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 00:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 00:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  3 00:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 00:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 00:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  3 00:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 00:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 00:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  3 00:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 00:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 00:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  3 00:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  3 00:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  3 00:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  3 00:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  3 00:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  3 00:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  3 00:21:56 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  3 00:21:58 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  3 00:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  3 00:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 00:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 00:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  3 00:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 00:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 00:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  3 00:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 00:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 00:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  3 00:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 00:22:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 00:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  3 00:22:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 00:22:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 00:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  3 00:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  3 00:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  3 00:24:59 host sshd[22947]: User root from 162.218.126.136 not allowed because not listed in AllowUsers
Jan  3 00:24:59 host sshd[22947]: input_userauth_request: invalid user root [preauth]
Jan  3 00:25:00 host unix_chkpwd[22955]: password check failed for user (root)
Jan  3 00:25:00 host sshd[22947]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136  user=root
Jan  3 00:25:00 host sshd[22947]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 00:25:01 host sshd[22947]: Failed password for invalid user root from 162.218.126.136 port 46194 ssh2
Jan  3 00:25:01 host sshd[22947]: Connection closed by 162.218.126.136 port 46194 [preauth]
Jan  3 00:28:13 host sshd[23448]: User root from 119.177.175.7 not allowed because not listed in AllowUsers
Jan  3 00:28:13 host sshd[23448]: input_userauth_request: invalid user root [preauth]
Jan  3 00:28:13 host unix_chkpwd[23454]: password check failed for user (root)
Jan  3 00:28:13 host sshd[23448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.177.175.7  user=root
Jan  3 00:28:13 host sshd[23448]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 00:28:15 host sshd[23448]: Failed password for invalid user root from 119.177.175.7 port 33422 ssh2
Jan  3 00:28:16 host sshd[23448]: Connection closed by 119.177.175.7 port 33422 [preauth]
Jan  3 00:28:17 host sshd[23457]: User root from 119.177.175.7 not allowed because not listed in AllowUsers
Jan  3 00:28:17 host sshd[23457]: input_userauth_request: invalid user root [preauth]
Jan  3 00:28:17 host unix_chkpwd[23462]: password check failed for user (root)
Jan  3 00:28:17 host sshd[23457]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.177.175.7  user=root
Jan  3 00:28:17 host sshd[23457]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 00:28:19 host sshd[23457]: Failed password for invalid user root from 119.177.175.7 port 59704 ssh2
Jan  3 00:31:19 host sshd[23961]: Invalid user zxy from 41.197.31.178 port 46964
Jan  3 00:31:19 host sshd[23961]: input_userauth_request: invalid user zxy [preauth]
Jan  3 00:31:20 host sshd[23961]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 00:31:20 host sshd[23961]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178
Jan  3 00:31:22 host sshd[23961]: Failed password for invalid user zxy from 41.197.31.178 port 46964 ssh2
Jan  3 00:31:22 host sshd[23961]: Connection closed by 41.197.31.178 port 46964 [preauth]
Jan  3 00:33:38 host sshd[24303]: Invalid user matrix from 195.226.194.242 port 48832
Jan  3 00:33:38 host sshd[24303]: input_userauth_request: invalid user matrix [preauth]
Jan  3 00:33:38 host sshd[24303]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 00:33:38 host sshd[24303]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.242
Jan  3 00:33:40 host sshd[24303]: Failed password for invalid user matrix from 195.226.194.242 port 48832 ssh2
Jan  3 00:33:40 host sshd[24303]: Received disconnect from 195.226.194.242 port 48832:11: Bye Bye [preauth]
Jan  3 00:33:40 host sshd[24303]: Disconnected from 195.226.194.242 port 48832 [preauth]
Jan  3 00:39:10 host sshd[25085]: Invalid user admin from 45.93.201.90 port 34424
Jan  3 00:39:10 host sshd[25085]: input_userauth_request: invalid user admin [preauth]
Jan  3 00:39:10 host sshd[25085]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 00:39:10 host sshd[25085]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90
Jan  3 00:39:12 host sshd[25085]: Failed password for invalid user admin from 45.93.201.90 port 34424 ssh2
Jan  3 00:39:15 host sshd[25085]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 00:39:17 host sshd[25085]: Failed password for invalid user admin from 45.93.201.90 port 34424 ssh2
Jan  3 00:39:21 host sshd[25085]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 00:39:22 host sshd[25085]: Failed password for invalid user admin from 45.93.201.90 port 34424 ssh2
Jan  3 00:39:26 host sshd[25085]: Connection closed by 45.93.201.90 port 34424 [preauth]
Jan  3 00:39:26 host sshd[25085]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90
Jan  3 01:02:55 host sshd[28350]: User root from 106.10.122.53 not allowed because not listed in AllowUsers
Jan  3 01:02:55 host sshd[28350]: input_userauth_request: invalid user root [preauth]
Jan  3 01:02:55 host unix_chkpwd[28353]: password check failed for user (root)
Jan  3 01:02:55 host sshd[28350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53  user=root
Jan  3 01:02:55 host sshd[28350]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 01:02:58 host sshd[28350]: Failed password for invalid user root from 106.10.122.53 port 50784 ssh2
Jan  3 01:02:58 host sshd[28350]: Connection closed by 106.10.122.53 port 50784 [preauth]
Jan  3 01:03:48 host sshd[28459]: Did not receive identification string from 46.101.97.107 port 61000
Jan  3 01:05:10 host sshd[28633]: Invalid user master from 195.226.194.242 port 44866
Jan  3 01:05:10 host sshd[28633]: input_userauth_request: invalid user master [preauth]
Jan  3 01:05:10 host sshd[28633]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 01:05:10 host sshd[28633]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.242
Jan  3 01:05:11 host sshd[28633]: Failed password for invalid user master from 195.226.194.242 port 44866 ssh2
Jan  3 01:05:12 host sshd[28633]: Received disconnect from 195.226.194.242 port 44866:11: Bye Bye [preauth]
Jan  3 01:05:12 host sshd[28633]: Disconnected from 195.226.194.242 port 44866 [preauth]
Jan  3 01:20:14 host sshd[30693]: Invalid user upload from 92.46.108.20 port 35984
Jan  3 01:20:14 host sshd[30693]: input_userauth_request: invalid user upload [preauth]
Jan  3 01:20:15 host sshd[30693]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 01:20:15 host sshd[30693]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20
Jan  3 01:20:17 host sshd[30693]: Failed password for invalid user upload from 92.46.108.20 port 35984 ssh2
Jan  3 01:20:18 host sshd[30693]: Connection closed by 92.46.108.20 port 35984 [preauth]
Jan  3 01:20:50 host sshd[30757]: User root from 188.166.58.96 not allowed because not listed in AllowUsers
Jan  3 01:20:50 host sshd[30757]: input_userauth_request: invalid user root [preauth]
Jan  3 01:20:50 host unix_chkpwd[30761]: password check failed for user (root)
Jan  3 01:20:50 host sshd[30757]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.58.96  user=root
Jan  3 01:20:50 host sshd[30757]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 01:20:52 host sshd[30757]: Failed password for invalid user root from 188.166.58.96 port 59286 ssh2
Jan  3 01:20:52 host sshd[30757]: Received disconnect from 188.166.58.96 port 59286:11: Bye Bye [preauth]
Jan  3 01:20:52 host sshd[30757]: Disconnected from 188.166.58.96 port 59286 [preauth]
Jan  3 01:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  3 01:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 01:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 01:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  3 01:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 01:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 01:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  3 01:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 01:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 01:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  3 01:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 01:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 01:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  3 01:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 01:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 01:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  3 01:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 01:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 01:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  3 01:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 01:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 01:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  3 01:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 01:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 01:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  3 01:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 01:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 01:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  3 01:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 01:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 01:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  3 01:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 01:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 01:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  3 01:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 01:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 01:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  3 01:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 01:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 01:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=cochintaxi user-2=wwwkaretakers user-3=dartsimp user-4=a2zgroup user-5=laundryboniface user-6=wwwpmcresource user-7=travelboniface user-8=wwwrmswll user-9=wwwresourcehunte user-10=keralaholi user-11=ugotscom user-12=remysagr user-13=disposeat user-14=wwwkmaorg user-15=wwwkapin user-16=woodpeck user-17=vfmassets user-18=wwwtestugo user-19=shalinijames user-20=pmcresources user-21=bonifacegroup user-22=wwwevmhonda user-23=straightcurve user-24=wwwletsstalkfood user-25=gifterman user-26=palco123 user-27=phmetals user-28=kottayamcalldriv user-29=mrsclean user-30=wwwnexidigital feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  3 01:21:51 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  3 01:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 01:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 01:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  3 01:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 01:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 01:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-lpIDPwTONlAr4sl1.~
Jan  3 01:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 01:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 01:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-lpIDPwTONlAr4sl1.~'
Jan  3 01:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 01:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 01:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-lpIDPwTONlAr4sl1.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  3 01:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 01:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 01:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  3 01:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 01:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 01:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  3 01:21:51 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 01:21:51 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 01:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  3 01:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 01:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 01:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  3 01:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 01:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 01:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  3 01:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 01:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 01:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  3 01:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 01:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 01:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  3 01:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 01:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 01:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  3 01:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  3 01:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  3 01:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  3 01:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  3 01:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  3 01:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  3 01:21:56 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  3 01:22:00 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  3 01:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  3 01:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 01:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 01:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  3 01:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 01:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 01:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  3 01:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 01:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 01:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  3 01:22:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 01:22:05 host sshd[31063]: User root from 46.101.171.235 not allowed because not listed in AllowUsers
Jan  3 01:22:05 host sshd[31063]: input_userauth_request: invalid user root [preauth]
Jan  3 01:22:05 host unix_chkpwd[31075]: password check failed for user (root)
Jan  3 01:22:05 host sshd[31063]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.171.235  user=root
Jan  3 01:22:05 host sshd[31063]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 01:22:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 01:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  3 01:22:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 01:22:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 01:22:07 host sshd[31063]: Failed password for invalid user root from 46.101.171.235 port 33148 ssh2
Jan  3 01:22:07 host sshd[31063]: Received disconnect from 46.101.171.235 port 33148:11: Bye Bye [preauth]
Jan  3 01:22:07 host sshd[31063]: Disconnected from 46.101.171.235 port 33148 [preauth]
Jan  3 01:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  3 01:22:08 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  3 01:22:14 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  3 01:26:37 host sshd[31746]: User root from 188.166.58.96 not allowed because not listed in AllowUsers
Jan  3 01:26:37 host sshd[31746]: input_userauth_request: invalid user root [preauth]
Jan  3 01:26:37 host unix_chkpwd[31749]: password check failed for user (root)
Jan  3 01:26:37 host sshd[31746]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.58.96  user=root
Jan  3 01:26:37 host sshd[31746]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 01:26:38 host sshd[31746]: Failed password for invalid user root from 188.166.58.96 port 55274 ssh2
Jan  3 01:26:39 host sshd[31746]: Received disconnect from 188.166.58.96 port 55274:11: Bye Bye [preauth]
Jan  3 01:26:39 host sshd[31746]: Disconnected from 188.166.58.96 port 55274 [preauth]
Jan  3 01:26:47 host sshd[31792]: User root from 46.101.171.235 not allowed because not listed in AllowUsers
Jan  3 01:26:47 host sshd[31792]: input_userauth_request: invalid user root [preauth]
Jan  3 01:26:47 host unix_chkpwd[31797]: password check failed for user (root)
Jan  3 01:26:47 host sshd[31792]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.171.235  user=root
Jan  3 01:26:47 host sshd[31792]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 01:26:50 host sshd[31792]: Failed password for invalid user root from 46.101.171.235 port 52056 ssh2
Jan  3 01:26:50 host sshd[31792]: Received disconnect from 46.101.171.235 port 52056:11: Bye Bye [preauth]
Jan  3 01:26:50 host sshd[31792]: Disconnected from 46.101.171.235 port 52056 [preauth]
Jan  3 01:28:33 host sshd[32144]: Invalid user cloud from 162.218.126.136 port 57992
Jan  3 01:28:33 host sshd[32144]: input_userauth_request: invalid user cloud [preauth]
Jan  3 01:28:34 host sshd[32144]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 01:28:34 host sshd[32144]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136
Jan  3 01:28:36 host sshd[32144]: Failed password for invalid user cloud from 162.218.126.136 port 57992 ssh2
Jan  3 01:28:36 host sshd[32144]: Connection closed by 162.218.126.136 port 57992 [preauth]
Jan  3 01:29:13 host sshd[32224]: User root from 200.195.169.59 not allowed because not listed in AllowUsers
Jan  3 01:29:13 host sshd[32224]: input_userauth_request: invalid user root [preauth]
Jan  3 01:29:13 host unix_chkpwd[32229]: password check failed for user (root)
Jan  3 01:29:13 host sshd[32224]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.195.169.59  user=root
Jan  3 01:29:13 host sshd[32224]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 01:29:15 host sshd[32224]: Failed password for invalid user root from 200.195.169.59 port 34094 ssh2
Jan  3 01:29:15 host sshd[32224]: Received disconnect from 200.195.169.59 port 34094:11: Bye Bye [preauth]
Jan  3 01:29:15 host sshd[32224]: Disconnected from 200.195.169.59 port 34094 [preauth]
Jan  3 01:30:51 host sshd[32437]: User root from 200.195.169.59 not allowed because not listed in AllowUsers
Jan  3 01:30:51 host sshd[32437]: input_userauth_request: invalid user root [preauth]
Jan  3 01:30:51 host unix_chkpwd[32440]: password check failed for user (root)
Jan  3 01:30:51 host sshd[32437]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.195.169.59  user=root
Jan  3 01:30:51 host sshd[32437]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 01:30:53 host sshd[32437]: Failed password for invalid user root from 200.195.169.59 port 55076 ssh2
Jan  3 01:30:53 host sshd[32437]: Received disconnect from 200.195.169.59 port 55076:11: Bye Bye [preauth]
Jan  3 01:30:53 host sshd[32437]: Disconnected from 200.195.169.59 port 55076 [preauth]
Jan  3 01:34:22 host sshd[499]: Invalid user user1 from 103.13.40.2 port 47916
Jan  3 01:34:22 host sshd[499]: input_userauth_request: invalid user user1 [preauth]
Jan  3 01:34:22 host sshd[499]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 01:34:22 host sshd[499]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2
Jan  3 01:34:25 host sshd[499]: Failed password for invalid user user1 from 103.13.40.2 port 47916 ssh2
Jan  3 01:34:25 host sshd[499]: Connection closed by 103.13.40.2 port 47916 [preauth]
Jan  3 01:34:57 host sshd[571]: User root from 195.226.194.242 not allowed because not listed in AllowUsers
Jan  3 01:34:57 host sshd[571]: input_userauth_request: invalid user root [preauth]
Jan  3 01:34:58 host sshd[571]: Failed none for invalid user root from 195.226.194.242 port 32018 ssh2
Jan  3 01:34:58 host sshd[571]: Received disconnect from 195.226.194.242 port 32018:11: Bye Bye [preauth]
Jan  3 01:34:58 host sshd[571]: Disconnected from 195.226.194.242 port 32018 [preauth]
Jan  3 01:44:29 host sshd[2004]: Did not receive identification string from 223.245.0.5 port 37710
Jan  3 01:44:31 host sshd[2006]: Invalid user postgres from 223.245.0.5 port 37982
Jan  3 01:44:31 host sshd[2006]: input_userauth_request: invalid user postgres [preauth]
Jan  3 01:44:31 host sshd[2007]: Invalid user web from 223.245.0.5 port 37994
Jan  3 01:44:31 host sshd[2007]: input_userauth_request: invalid user web [preauth]
Jan  3 01:44:31 host sshd[2008]: Invalid user ansible from 223.245.0.5 port 38054
Jan  3 01:44:31 host sshd[2008]: input_userauth_request: invalid user ansible [preauth]
Jan  3 01:44:31 host sshd[2009]: Invalid user postgres from 223.245.0.5 port 37716
Jan  3 01:44:31 host sshd[2009]: input_userauth_request: invalid user postgres [preauth]
Jan  3 01:44:31 host sshd[2010]: Invalid user ubuntu from 223.245.0.5 port 37866
Jan  3 01:44:31 host sshd[2010]: input_userauth_request: invalid user ubuntu [preauth]
Jan  3 01:44:31 host sshd[2013]: Invalid user ansible from 223.245.0.5 port 37990
Jan  3 01:44:31 host sshd[2013]: input_userauth_request: invalid user ansible [preauth]
Jan  3 01:44:31 host sshd[2014]: Invalid user steam from 223.245.0.5 port 37960
Jan  3 01:44:31 host sshd[2014]: input_userauth_request: invalid user steam [preauth]
Jan  3 01:44:31 host sshd[2018]: Invalid user admin from 223.245.0.5 port 37886
Jan  3 01:44:31 host sshd[2018]: input_userauth_request: invalid user admin [preauth]
Jan  3 01:44:31 host sshd[2017]: Invalid user postgres from 223.245.0.5 port 37806
Jan  3 01:44:31 host sshd[2016]: Invalid user admin from 223.245.0.5 port 37844
Jan  3 01:44:31 host sshd[2017]: input_userauth_request: invalid user postgres [preauth]
Jan  3 01:44:31 host sshd[2016]: input_userauth_request: invalid user admin [preauth]
Jan  3 01:44:31 host sshd[2019]: Invalid user mailadmin from 223.245.0.5 port 38032
Jan  3 01:44:31 host sshd[2019]: input_userauth_request: invalid user mailadmin [preauth]
Jan  3 01:44:31 host sshd[2015]: Invalid user user from 223.245.0.5 port 37772
Jan  3 01:44:31 host sshd[2015]: input_userauth_request: invalid user user [preauth]
Jan  3 01:44:31 host sshd[2020]: Invalid user ftpuser from 223.245.0.5 port 37898
Jan  3 01:44:31 host sshd[2020]: input_userauth_request: invalid user ftpuser [preauth]
Jan  3 01:44:31 host sshd[2021]: Invalid user esuser from 223.245.0.5 port 37752
Jan  3 01:44:31 host sshd[2021]: input_userauth_request: invalid user esuser [preauth]
Jan  3 01:44:31 host sshd[2024]: Invalid user ubuntu from 223.245.0.5 port 38026
Jan  3 01:44:31 host sshd[2024]: input_userauth_request: invalid user ubuntu [preauth]
Jan  3 01:44:31 host sshd[2023]: Invalid user zjw from 223.245.0.5 port 37854
Jan  3 01:44:31 host sshd[2023]: input_userauth_request: invalid user zjw [preauth]
Jan  3 01:44:31 host sshd[2025]: Invalid user posiflex from 223.245.0.5 port 38002
Jan  3 01:44:31 host sshd[2025]: input_userauth_request: invalid user posiflex [preauth]
Jan  3 01:44:31 host sshd[2027]: Invalid user devops from 223.245.0.5 port 37838
Jan  3 01:44:31 host sshd[2027]: input_userauth_request: invalid user devops [preauth]
Jan  3 01:44:31 host sshd[2030]: Invalid user steam from 223.245.0.5 port 37880
Jan  3 01:44:31 host sshd[2030]: input_userauth_request: invalid user steam [preauth]
Jan  3 01:44:31 host sshd[2033]: Invalid user ansadmin from 223.245.0.5 port 38082
Jan  3 01:44:31 host sshd[2033]: input_userauth_request: invalid user ansadmin [preauth]
Jan  3 01:44:31 host sshd[2028]: Invalid user user from 223.245.0.5 port 37722
Jan  3 01:44:31 host sshd[2028]: input_userauth_request: invalid user user [preauth]
Jan  3 01:44:31 host sshd[2035]: User ftp from 223.245.0.5 not allowed because not listed in AllowUsers
Jan  3 01:44:31 host sshd[2035]: input_userauth_request: invalid user ftp [preauth]
Jan  3 01:44:31 host sshd[2029]: Invalid user ftpuser from 223.245.0.5 port 37914
Jan  3 01:44:31 host sshd[2029]: input_userauth_request: invalid user ftpuser [preauth]
Jan  3 01:44:31 host sshd[2031]: Invalid user testuser from 223.245.0.5 port 37936
Jan  3 01:44:31 host sshd[2032]: Invalid user tester from 223.245.0.5 port 37738
Jan  3 01:44:31 host sshd[2031]: input_userauth_request: invalid user testuser [preauth]
Jan  3 01:44:31 host sshd[2032]: input_userauth_request: invalid user tester [preauth]
Jan  3 01:44:31 host sshd[2037]: Invalid user teamspeak from 223.245.0.5 port 37928
Jan  3 01:44:31 host sshd[2037]: input_userauth_request: invalid user teamspeak [preauth]
Jan  3 01:44:31 host sshd[2040]: Invalid user esuser from 223.245.0.5 port 37934
Jan  3 01:44:31 host sshd[2034]: Invalid user admin from 223.245.0.5 port 38018
Jan  3 01:44:31 host sshd[2034]: input_userauth_request: invalid user admin [preauth]
Jan  3 01:44:31 host sshd[2040]: input_userauth_request: invalid user esuser [preauth]
Jan  3 01:44:31 host sshd[2036]: Invalid user zjw from 223.245.0.5 port 37948
Jan  3 01:44:31 host sshd[2036]: input_userauth_request: invalid user zjw [preauth]
Jan  3 01:44:31 host sshd[2057]: Invalid user guest from 223.245.0.5 port 38072
Jan  3 01:44:31 host sshd[2057]: input_userauth_request: invalid user guest [preauth]
Jan  3 01:44:31 host sshd[2065]: Invalid user esuser from 223.245.0.5 port 38064
Jan  3 01:44:31 host sshd[2065]: input_userauth_request: invalid user esuser [preauth]
Jan  3 01:44:31 host sshd[2006]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 01:44:31 host sshd[2006]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.245.0.5
Jan  3 01:44:31 host sshd[2007]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 01:44:31 host sshd[2007]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.245.0.5
Jan  3 01:44:31 host sshd[2008]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 01:44:31 host sshd[2008]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.245.0.5
Jan  3 01:44:31 host sshd[2009]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 01:44:31 host sshd[2009]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.245.0.5
Jan  3 01:44:31 host sshd[2010]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 01:44:31 host sshd[2010]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.245.0.5
Jan  3 01:44:31 host sshd[2013]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 01:44:31 host sshd[2013]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.245.0.5
Jan  3 01:44:31 host sshd[2014]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 01:44:31 host sshd[2014]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.245.0.5
Jan  3 01:44:31 host sshd[2018]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 01:44:31 host sshd[2018]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.245.0.5
Jan  3 01:44:31 host sshd[2016]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 01:44:31 host sshd[2016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.245.0.5
Jan  3 01:44:31 host sshd[2017]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 01:44:31 host sshd[2017]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.245.0.5
Jan  3 01:44:31 host sshd[2019]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 01:44:31 host sshd[2019]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.245.0.5
Jan  3 01:44:31 host sshd[2015]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 01:44:31 host sshd[2015]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.245.0.5
Jan  3 01:44:31 host sshd[2020]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 01:44:31 host sshd[2020]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.245.0.5
Jan  3 01:44:31 host sshd[2021]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 01:44:31 host sshd[2021]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.245.0.5
Jan  3 01:44:31 host sshd[2023]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 01:44:31 host sshd[2023]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.245.0.5
Jan  3 01:44:31 host sshd[2024]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 01:44:31 host sshd[2024]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.245.0.5
Jan  3 01:44:31 host sshd[2025]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 01:44:31 host sshd[2025]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.245.0.5
Jan  3 01:44:31 host sshd[2027]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 01:44:31 host sshd[2027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.245.0.5
Jan  3 01:44:31 host sshd[2030]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 01:44:31 host sshd[2030]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.245.0.5
Jan  3 01:44:31 host sshd[2033]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 01:44:31 host sshd[2033]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.245.0.5
Jan  3 01:44:31 host sshd[2028]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 01:44:31 host sshd[2028]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.245.0.5
Jan  3 01:44:31 host sshd[2029]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 01:44:31 host sshd[2029]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.245.0.5
Jan  3 01:44:31 host sshd[2032]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 01:44:31 host sshd[2032]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.245.0.5
Jan  3 01:44:31 host sshd[2031]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 01:44:31 host sshd[2031]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.245.0.5
Jan  3 01:44:31 host unix_chkpwd[2069]: password check failed for user (ftp)
Jan  3 01:44:31 host sshd[2035]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.245.0.5  user=ftp
Jan  3 01:44:31 host sshd[2035]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp"
Jan  3 01:44:31 host sshd[2037]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 01:44:31 host sshd[2037]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.245.0.5
Jan  3 01:44:31 host sshd[2034]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 01:44:31 host sshd[2034]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.245.0.5
Jan  3 01:44:31 host sshd[2040]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 01:44:31 host sshd[2040]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.245.0.5
Jan  3 01:44:31 host sshd[2036]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 01:44:31 host sshd[2036]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.245.0.5
Jan  3 01:44:31 host sshd[2057]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 01:44:31 host sshd[2057]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.245.0.5
Jan  3 01:44:31 host sshd[2065]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 01:44:31 host sshd[2065]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.245.0.5
Jan  3 01:44:33 host sshd[2006]: Failed password for invalid user postgres from 223.245.0.5 port 37982 ssh2
Jan  3 01:44:33 host sshd[2007]: Failed password for invalid user web from 223.245.0.5 port 37994 ssh2
Jan  3 01:44:33 host sshd[2008]: Failed password for invalid user ansible from 223.245.0.5 port 38054 ssh2
Jan  3 01:44:33 host sshd[2009]: Failed password for invalid user postgres from 223.245.0.5 port 37716 ssh2
Jan  3 01:44:33 host sshd[2010]: Failed password for invalid user ubuntu from 223.245.0.5 port 37866 ssh2
Jan  3 01:44:33 host sshd[2013]: Failed password for invalid user ansible from 223.245.0.5 port 37990 ssh2
Jan  3 01:44:33 host sshd[2014]: Failed password for invalid user steam from 223.245.0.5 port 37960 ssh2
Jan  3 01:44:33 host sshd[2018]: Failed password for invalid user admin from 223.245.0.5 port 37886 ssh2
Jan  3 01:44:33 host sshd[2016]: Failed password for invalid user admin from 223.245.0.5 port 37844 ssh2
Jan  3 01:44:33 host sshd[2017]: Failed password for invalid user postgres from 223.245.0.5 port 37806 ssh2
Jan  3 01:44:33 host sshd[2019]: Failed password for invalid user mailadmin from 223.245.0.5 port 38032 ssh2
Jan  3 01:44:33 host sshd[2015]: Failed password for invalid user user from 223.245.0.5 port 37772 ssh2
Jan  3 01:44:33 host sshd[2020]: Failed password for invalid user ftpuser from 223.245.0.5 port 37898 ssh2
Jan  3 01:44:33 host sshd[2021]: Failed password for invalid user esuser from 223.245.0.5 port 37752 ssh2
Jan  3 01:44:33 host sshd[2023]: Failed password for invalid user zjw from 223.245.0.5 port 37854 ssh2
Jan  3 01:44:33 host sshd[2024]: Failed password for invalid user ubuntu from 223.245.0.5 port 38026 ssh2
Jan  3 01:44:33 host sshd[2025]: Failed password for invalid user posiflex from 223.245.0.5 port 38002 ssh2
Jan  3 01:44:33 host sshd[2027]: Failed password for invalid user devops from 223.245.0.5 port 37838 ssh2
Jan  3 01:44:33 host sshd[2030]: Failed password for invalid user steam from 223.245.0.5 port 37880 ssh2
Jan  3 01:44:33 host sshd[2033]: Failed password for invalid user ansadmin from 223.245.0.5 port 38082 ssh2
Jan  3 01:44:33 host sshd[2028]: Failed password for invalid user user from 223.245.0.5 port 37722 ssh2
Jan  3 01:44:33 host sshd[2029]: Failed password for invalid user ftpuser from 223.245.0.5 port 37914 ssh2
Jan  3 01:44:33 host sshd[2032]: Failed password for invalid user tester from 223.245.0.5 port 37738 ssh2
Jan  3 01:44:33 host sshd[2031]: Failed password for invalid user testuser from 223.245.0.5 port 37936 ssh2
Jan  3 01:44:33 host sshd[2035]: Failed password for invalid user ftp from 223.245.0.5 port 37962 ssh2
Jan  3 01:44:33 host sshd[2037]: Failed password for invalid user teamspeak from 223.245.0.5 port 37928 ssh2
Jan  3 01:44:33 host sshd[2034]: Failed password for invalid user admin from 223.245.0.5 port 38018 ssh2
Jan  3 01:44:33 host sshd[2040]: Failed password for invalid user esuser from 223.245.0.5 port 37934 ssh2
Jan  3 01:44:33 host sshd[2036]: Failed password for invalid user zjw from 223.245.0.5 port 37948 ssh2
Jan  3 01:44:33 host sshd[2057]: Failed password for invalid user guest from 223.245.0.5 port 38072 ssh2
Jan  3 01:44:33 host sshd[2065]: Failed password for invalid user esuser from 223.245.0.5 port 38064 ssh2
Jan  3 01:44:33 host sshd[2006]: Connection closed by 223.245.0.5 port 37982 [preauth]
Jan  3 01:44:33 host sshd[2007]: Connection closed by 223.245.0.5 port 37994 [preauth]
Jan  3 01:44:33 host sshd[2008]: Connection closed by 223.245.0.5 port 38054 [preauth]
Jan  3 01:44:33 host sshd[2009]: Connection closed by 223.245.0.5 port 37716 [preauth]
Jan  3 01:44:33 host sshd[2010]: Connection closed by 223.245.0.5 port 37866 [preauth]
Jan  3 01:44:33 host sshd[2013]: Connection closed by 223.245.0.5 port 37990 [preauth]
Jan  3 01:44:33 host sshd[2014]: Connection closed by 223.245.0.5 port 37960 [preauth]
Jan  3 01:44:33 host sshd[2018]: Connection closed by 223.245.0.5 port 37886 [preauth]
Jan  3 01:44:33 host sshd[2016]: Connection closed by 223.245.0.5 port 37844 [preauth]
Jan  3 01:44:33 host sshd[2017]: Connection closed by 223.245.0.5 port 37806 [preauth]
Jan  3 01:44:33 host sshd[2015]: Connection closed by 223.245.0.5 port 37772 [preauth]
Jan  3 01:44:33 host sshd[2019]: Connection closed by 223.245.0.5 port 38032 [preauth]
Jan  3 01:44:33 host sshd[2020]: Connection closed by 223.245.0.5 port 37898 [preauth]
Jan  3 01:44:33 host sshd[2021]: Connection closed by 223.245.0.5 port 37752 [preauth]
Jan  3 01:44:33 host sshd[2023]: Connection closed by 223.245.0.5 port 37854 [preauth]
Jan  3 01:44:33 host sshd[2024]: Connection closed by 223.245.0.5 port 38026 [preauth]
Jan  3 01:44:33 host sshd[2025]: Connection closed by 223.245.0.5 port 38002 [preauth]
Jan  3 01:44:33 host sshd[2027]: Connection closed by 223.245.0.5 port 37838 [preauth]
Jan  3 01:44:33 host sshd[2030]: Connection closed by 223.245.0.5 port 37880 [preauth]
Jan  3 01:44:33 host sshd[2028]: Connection closed by 223.245.0.5 port 37722 [preauth]
Jan  3 01:44:33 host sshd[2033]: Connection closed by 223.245.0.5 port 38082 [preauth]
Jan  3 01:44:33 host sshd[2029]: Connection closed by 223.245.0.5 port 37914 [preauth]
Jan  3 01:44:33 host sshd[2032]: Connection closed by 223.245.0.5 port 37738 [preauth]
Jan  3 01:44:33 host sshd[2031]: Connection closed by 223.245.0.5 port 37936 [preauth]
Jan  3 01:44:33 host sshd[2035]: Connection closed by 223.245.0.5 port 37962 [preauth]
Jan  3 01:44:33 host sshd[2037]: Connection closed by 223.245.0.5 port 37928 [preauth]
Jan  3 01:44:33 host sshd[2034]: Connection closed by 223.245.0.5 port 38018 [preauth]
Jan  3 01:44:33 host sshd[2036]: Connection closed by 223.245.0.5 port 37948 [preauth]
Jan  3 01:44:33 host sshd[2040]: Connection closed by 223.245.0.5 port 37934 [preauth]
Jan  3 01:44:33 host sshd[2057]: Connection closed by 223.245.0.5 port 38072 [preauth]
Jan  3 01:44:33 host sshd[2065]: Connection closed by 223.245.0.5 port 38064 [preauth]
Jan  3 02:00:13 host sshd[4591]: Connection closed by 107.170.250.19 port 47178 [preauth]
Jan  3 02:01:32 host sshd[4895]: Invalid user penghang from 41.197.31.178 port 59314
Jan  3 02:01:32 host sshd[4895]: input_userauth_request: invalid user penghang [preauth]
Jan  3 02:01:32 host sshd[4895]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 02:01:32 host sshd[4895]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178
Jan  3 02:01:34 host sshd[4895]: Failed password for invalid user penghang from 41.197.31.178 port 59314 ssh2
Jan  3 02:01:34 host sshd[4895]: Connection closed by 41.197.31.178 port 59314 [preauth]
Jan  3 02:04:45 host sshd[5365]: Invalid user minecraft from 195.226.194.242 port 43432
Jan  3 02:04:45 host sshd[5365]: input_userauth_request: invalid user minecraft [preauth]
Jan  3 02:04:46 host sshd[5365]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 02:04:46 host sshd[5365]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.242
Jan  3 02:04:48 host sshd[5365]: Failed password for invalid user minecraft from 195.226.194.242 port 43432 ssh2
Jan  3 02:04:48 host sshd[5365]: Received disconnect from 195.226.194.242 port 43432:11: Bye Bye [preauth]
Jan  3 02:04:48 host sshd[5365]: Disconnected from 195.226.194.242 port 43432 [preauth]
Jan  3 02:13:30 host sshd[6763]: User root from 118.43.95.157 not allowed because not listed in AllowUsers
Jan  3 02:13:30 host sshd[6763]: input_userauth_request: invalid user root [preauth]
Jan  3 02:13:30 host unix_chkpwd[6766]: password check failed for user (root)
Jan  3 02:13:30 host sshd[6763]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.43.95.157  user=root
Jan  3 02:13:30 host sshd[6763]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 02:13:33 host sshd[6763]: Failed password for invalid user root from 118.43.95.157 port 35450 ssh2
Jan  3 02:13:33 host sshd[6763]: Received disconnect from 118.43.95.157 port 35450:11: Bye Bye [preauth]
Jan  3 02:13:33 host sshd[6763]: Disconnected from 118.43.95.157 port 35450 [preauth]
Jan  3 02:14:18 host sshd[6871]: User root from 104.236.111.25 not allowed because not listed in AllowUsers
Jan  3 02:14:18 host sshd[6871]: input_userauth_request: invalid user root [preauth]
Jan  3 02:14:18 host unix_chkpwd[6874]: password check failed for user (root)
Jan  3 02:14:18 host sshd[6871]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.111.25  user=root
Jan  3 02:14:18 host sshd[6871]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 02:14:20 host sshd[6871]: Failed password for invalid user root from 104.236.111.25 port 33690 ssh2
Jan  3 02:14:20 host sshd[6871]: Received disconnect from 104.236.111.25 port 33690:11: Bye Bye [preauth]
Jan  3 02:14:20 host sshd[6871]: Disconnected from 104.236.111.25 port 33690 [preauth]
Jan  3 02:14:25 host sshd[6882]: User root from 137.184.2.1 not allowed because not listed in AllowUsers
Jan  3 02:14:25 host sshd[6882]: input_userauth_request: invalid user root [preauth]
Jan  3 02:14:26 host unix_chkpwd[6908]: password check failed for user (root)
Jan  3 02:14:26 host sshd[6882]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.2.1  user=root
Jan  3 02:14:26 host sshd[6882]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 02:14:28 host sshd[6882]: Failed password for invalid user root from 137.184.2.1 port 39988 ssh2
Jan  3 02:14:28 host sshd[6882]: Received disconnect from 137.184.2.1 port 39988:11: Bye Bye [preauth]
Jan  3 02:14:28 host sshd[6882]: Disconnected from 137.184.2.1 port 39988 [preauth]
Jan  3 02:15:13 host sshd[7045]: User root from 196.189.89.250 not allowed because not listed in AllowUsers
Jan  3 02:15:13 host sshd[7045]: input_userauth_request: invalid user root [preauth]
Jan  3 02:15:13 host unix_chkpwd[7048]: password check failed for user (root)
Jan  3 02:15:13 host sshd[7045]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.189.89.250  user=root
Jan  3 02:15:13 host sshd[7045]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 02:15:15 host sshd[7045]: Failed password for invalid user root from 196.189.89.250 port 18333 ssh2
Jan  3 02:15:15 host sshd[7045]: Received disconnect from 196.189.89.250 port 18333:11: Bye Bye [preauth]
Jan  3 02:15:15 host sshd[7045]: Disconnected from 196.189.89.250 port 18333 [preauth]
Jan  3 02:15:40 host sshd[7117]: User root from 134.17.16.92 not allowed because not listed in AllowUsers
Jan  3 02:15:40 host sshd[7117]: input_userauth_request: invalid user root [preauth]
Jan  3 02:15:40 host unix_chkpwd[7124]: password check failed for user (root)
Jan  3 02:15:40 host sshd[7117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.17.16.92  user=root
Jan  3 02:15:40 host sshd[7117]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 02:15:41 host sshd[7121]: User root from 46.219.39.19 not allowed because not listed in AllowUsers
Jan  3 02:15:41 host sshd[7121]: input_userauth_request: invalid user root [preauth]
Jan  3 02:15:41 host unix_chkpwd[7126]: password check failed for user (root)
Jan  3 02:15:41 host sshd[7121]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.219.39.19  user=root
Jan  3 02:15:41 host sshd[7121]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 02:15:42 host sshd[7117]: Failed password for invalid user root from 134.17.16.92 port 33471 ssh2
Jan  3 02:15:43 host sshd[7117]: Received disconnect from 134.17.16.92 port 33471:11: Bye Bye [preauth]
Jan  3 02:15:43 host sshd[7117]: Disconnected from 134.17.16.92 port 33471 [preauth]
Jan  3 02:15:43 host sshd[7121]: Failed password for invalid user root from 46.219.39.19 port 36572 ssh2
Jan  3 02:15:43 host sshd[7121]: Received disconnect from 46.219.39.19 port 36572:11: Bye Bye [preauth]
Jan  3 02:15:43 host sshd[7121]: Disconnected from 46.219.39.19 port 36572 [preauth]
Jan  3 02:18:15 host sshd[7551]: User root from 134.17.16.92 not allowed because not listed in AllowUsers
Jan  3 02:18:15 host sshd[7551]: input_userauth_request: invalid user root [preauth]
Jan  3 02:18:15 host unix_chkpwd[7553]: password check failed for user (root)
Jan  3 02:18:15 host sshd[7551]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.17.16.92  user=root
Jan  3 02:18:15 host sshd[7551]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 02:18:17 host sshd[7551]: Failed password for invalid user root from 134.17.16.92 port 33474 ssh2
Jan  3 02:19:38 host sshd[7766]: User root from 137.184.2.1 not allowed because not listed in AllowUsers
Jan  3 02:19:38 host sshd[7766]: input_userauth_request: invalid user root [preauth]
Jan  3 02:19:38 host unix_chkpwd[7770]: password check failed for user (root)
Jan  3 02:19:38 host sshd[7766]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.2.1  user=root
Jan  3 02:19:38 host sshd[7766]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 02:19:40 host sshd[7766]: Failed password for invalid user root from 137.184.2.1 port 39162 ssh2
Jan  3 02:19:40 host sshd[7766]: Received disconnect from 137.184.2.1 port 39162:11: Bye Bye [preauth]
Jan  3 02:19:40 host sshd[7766]: Disconnected from 137.184.2.1 port 39162 [preauth]
Jan  3 02:20:10 host sshd[7875]: User root from 118.43.95.157 not allowed because not listed in AllowUsers
Jan  3 02:20:10 host sshd[7875]: input_userauth_request: invalid user root [preauth]
Jan  3 02:20:10 host unix_chkpwd[7879]: password check failed for user (root)
Jan  3 02:20:10 host sshd[7875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.43.95.157  user=root
Jan  3 02:20:10 host sshd[7875]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 02:20:12 host sshd[7875]: Failed password for invalid user root from 118.43.95.157 port 38550 ssh2
Jan  3 02:20:21 host sshd[7936]: User root from 104.236.111.25 not allowed because not listed in AllowUsers
Jan  3 02:20:21 host sshd[7936]: input_userauth_request: invalid user root [preauth]
Jan  3 02:20:21 host unix_chkpwd[7941]: password check failed for user (root)
Jan  3 02:20:21 host sshd[7936]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.111.25  user=root
Jan  3 02:20:21 host sshd[7936]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 02:20:23 host sshd[7936]: Failed password for invalid user root from 104.236.111.25 port 34122 ssh2
Jan  3 02:20:34 host sshd[8022]: User root from 222.98.101.138 not allowed because not listed in AllowUsers
Jan  3 02:20:34 host sshd[8022]: input_userauth_request: invalid user root [preauth]
Jan  3 02:20:35 host unix_chkpwd[8025]: password check failed for user (root)
Jan  3 02:20:35 host sshd[8022]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.98.101.138  user=root
Jan  3 02:20:35 host sshd[8022]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 02:20:36 host sshd[8022]: Failed password for invalid user root from 222.98.101.138 port 48238 ssh2
Jan  3 02:20:37 host sshd[8022]: Received disconnect from 222.98.101.138 port 48238:11: Bye Bye [preauth]
Jan  3 02:20:37 host sshd[8022]: Disconnected from 222.98.101.138 port 48238 [preauth]
Jan  3 02:20:48 host sshd[8044]: User root from 46.219.39.19 not allowed because not listed in AllowUsers
Jan  3 02:20:48 host sshd[8044]: input_userauth_request: invalid user root [preauth]
Jan  3 02:20:48 host unix_chkpwd[8046]: password check failed for user (root)
Jan  3 02:20:48 host sshd[8044]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.219.39.19  user=root
Jan  3 02:20:48 host sshd[8044]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 02:20:50 host sshd[8044]: Failed password for invalid user root from 46.219.39.19 port 33378 ssh2
Jan  3 02:20:50 host sshd[8044]: Received disconnect from 46.219.39.19 port 33378:11: Bye Bye [preauth]
Jan  3 02:20:50 host sshd[8044]: Disconnected from 46.219.39.19 port 33378 [preauth]
Jan  3 02:20:56 host sshd[8086]: User root from 196.189.89.250 not allowed because not listed in AllowUsers
Jan  3 02:20:56 host sshd[8086]: input_userauth_request: invalid user root [preauth]
Jan  3 02:20:56 host unix_chkpwd[8089]: password check failed for user (root)
Jan  3 02:20:56 host sshd[8086]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.189.89.250  user=root
Jan  3 02:20:56 host sshd[8086]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 02:20:58 host sshd[8086]: Failed password for invalid user root from 196.189.89.250 port 4384 ssh2
Jan  3 02:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  3 02:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  3 02:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  3 02:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  3 02:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  3 02:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  3 02:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  3 02:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  3 02:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  3 02:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  3 02:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  3 02:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  3 02:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  3 02:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=ugotscom user-3=wwwrmswll user-4=keralaholi user-5=wwwresourcehunte user-6=travelboniface user-7=wwwkaretakers user-8=cochintaxi user-9=laundryboniface user-10=dartsimp user-11=a2zgroup user-12=straightcurve user-13=wwwletsstalkfood user-14=wwwevmhonda user-15=bonifacegroup user-16=wwwnexidigital user-17=mrsclean user-18=phmetals user-19=kottayamcalldriv user-20=gifterman user-21=palco123 user-22=woodpeck user-23=wwwkapin user-24=disposeat user-25=wwwkmaorg user-26=remysagr user-27=pmcresources user-28=wwwtestugo user-29=shalinijames user-30=vfmassets feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  3 02:21:50 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  3 02:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  3 02:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-yYlpxatihPzz7Iyp.~
Jan  3 02:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-yYlpxatihPzz7Iyp.~'
Jan  3 02:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-yYlpxatihPzz7Iyp.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  3 02:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  3 02:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  3 02:21:51 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 02:21:51 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 02:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  3 02:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  3 02:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  3 02:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  3 02:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  3 02:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  3 02:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  3 02:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  3 02:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  3 02:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  3 02:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  3 02:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  3 02:22:01 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  3 02:22:03 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  3 02:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  3 02:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  3 02:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  3 02:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  3 02:22:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 02:22:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 02:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  3 02:22:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 02:22:17 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 02:22:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  3 02:22:18 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  3 02:22:19 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  3 02:23:56 host sshd[8769]: Invalid user oracle from 106.10.122.53 port 48444
Jan  3 02:23:56 host sshd[8769]: input_userauth_request: invalid user oracle [preauth]
Jan  3 02:23:56 host sshd[8769]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 02:23:56 host sshd[8769]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53
Jan  3 02:23:58 host sshd[8769]: Failed password for invalid user oracle from 106.10.122.53 port 48444 ssh2
Jan  3 02:23:58 host sshd[8769]: Connection closed by 106.10.122.53 port 48444 [preauth]
Jan  3 02:26:04 host sshd[9037]: User root from 222.98.101.138 not allowed because not listed in AllowUsers
Jan  3 02:26:04 host sshd[9037]: input_userauth_request: invalid user root [preauth]
Jan  3 02:26:04 host unix_chkpwd[9041]: password check failed for user (root)
Jan  3 02:26:04 host sshd[9037]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.98.101.138  user=root
Jan  3 02:26:04 host sshd[9037]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 02:26:06 host sshd[9037]: Failed password for invalid user root from 222.98.101.138 port 58028 ssh2
Jan  3 02:26:06 host sshd[9037]: Received disconnect from 222.98.101.138 port 58028:11: Bye Bye [preauth]
Jan  3 02:26:06 host sshd[9037]: Disconnected from 222.98.101.138 port 58028 [preauth]
Jan  3 02:29:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  3 02:29:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:29:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:29:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  3 02:29:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:29:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:29:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  3 02:29:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:29:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:29:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  3 02:29:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:29:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:29:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  3 02:29:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:29:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:29:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwletsstalkfood user-2=straightcurve user-3=wwwevmhonda user-4=bonifacegroup user-5=mrsclean user-6=wwwnexidigital user-7=kottayamcalldriv user-8=phmetals user-9=gifterman user-10=palco123 user-11=woodpeck user-12=wwwkapin user-13=remysagr user-14=disposeat user-15=wwwkmaorg user-16=pmcresources user-17=wwwtestugo user-18=shalinijames user-19=vfmassets user-20=wwwpmcresource user-21=ugotscom user-22=wwwrmswll user-23=keralaholi user-24=wwwresourcehunte user-25=travelboniface user-26=cochintaxi user-27=wwwkaretakers user-28=laundryboniface user-29=dartsimp user-30=a2zgroup feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  3 02:29:49 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  3 02:29:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:29:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:29:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwevmhonda --output=json
Jan  3 02:29:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:29:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:29:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color instance info --format=json --check-updates=true
Jan  3 02:29:49 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  3 02:29:53 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  3 02:29:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false
Jan  3 02:29:53 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  3 02:29:54 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  3 02:29:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false
Jan  3 02:29:54 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  3 02:29:57 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  3 02:29:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  3 02:29:57 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  3 02:29:57 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  3 02:29:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwevmhonda LangPHP php_get_vhost_versions --output=json
Jan  3 02:29:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:29:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:29:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 package_manager_get_package_info package-0=ea-php72 --output=json
Jan  3 02:29:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:29:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:29:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color instance login-url --skip-plugins=false --format=json
Jan  3 02:29:58 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  3 02:29:59 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  3 02:29:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwletsstalkfood --output=json
Jan  3 02:29:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:29:59 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:29:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color instance info --format=json --check-updates=true
Jan  3 02:29:59 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  3 02:30:05 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  3 02:30:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false
Jan  3 02:30:05 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  3 02:30:07 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  3 02:30:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false
Jan  3 02:30:07 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  3 02:30:12 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  3 02:30:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  3 02:30:12 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  3 02:30:12 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  3 02:30:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood LangPHP php_get_vhost_versions --output=json
Jan  3 02:30:12 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:30:13 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:30:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color instance login-url --skip-plugins=false --format=json
Jan  3 02:30:13 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  3 02:30:13 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  3 02:30:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood DomainInfo single_domain_data domain=letsstalkfood.com return_https_redirect_status=1 --output=json
Jan  3 02:30:13 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:30:13 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:30:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 fetch_vhost_ssl_components --output=json
Jan  3 02:30:13 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:30:14 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:30:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 fetch_ssl_vhosts --output=json
Jan  3 02:30:14 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:30:14 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:30:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood Mime list_redirects --output=json
Jan  3 02:30:14 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:30:14 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:30:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  3 02:30:14 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  3 02:30:16 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  3 02:30:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false
Jan  3 02:30:16 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  3 02:30:17 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  3 02:30:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  3 02:30:17 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  3 02:30:22 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  3 02:30:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false
Jan  3 02:30:22 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  3 02:30:28 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  3 02:30:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/public_html/wp-config.php
Jan  3 02:30:28 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  3 02:30:28 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  3 02:30:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  3 02:30:28 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  3 02:30:29 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  3 02:30:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/public_html/.maintenance
Jan  3 02:30:29 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  3 02:30:29 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  3 02:30:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color db-prefix get
Jan  3 02:30:29 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  3 02:30:29 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  3 02:30:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood DirectoryPrivacy is_directory_protected dir=/home/wwwletsstalkfood/public_html --output=json
Jan  3 02:30:29 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:30:29 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:30:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  3 02:30:29 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  3 02:30:30 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  3 02:30:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color wpt-cron event reschedule wp_version_check '+2 day'
Jan  3 02:30:30 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  3 02:30:30 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  3 02:30:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day'
Jan  3 02:30:30 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  3 02:30:31 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  3 02:30:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  3 02:30:31 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  3 02:30:31 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  3 02:30:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  3 02:30:31 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  3 02:30:32 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  3 02:30:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color admin-username is-secure
Jan  3 02:30:32 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  3 02:30:32 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  3 02:30:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  3 02:30:32 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  3 02:30:33 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  3 02:30:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/public_html/wp-config.php
Jan  3 02:30:33 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  3 02:30:33 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  3 02:30:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/stat -c %a /home/wwwletsstalkfood/public_html/wp-config.php
Jan  3 02:30:33 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  3 02:30:33 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  3 02:30:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color pingbacks is_disabled
Jan  3 02:30:33 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  3 02:30:33 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  3 02:30:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  3 02:30:33 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  3 02:30:34 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  3 02:30:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color security-keys are_keys_correct
Jan  3 02:30:34 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  3 02:30:34 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  3 02:30:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=mrsclean --output=json
Jan  3 02:30:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:30:34 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:30:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/backup && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/mrsclean/public_html/backup --no-color instance info --format=json --check-updates=true
Jan  3 02:30:34 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  3 02:30:35 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  3 02:30:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean DomainInfo single_domain_data domain=mrsclean.co.in return_https_redirect_status=1 --output=json
Jan  3 02:30:35 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:30:35 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:30:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean Mime list_redirects --output=json
Jan  3 02:30:35 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:30:35 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:30:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/public_html/backup/wp-includes/version.php
Jan  3 02:30:35 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  3 02:30:35 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  3 02:30:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/cat /home/mrsclean/public_html/backup/wp-includes/version.php
Jan  3 02:30:35 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  3 02:30:35 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  3 02:30:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  3 02:30:35 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  3 02:30:35 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  3 02:30:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean LangPHP php_get_vhost_versions --output=json
Jan  3 02:30:35 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:30:35 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:30:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  3 02:30:35 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 02:30:35 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 02:30:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/blog && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/mrsclean/public_html/blog --no-color instance info --format=json --check-updates=true
Jan  3 02:30:35 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  3 02:30:35 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  3 02:30:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/public_html/blog/wp-includes/version.php
Jan  3 02:30:35 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  3 02:30:35 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  3 02:30:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/cat /home/mrsclean/public_html/blog/wp-includes/version.php
Jan  3 02:30:36 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  3 02:30:36 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  3 02:30:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  3 02:30:36 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  3 02:30:36 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  3 02:30:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=shalinijames --output=json
Jan  3 02:30:36 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:30:36 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:30:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color instance info --format=json --check-updates=true
Jan  3 02:30:36 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  3 02:30:43 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  3 02:30:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option get auto_update_plugins --format=json
Jan  3 02:30:43 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  3 02:30:44 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  3 02:30:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option get auto_update_themes --format=json
Jan  3 02:30:44 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  3 02:30:44 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  3 02:30:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  3 02:30:44 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  3 02:30:44 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  3 02:30:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames LangPHP php_get_vhost_versions --output=json
Jan  3 02:30:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:30:44 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:30:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color instance login-url --skip-plugins=false --format=json
Jan  3 02:30:44 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  3 02:30:45 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  3 02:30:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames DomainInfo single_domain_data domain=shalinijames.com return_https_redirect_status=1 --output=json
Jan  3 02:30:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:30:45 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:30:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames Mime list_redirects --output=json
Jan  3 02:30:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:30:45 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:30:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  3 02:30:45 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  3 02:30:47 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  3 02:30:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option get auto_update_plugins --format=json
Jan  3 02:30:47 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  3 02:30:47 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  3 02:30:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  3 02:30:47 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  3 02:30:52 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  3 02:30:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option get auto_update_themes --format=json
Jan  3 02:30:52 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  3 02:30:52 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  3 02:30:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/public_html/wp-config.php
Jan  3 02:30:52 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  3 02:30:52 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  3 02:30:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  3 02:30:53 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  3 02:30:53 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  3 02:30:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/public_html/.maintenance
Jan  3 02:30:53 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  3 02:30:53 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  3 02:30:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color db-prefix get
Jan  3 02:30:53 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  3 02:30:53 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  3 02:30:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames DirectoryPrivacy is_directory_protected dir=/home/shalinijames/public_html --output=json
Jan  3 02:30:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:30:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:30:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  3 02:30:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  3 02:30:54 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  3 02:30:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color wpt-cron event reschedule wp_version_check '+2 day'
Jan  3 02:30:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  3 02:30:55 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  3 02:30:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day'
Jan  3 02:30:55 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  3 02:30:55 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  3 02:30:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  3 02:30:55 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  3 02:30:55 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  3 02:30:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  3 02:30:55 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  3 02:30:56 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  3 02:30:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color admin-username is-secure
Jan  3 02:30:56 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  3 02:30:56 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  3 02:30:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  3 02:30:56 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  3 02:30:57 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  3 02:30:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/public_html/wp-config.php
Jan  3 02:30:57 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  3 02:30:57 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  3 02:30:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/stat -c %a /home/shalinijames/public_html/wp-config.php
Jan  3 02:30:57 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  3 02:30:57 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  3 02:30:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color pingbacks is_disabled
Jan  3 02:30:57 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  3 02:30:57 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  3 02:30:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  3 02:30:57 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  3 02:30:58 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  3 02:30:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color security-keys are_keys_correct
Jan  3 02:30:58 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  3 02:30:58 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  3 02:30:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwtestugo --output=json
Jan  3 02:30:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:30:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:30:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color instance info --format=json --check-updates=true
Jan  3 02:30:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option get auto_update_plugins --format=json
Jan  3 02:31:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option get auto_update_themes --format=json
Jan  3 02:31:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  3 02:31:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo LangPHP php_get_vhost_versions --output=json
Jan  3 02:31:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:31:06 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:31:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color instance login-url --skip-plugins=false --format=json
Jan  3 02:31:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DomainInfo single_domain_data domain=testugo.in return_https_redirect_status=1 --output=json
Jan  3 02:31:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:31:06 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:31:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo Mime list_redirects --output=json
Jan  3 02:31:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:31:07 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:31:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  3 02:31:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option get auto_update_plugins --format=json
Jan  3 02:31:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  3 02:31:08 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:11 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option get auto_update_themes --format=json
Jan  3 02:31:11 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt1/wp-config.php
Jan  3 02:31:12 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  3 02:31:12 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt1/.maintenance
Jan  3 02:31:12 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color db-prefix get
Jan  3 02:31:12 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:13 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/tt1 --output=json
Jan  3 02:31:13 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:31:13 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:31:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  3 02:31:13 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:13 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color wpt-cron event reschedule wp_version_check '+2 day'
Jan  3 02:31:14 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:14 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day'
Jan  3 02:31:14 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:14 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  3 02:31:14 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:15 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  3 02:31:15 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:15 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color admin-username is-secure
Jan  3 02:31:15 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:16 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  3 02:31:16 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:16 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt1/wp-config.php
Jan  3 02:31:16 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:16 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/stat -c %a /home/wwwtestugo/public_html/tt1/wp-config.php
Jan  3 02:31:16 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:16 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color pingbacks is_disabled
Jan  3 02:31:16 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:17 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  3 02:31:17 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:17 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color security-keys are_keys_correct
Jan  3 02:31:17 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:17 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color instance info --format=json --check-updates=true
Jan  3 02:31:17 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:22 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option get auto_update_plugins --format=json
Jan  3 02:31:22 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:22 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option get auto_update_themes --format=json
Jan  3 02:31:22 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:23 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  3 02:31:23 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:23 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color instance login-url --skip-plugins=false --format=json
Jan  3 02:31:23 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:23 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  3 02:31:24 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:24 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option get auto_update_plugins --format=json
Jan  3 02:31:24 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:24 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  3 02:31:24 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:28 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option get auto_update_themes --format=json
Jan  3 02:31:28 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:29 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt/wp-config.php
Jan  3 02:31:29 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:29 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  3 02:31:29 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:29 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt/.maintenance
Jan  3 02:31:29 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:29 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color db-prefix get
Jan  3 02:31:29 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:29 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/tt --output=json
Jan  3 02:31:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:31:30 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:31:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  3 02:31:30 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:30 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color wpt-cron event reschedule wp_version_check '+2 day'
Jan  3 02:31:30 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:31 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day'
Jan  3 02:31:31 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:31 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  3 02:31:31 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:31 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  3 02:31:31 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:32 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color admin-username is-secure
Jan  3 02:31:32 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:32 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  3 02:31:32 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:33 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt/wp-config.php
Jan  3 02:31:33 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:33 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/stat -c %a /home/wwwtestugo/public_html/tt/wp-config.php
Jan  3 02:31:33 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:33 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color pingbacks is_disabled
Jan  3 02:31:33 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:33 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  3 02:31:33 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:33 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color security-keys are_keys_correct
Jan  3 02:31:34 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:34 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color instance info --format=json --check-updates=true
Jan  3 02:31:34 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:38 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option get auto_update_plugins --format=json
Jan  3 02:31:38 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:39 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:39 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option get auto_update_themes --format=json
Jan  3 02:31:39 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:39 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:39 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  3 02:31:39 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:39 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:39 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color instance login-url --skip-plugins=false --format=json
Jan  3 02:31:39 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:41 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  3 02:31:41 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:41 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option get auto_update_plugins --format=json
Jan  3 02:31:41 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:42 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  3 02:31:42 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:45 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option get auto_update_themes --format=json
Jan  3 02:31:45 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:46 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/HYPE/wp-config.php
Jan  3 02:31:46 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:46 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  3 02:31:46 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:46 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/HYPE/.maintenance
Jan  3 02:31:46 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:46 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color db-prefix get
Jan  3 02:31:46 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:47 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/HYPE --output=json
Jan  3 02:31:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:31:47 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:31:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  3 02:31:47 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:47 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color wpt-cron event reschedule wp_version_check '+2 day'
Jan  3 02:31:48 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:48 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day'
Jan  3 02:31:48 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:48 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  3 02:31:48 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:49 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  3 02:31:49 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:49 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color admin-username is-secure
Jan  3 02:31:49 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:50 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  3 02:31:50 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:50 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/HYPE/wp-config.php
Jan  3 02:31:50 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:50 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/stat -c %a /home/wwwtestugo/public_html/HYPE/wp-config.php
Jan  3 02:31:50 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:50 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color pingbacks is_disabled
Jan  3 02:31:50 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:50 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  3 02:31:50 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:51 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color security-keys are_keys_correct
Jan  3 02:31:51 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:31:51 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:31:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=ugotscom --output=json
Jan  3 02:31:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:31:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:31:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/boniface/blog && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/boniface/blog --no-color instance info --format=json --check-updates=true
Jan  3 02:31:51 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 02:31:52 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 02:31:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DomainInfo single_domain_data domain=ugotechnologies.com return_https_redirect_status=1 --output=json
Jan  3 02:31:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:31:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:31:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom Mime list_redirects --output=json
Jan  3 02:31:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:31:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:31:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/boniface/blog/wp-includes/version.php
Jan  3 02:31:52 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 02:31:52 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 02:31:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/public_html/boniface/blog/wp-includes/version.php
Jan  3 02:31:52 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 02:31:52 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 02:31:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  3 02:31:52 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 02:31:52 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 02:31:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom LangPHP php_get_vhost_versions --output=json
Jan  3 02:31:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:31:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:31:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color instance info --format=json --check-updates=true
Jan  3 02:31:52 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 02:32:00 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 02:32:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option get auto_update_plugins --format=json
Jan  3 02:32:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 02:32:00 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 02:32:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option get auto_update_themes --format=json
Jan  3 02:32:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 02:32:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 02:32:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  3 02:32:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 02:32:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 02:32:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color instance login-url --skip-plugins=false --format=json
Jan  3 02:32:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 02:32:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 02:32:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  3 02:32:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 02:32:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 02:32:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option get auto_update_plugins --format=json
Jan  3 02:32:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 02:32:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 02:32:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  3 02:32:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 02:32:05 host sshd[11580]: Invalid user xwang from 162.218.126.136 port 35818
Jan  3 02:32:05 host sshd[11580]: input_userauth_request: invalid user xwang [preauth]
Jan  3 02:32:06 host sshd[11580]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 02:32:06 host sshd[11580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136
Jan  3 02:32:08 host sshd[11580]: Failed password for invalid user xwang from 162.218.126.136 port 35818 ssh2
Jan  3 02:32:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 02:32:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option get auto_update_themes --format=json
Jan  3 02:32:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 02:32:08 host sshd[11580]: Connection closed by 162.218.126.136 port 35818 [preauth]
Jan  3 02:32:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 02:32:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/UGOCRM/ugo_blg/wp-config.php
Jan  3 02:32:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 02:32:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 02:32:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  3 02:32:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 02:32:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 02:32:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/UGOCRM/ugo_blg/.maintenance
Jan  3 02:32:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 02:32:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 02:32:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color db-prefix get
Jan  3 02:32:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 02:32:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 02:32:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DirectoryPrivacy is_directory_protected dir=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --output=json
Jan  3 02:32:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:32:09 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:32:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  3 02:32:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 02:32:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 02:32:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color wpt-cron event reschedule wp_version_check '+2 day'
Jan  3 02:32:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 02:32:10 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 02:32:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day'
Jan  3 02:32:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 02:32:10 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 02:32:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  3 02:32:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 02:32:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 02:32:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  3 02:32:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 02:32:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 02:32:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color admin-username is-secure
Jan  3 02:32:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 02:32:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 02:32:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  3 02:32:12 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 02:32:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 02:32:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/UGOCRM/ugo_blg/wp-config.php
Jan  3 02:32:12 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 02:32:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 02:32:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/stat -c %a /home/ugotscom/public_html/old/UGOCRM/ugo_blg/wp-config.php
Jan  3 02:32:12 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 02:32:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 02:32:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color pingbacks is_disabled
Jan  3 02:32:12 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 02:32:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 02:32:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  3 02:32:12 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 02:32:13 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 02:32:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color security-keys are_keys_correct
Jan  3 02:32:13 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 02:32:13 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 02:32:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color instance info --format=json --check-updates=true
Jan  3 02:32:13 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 02:32:17 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 02:32:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option get auto_update_plugins --format=json
Jan  3 02:32:17 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 02:32:17 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 02:32:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option get auto_update_themes --format=json
Jan  3 02:32:17 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 02:32:17 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 02:32:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  3 02:32:18 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 02:32:18 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 02:32:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color instance login-url --skip-plugins=false --format=json
Jan  3 02:32:18 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 02:32:18 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 02:32:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  3 02:32:18 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 02:32:19 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 02:32:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option get auto_update_plugins --format=json
Jan  3 02:32:19 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 02:32:20 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 02:32:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  3 02:32:20 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 02:32:21 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 02:32:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option get auto_update_themes --format=json
Jan  3 02:32:21 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 02:32:22 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 02:32:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/site/wp-config.php
Jan  3 02:32:22 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 02:32:22 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 02:32:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  3 02:32:22 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 02:32:22 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 02:32:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/site/.maintenance
Jan  3 02:32:22 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 02:32:22 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 02:32:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color db-prefix get
Jan  3 02:32:22 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 02:32:23 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 02:32:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DirectoryPrivacy is_directory_protected dir=/home/ugotscom/public_html/old/site --output=json
Jan  3 02:32:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:32:23 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:32:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  3 02:32:23 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 02:32:23 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 02:32:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color wpt-cron event reschedule wp_version_check '+2 day'
Jan  3 02:32:23 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 02:32:24 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 02:32:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day'
Jan  3 02:32:24 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 02:32:24 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 02:32:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  3 02:32:24 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 02:32:24 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 02:32:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  3 02:32:24 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 02:32:25 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 02:32:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color admin-username is-secure
Jan  3 02:32:25 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 02:32:25 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 02:32:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  3 02:32:25 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 02:32:26 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 02:32:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/site/wp-config.php
Jan  3 02:32:26 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 02:32:26 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 02:32:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/stat -c %a /home/ugotscom/public_html/old/site/wp-config.php
Jan  3 02:32:26 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 02:32:26 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 02:32:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color pingbacks is_disabled
Jan  3 02:32:26 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 02:32:26 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 02:32:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  3 02:32:26 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 02:32:26 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 02:32:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color security-keys are_keys_correct
Jan  3 02:32:26 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 02:32:27 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 02:32:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=woodpeck --output=json
Jan  3 02:32:27 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:32:27 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:32:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html/wp && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/woodpeck/public_html/wp --no-color instance info --format=json --check-updates=true
Jan  3 02:32:27 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0)
Jan  3 02:32:27 host sudo: pam_unix(sudo:session): session closed for user woodpeck
Jan  3 02:32:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck DomainInfo single_domain_data domain=woodpeckerindia.com return_https_redirect_status=1 --output=json
Jan  3 02:32:27 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:32:27 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:32:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck Mime list_redirects --output=json
Jan  3 02:32:27 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:32:27 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:32:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/test -e /home/woodpeck/public_html/wp/wp-includes/version.php
Jan  3 02:32:27 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0)
Jan  3 02:32:27 host sudo: pam_unix(sudo:session): session closed for user woodpeck
Jan  3 02:32:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  3 02:32:27 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0)
Jan  3 02:32:27 host sudo: pam_unix(sudo:session): session closed for user woodpeck
Jan  3 02:32:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck LangPHP php_get_vhost_versions --output=json
Jan  3 02:32:27 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:32:27 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:32:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=palco123 --output=json
Jan  3 02:32:28 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:32:28 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:32:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color instance info --format=json --check-updates=true
Jan  3 02:32:28 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  3 02:32:35 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  3 02:32:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false
Jan  3 02:32:35 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  3 02:32:36 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  3 02:32:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false
Jan  3 02:32:36 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  3 02:32:42 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  3 02:32:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  3 02:32:42 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  3 02:32:42 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  3 02:32:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 LangPHP php_get_vhost_versions --output=json
Jan  3 02:32:42 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:32:42 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:32:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color instance login-url --skip-plugins=false --format=json
Jan  3 02:32:42 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  3 02:32:43 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  3 02:32:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 DomainInfo single_domain_data domain=panlys.com return_https_redirect_status=1 --output=json
Jan  3 02:32:43 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:32:43 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:32:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 Mime list_redirects --output=json
Jan  3 02:32:43 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:32:43 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:32:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  3 02:32:43 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  3 02:32:44 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  3 02:32:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false
Jan  3 02:32:44 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  3 02:32:44 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  3 02:32:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  3 02:32:44 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  3 02:32:50 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  3 02:32:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false
Jan  3 02:32:50 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  3 02:32:56 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  3 02:32:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/public_html/wp-config.php
Jan  3 02:32:56 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  3 02:32:56 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  3 02:32:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  3 02:32:56 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  3 02:32:56 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  3 02:32:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/public_html/.maintenance
Jan  3 02:32:56 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  3 02:32:56 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  3 02:32:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color db-prefix get
Jan  3 02:32:56 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  3 02:32:57 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  3 02:32:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 DirectoryPrivacy is_directory_protected dir=/home/palco123/public_html --output=json
Jan  3 02:32:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:32:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:32:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  3 02:32:57 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  3 02:32:57 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  3 02:32:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color option get auto_update_core_major
Jan  3 02:32:57 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  3 02:32:58 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  3 02:32:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color wpt-cron event reschedule wp_version_check '+2 day'
Jan  3 02:32:58 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  3 02:32:59 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  3 02:32:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day'
Jan  3 02:32:59 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  3 02:32:59 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  3 02:32:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color admin-username is-secure
Jan  3 02:32:59 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  3 02:33:00 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  3 02:33:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  3 02:33:00 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  3 02:33:00 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  3 02:33:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/public_html/wp-config.php
Jan  3 02:33:00 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  3 02:33:00 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  3 02:33:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/stat -c %a /home/palco123/public_html/wp-config.php
Jan  3 02:33:00 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  3 02:33:00 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  3 02:33:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color pingbacks is_disabled
Jan  3 02:33:00 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  3 02:33:01 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  3 02:33:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  3 02:33:01 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  3 02:33:01 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  3 02:33:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color security-keys are_keys_correct
Jan  3 02:33:01 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  3 02:33:02 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  3 02:33:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwresourcehunte --output=json
Jan  3 02:33:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:33:02 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:33:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color instance info --format=json --check-updates=true
Jan  3 02:33:02 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  3 02:33:08 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  3 02:33:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option get auto_update_plugins --format=json
Jan  3 02:33:08 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  3 02:33:09 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  3 02:33:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option get auto_update_themes --format=json
Jan  3 02:33:09 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  3 02:33:09 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  3 02:33:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  3 02:33:09 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  3 02:33:09 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  3 02:33:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte LangPHP php_get_vhost_versions --output=json
Jan  3 02:33:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:33:09 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:33:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color instance login-url --skip-plugins=false --format=json
Jan  3 02:33:09 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  3 02:33:10 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  3 02:33:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte DomainInfo single_domain_data domain=resourcehunters.com return_https_redirect_status=1 --output=json
Jan  3 02:33:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:33:10 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:33:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte Mime list_redirects --output=json
Jan  3 02:33:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:33:10 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:33:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  3 02:33:10 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  3 02:33:11 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  3 02:33:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option get auto_update_plugins --format=json
Jan  3 02:33:11 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  3 02:33:11 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  3 02:33:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  3 02:33:11 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  3 02:33:17 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  3 02:33:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option get auto_update_themes --format=json
Jan  3 02:33:17 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  3 02:33:17 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  3 02:33:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/test -e /home/wwwresourcehunte/public_html/wp-config.php
Jan  3 02:33:17 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  3 02:33:17 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  3 02:33:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  3 02:33:17 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  3 02:33:17 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  3 02:33:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/test -e /home/wwwresourcehunte/public_html/.maintenance
Jan  3 02:33:18 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  3 02:33:18 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  3 02:33:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color db-prefix get
Jan  3 02:33:18 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  3 02:33:18 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  3 02:33:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte DirectoryPrivacy is_directory_protected dir=/home/wwwresourcehunte/public_html --output=json
Jan  3 02:33:18 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:33:18 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:33:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  3 02:33:18 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  3 02:33:18 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  3 02:33:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color wpt-cron event reschedule wp_version_check '+2 day'
Jan  3 02:33:19 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  3 02:33:19 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  3 02:33:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day'
Jan  3 02:33:19 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  3 02:33:19 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  3 02:33:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  3 02:33:19 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  3 02:33:20 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  3 02:33:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  3 02:33:20 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  3 02:33:20 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  3 02:33:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color admin-username is-secure
Jan  3 02:33:20 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  3 02:33:20 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  3 02:33:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  3 02:33:20 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  3 02:33:21 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  3 02:33:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/test -e /home/wwwresourcehunte/public_html/wp-config.php
Jan  3 02:33:21 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  3 02:33:21 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  3 02:33:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/stat -c %a /home/wwwresourcehunte/public_html/wp-config.php
Jan  3 02:33:21 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  3 02:33:21 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  3 02:33:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color pingbacks is_disabled
Jan  3 02:33:21 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  3 02:33:21 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  3 02:33:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  3 02:33:21 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  3 02:33:21 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  3 02:33:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color security-keys are_keys_correct
Jan  3 02:33:22 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  3 02:33:22 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  3 02:33:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood WpToolkitNotification send_admin_auto_updates_notification available_updates_text= available_updates_list= installed_updates_text= installed_updates_list= 'failure_updates_text=Updates were not installed for the following items:<br/><br/>' 'failure_updates_list=1. Website "EVM Honda Cochin" (http://www.evmhonda.com): Failed to reset cache for the instance #1: Fatal error: Uncaught Error: Call to undefined function cardealer_is_wpml_active() in /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-options.php:1041#012Stack trace:#012#0 /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-init.php(22): require_once()#012#1 /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/cardealer-helper-library.php(183):
Jan  3 02:33:22 host sudo: wp-toolkit : (command continued) require_once('"'"'/home/wwwevmhon...'"'"')#012#2 /home/wwwevmhonda/public_html/wp-includes/class-wp-hook.php(287): cdhl_include_admin_files('"'"''"'"')#012#3 /home/wwwevmhonda/public_html/wp-includes/class-wp-hook.php(311): WP_Hook->apply_filters(NULL, Array)#012#4 /home/wwwevmhonda/public_html/wp-includes/plugin.php(478): WP_Hook->do_action(Array)#012#5 /home/wwwevmhonda/public_html/wp-settings.php(546): do_action('"'"'init'"'"')#012#6 /usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/vendor/wp-cli/wp-cli/php/WP_CLI/Runner.php(1356): require('"'"'/home/wwwevmhon...'"'"')#012#7 /usr/local/cpanel/3rdparty/wp-toolkit/plib/ve in /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-options.php on line 1041#012Error: There has been a critical error on your website.Learn more about debugging in WordPress. There has been a critical error on your website.#012<br/><br/>2. Website
Jan  3 02:33:22 host sudo: wp-toolkit : (command continued) "/home/mrsclean/public_html/backup" (http://mrsclean.co.in/backup): Failed to reset cache for the instance #5: Error: Error establishing a database connection. This either means that the username and password information in your `wp-config.php` file is incorrect or we can’t contact the database server at `localhost`. This could mean your host’s database server is down.#012<br/><br/>3. Website "/home/mrsclean/public_html/blog" (http://mrsclean.co.in/blog): Failed to reset cache for the instance #6: Error: Error establishing a database connection. This either means that the username and password information in your `wp-config.php` file is incorrect or we can’t contact the database server at `localhost`. This could mean your host’s database server is down.#012<br/><br/>4. Website "/home/ugotscom/public_html/boniface/blog" (http://ugotechnologies.com/boniface/blog): Failed to reset cache for the instance #13:
Jan  3 02:33:22 host sudo: wp-toolkit : (command continued) Error: Error establishing a database connection.#012<br/><br/>5. Website "/home/woodpeck/public_html/wp" (http://woodpeckerindia.com/wp): Failed to reset cache for the instance #16: /bin/sh: line 0: cd: /home/woodpeck/public_html/wp: No such file or directory#012<br/><br/>' --output=json
Jan  3 02:33:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:33:22 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:33:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color cli cache clear
Jan  3 02:33:22 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  3 02:33:22 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  3 02:33:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color cli cache clear
Jan  3 02:33:22 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  3 02:33:22 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  3 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/backup && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/mrsclean/public_html/backup --no-color cli cache clear
Jan  3 02:33:23 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  3 02:33:23 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  3 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/blog && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/mrsclean/public_html/blog --no-color cli cache clear
Jan  3 02:33:23 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  3 02:33:23 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  3 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color cli cache clear
Jan  3 02:33:23 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  3 02:33:23 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  3 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color cli cache clear
Jan  3 02:33:23 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:33:23 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color cli cache clear
Jan  3 02:33:23 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:33:24 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color cli cache clear
Jan  3 02:33:24 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:33:24 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/boniface/blog && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/boniface/blog --no-color cli cache clear
Jan  3 02:33:24 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 02:33:24 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color cli cache clear
Jan  3 02:33:24 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 02:33:24 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color cli cache clear
Jan  3 02:33:24 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 02:33:24 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html/wp && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/woodpeck/public_html/wp --no-color cli cache clear
Jan  3 02:33:24 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0)
Jan  3 02:33:24 host sudo: pam_unix(sudo:session): session closed for user woodpeck
Jan  3 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color cli cache clear
Jan  3 02:33:24 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  3 02:33:25 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  3 02:33:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color cli cache clear
Jan  3 02:33:25 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  3 02:33:25 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  3 02:33:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet
Jan  3 02:33:25 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  3 02:33:25 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  3 02:33:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet
Jan  3 02:33:25 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  3 02:33:26 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  3 02:33:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet
Jan  3 02:33:26 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  3 02:33:27 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  3 02:33:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet
Jan  3 02:33:27 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:33:27 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:33:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet
Jan  3 02:33:27 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:33:27 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:33:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet
Jan  3 02:33:27 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 02:33:28 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 02:33:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet
Jan  3 02:33:28 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 02:33:28 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 02:33:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet
Jan  3 02:33:28 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 02:33:29 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 02:33:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet
Jan  3 02:33:29 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  3 02:33:29 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  3 02:33:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet
Jan  3 02:33:29 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  3 02:33:29 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  3 02:33:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c httpd -v
Jan  3 02:33:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:33:30 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:33:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwevmhonda/evmhonda.com/wp-toolkit.conf
Jan  3 02:33:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:33:30 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:33:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwevmhonda/evmhonda.com/wp-toolkit.conf
Jan  3 02:33:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:33:30 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:33:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwevmhonda/evmhonda.com/wp-toolkit.conf
Jan  3 02:33:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:33:30 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:33:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwevmhonda/evmhonda.com/wp-toolkit.conf
Jan  3 02:33:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:33:30 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:33:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf
Jan  3 02:33:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:33:30 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:33:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf
Jan  3 02:33:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:33:30 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:33:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf
Jan  3 02:33:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:33:30 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:33:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf
Jan  3 02:33:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:33:30 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:33:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/shalinijames/shalinijames.com/wp-toolkit.conf
Jan  3 02:33:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:33:30 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:33:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/shalinijames/shalinijames.com/wp-toolkit.conf
Jan  3 02:33:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:33:30 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:33:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/shalinijames/shalinijames.com/wp-toolkit.conf
Jan  3 02:33:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:33:30 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:33:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/shalinijames/shalinijames.com/wp-toolkit.conf
Jan  3 02:33:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:33:30 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:33:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  3 02:33:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:33:30 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:33:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  3 02:33:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:33:30 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:33:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  3 02:33:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:33:30 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:33:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  3 02:33:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:33:30 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:33:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  3 02:33:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:33:30 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:33:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  3 02:33:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:33:30 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:33:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  3 02:33:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:33:30 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:33:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  3 02:33:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:33:30 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:33:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  3 02:33:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:33:30 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:33:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  3 02:33:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:33:30 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:33:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  3 02:33:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:33:30 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:33:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  3 02:33:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:33:30 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:33:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf
Jan  3 02:33:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:33:30 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:33:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf
Jan  3 02:33:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:33:31 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:33:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf
Jan  3 02:33:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:33:31 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:33:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf
Jan  3 02:33:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:33:31 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:33:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf
Jan  3 02:33:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:33:31 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:33:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf
Jan  3 02:33:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:33:31 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:33:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf
Jan  3 02:33:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:33:31 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:33:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf
Jan  3 02:33:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:33:31 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:33:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/palco123/panlys.com/wp-toolkit.conf
Jan  3 02:33:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:33:31 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:33:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/palco123/panlys.com/wp-toolkit.conf
Jan  3 02:33:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:33:31 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:33:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/palco123/panlys.com/wp-toolkit.conf
Jan  3 02:33:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:33:31 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:33:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/palco123/panlys.com/wp-toolkit.conf
Jan  3 02:33:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:33:31 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:33:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf
Jan  3 02:33:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:33:31 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:33:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf
Jan  3 02:33:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:33:31 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:33:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf
Jan  3 02:33:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:33:31 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:33:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf
Jan  3 02:33:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 02:33:31 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 02:52:13 host sshd[16450]: Invalid user admin from 45.93.201.90 port 47566
Jan  3 02:52:13 host sshd[16450]: input_userauth_request: invalid user admin [preauth]
Jan  3 02:52:13 host sshd[16450]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 02:52:13 host sshd[16450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90
Jan  3 02:52:15 host sshd[16450]: Failed password for invalid user admin from 45.93.201.90 port 47566 ssh2
Jan  3 02:52:19 host sshd[16450]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 02:52:21 host sshd[16450]: Failed password for invalid user admin from 45.93.201.90 port 47566 ssh2
Jan  3 02:52:24 host sshd[16450]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 02:52:26 host sshd[16450]: Failed password for invalid user admin from 45.93.201.90 port 47566 ssh2
Jan  3 02:52:29 host sshd[16450]: Connection closed by 45.93.201.90 port 47566 [preauth]
Jan  3 02:52:29 host sshd[16450]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90
Jan  3 02:55:49 host sshd[16973]: Invalid user ouyangsheng from 103.13.40.2 port 43756
Jan  3 02:55:49 host sshd[16973]: input_userauth_request: invalid user ouyangsheng [preauth]
Jan  3 02:55:49 host sshd[16973]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 02:55:49 host sshd[16973]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2
Jan  3 02:55:52 host sshd[16973]: Failed password for invalid user ouyangsheng from 103.13.40.2 port 43756 ssh2
Jan  3 02:55:52 host sshd[16973]: Connection closed by 103.13.40.2 port 43756 [preauth]
Jan  3 03:14:15 host sshd[19579]: Did not receive identification string from 219.128.12.190 port 54730
Jan  3 03:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  3 03:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 03:21:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 03:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  3 03:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 03:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 03:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  3 03:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 03:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 03:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  3 03:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 03:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 03:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  3 03:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 03:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 03:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  3 03:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 03:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 03:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  3 03:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 03:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 03:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  3 03:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 03:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 03:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  3 03:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 03:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 03:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  3 03:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 03:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 03:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  3 03:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 03:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 03:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  3 03:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 03:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 03:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  3 03:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 03:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 03:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=travelboniface user-2=ugotscom user-3=wwwresourcehunte user-4=keralaholi user-5=wwwrmswll user-6=wwwpmcresource user-7=a2zgroup user-8=dartsimp user-9=laundryboniface user-10=cochintaxi user-11=wwwkaretakers user-12=phmetals user-13=kottayamcalldriv user-14=palco123 user-15=gifterman user-16=wwwnexidigital user-17=mrsclean user-18=wwwevmhonda user-19=bonifacegroup user-20=straightcurve user-21=wwwletsstalkfood user-22=shalinijames user-23=wwwtestugo user-24=vfmassets user-25=pmcresources user-26=disposeat user-27=remysagr user-28=wwwkmaorg user-29=woodpeck user-30=wwwkapin feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  3 03:21:51 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  3 03:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 03:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 03:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  3 03:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 03:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 03:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-asX6Lf4Hh5HXNh6O.~
Jan  3 03:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 03:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 03:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-asX6Lf4Hh5HXNh6O.~'
Jan  3 03:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 03:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 03:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-asX6Lf4Hh5HXNh6O.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  3 03:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 03:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 03:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  3 03:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 03:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 03:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  3 03:21:52 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 03:21:52 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 03:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  3 03:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 03:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 03:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  3 03:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 03:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 03:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  3 03:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 03:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 03:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  3 03:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 03:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 03:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  3 03:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 03:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 03:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  3 03:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  3 03:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  3 03:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  3 03:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  3 03:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  3 03:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  3 03:21:56 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  3 03:21:58 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  3 03:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  3 03:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 03:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 03:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  3 03:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 03:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 03:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  3 03:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 03:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 03:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  3 03:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 03:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 03:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  3 03:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 03:22:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 03:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  3 03:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  3 03:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  3 03:32:04 host sshd[22526]: Invalid user user from 41.197.31.178 port 53048
Jan  3 03:32:04 host sshd[22526]: input_userauth_request: invalid user user [preauth]
Jan  3 03:32:05 host sshd[22526]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 03:32:05 host sshd[22526]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178
Jan  3 03:32:07 host sshd[22526]: Failed password for invalid user user from 41.197.31.178 port 53048 ssh2
Jan  3 03:32:07 host sshd[22526]: Connection closed by 41.197.31.178 port 53048 [preauth]
Jan  3 03:33:46 host sshd[22763]: User root from 148.153.110.76 not allowed because not listed in AllowUsers
Jan  3 03:33:46 host sshd[22763]: input_userauth_request: invalid user root [preauth]
Jan  3 03:33:46 host unix_chkpwd[22771]: password check failed for user (root)
Jan  3 03:33:46 host sshd[22763]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.153.110.76  user=root
Jan  3 03:33:46 host sshd[22763]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 03:33:48 host sshd[22763]: Failed password for invalid user root from 148.153.110.76 port 43390 ssh2
Jan  3 03:33:49 host sshd[22763]: Received disconnect from 148.153.110.76 port 43390:11: Bye Bye [preauth]
Jan  3 03:33:49 host sshd[22763]: Disconnected from 148.153.110.76 port 43390 [preauth]
Jan  3 03:33:58 host sshd[22786]: User root from 139.198.9.32 not allowed because not listed in AllowUsers
Jan  3 03:33:58 host sshd[22786]: input_userauth_request: invalid user root [preauth]
Jan  3 03:33:58 host unix_chkpwd[22791]: password check failed for user (root)
Jan  3 03:33:58 host sshd[22786]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.9.32  user=root
Jan  3 03:33:58 host sshd[22786]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 03:34:00 host sshd[22786]: Failed password for invalid user root from 139.198.9.32 port 54466 ssh2
Jan  3 03:34:00 host sshd[22786]: Received disconnect from 139.198.9.32 port 54466:11: Bye Bye [preauth]
Jan  3 03:34:00 host sshd[22786]: Disconnected from 139.198.9.32 port 54466 [preauth]
Jan  3 03:34:02 host sshd[22807]: User root from 211.110.1.12 not allowed because not listed in AllowUsers
Jan  3 03:34:02 host sshd[22807]: input_userauth_request: invalid user root [preauth]
Jan  3 03:34:02 host unix_chkpwd[22812]: password check failed for user (root)
Jan  3 03:34:02 host sshd[22807]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.110.1.12  user=root
Jan  3 03:34:02 host sshd[22807]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 03:34:04 host sshd[22807]: Failed password for invalid user root from 211.110.1.12 port 59004 ssh2
Jan  3 03:34:04 host sshd[22807]: Received disconnect from 211.110.1.12 port 59004:11: Bye Bye [preauth]
Jan  3 03:34:04 host sshd[22807]: Disconnected from 211.110.1.12 port 59004 [preauth]
Jan  3 03:34:07 host sshd[22822]: User root from 143.110.234.191 not allowed because not listed in AllowUsers
Jan  3 03:34:07 host sshd[22822]: input_userauth_request: invalid user root [preauth]
Jan  3 03:34:07 host unix_chkpwd[22825]: password check failed for user (root)
Jan  3 03:34:07 host sshd[22822]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.234.191  user=root
Jan  3 03:34:07 host sshd[22822]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 03:34:09 host sshd[22822]: Failed password for invalid user root from 143.110.234.191 port 59006 ssh2
Jan  3 03:34:09 host sshd[22822]: Received disconnect from 143.110.234.191 port 59006:11: Bye Bye [preauth]
Jan  3 03:34:09 host sshd[22822]: Disconnected from 143.110.234.191 port 59006 [preauth]
Jan  3 03:35:20 host sshd[23104]: User root from 191.189.59.219 not allowed because not listed in AllowUsers
Jan  3 03:35:20 host sshd[23104]: input_userauth_request: invalid user root [preauth]
Jan  3 03:35:20 host unix_chkpwd[23108]: password check failed for user (root)
Jan  3 03:35:20 host sshd[23104]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.189.59.219  user=root
Jan  3 03:35:20 host sshd[23104]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 03:35:22 host sshd[23104]: Failed password for invalid user root from 191.189.59.219 port 60390 ssh2
Jan  3 03:35:22 host sshd[23104]: Received disconnect from 191.189.59.219 port 60390:11: Bye Bye [preauth]
Jan  3 03:35:22 host sshd[23104]: Disconnected from 191.189.59.219 port 60390 [preauth]
Jan  3 03:35:55 host sshd[23173]: User root from 220.203.8.38 not allowed because not listed in AllowUsers
Jan  3 03:35:55 host sshd[23173]: input_userauth_request: invalid user root [preauth]
Jan  3 03:35:55 host unix_chkpwd[23176]: password check failed for user (root)
Jan  3 03:35:55 host sshd[23173]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.203.8.38  user=root
Jan  3 03:35:55 host sshd[23173]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 03:35:57 host sshd[23173]: Failed password for invalid user root from 220.203.8.38 port 48594 ssh2
Jan  3 03:35:57 host sshd[23173]: Received disconnect from 220.203.8.38 port 48594:11: Bye Bye [preauth]
Jan  3 03:35:57 host sshd[23173]: Disconnected from 220.203.8.38 port 48594 [preauth]
Jan  3 03:35:57 host sshd[23178]: User root from 185.236.228.33 not allowed because not listed in AllowUsers
Jan  3 03:35:57 host sshd[23178]: input_userauth_request: invalid user root [preauth]
Jan  3 03:35:57 host unix_chkpwd[23181]: password check failed for user (root)
Jan  3 03:35:57 host sshd[23178]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.236.228.33  user=root
Jan  3 03:35:57 host sshd[23178]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 03:35:59 host sshd[23178]: Failed password for invalid user root from 185.236.228.33 port 45798 ssh2
Jan  3 03:35:59 host sshd[23182]: Invalid user gjx from 162.218.126.136 port 33468
Jan  3 03:35:59 host sshd[23182]: input_userauth_request: invalid user gjx [preauth]
Jan  3 03:35:59 host sshd[23178]: Received disconnect from 185.236.228.33 port 45798:11: Bye Bye [preauth]
Jan  3 03:35:59 host sshd[23178]: Disconnected from 185.236.228.33 port 45798 [preauth]
Jan  3 03:35:59 host sshd[23182]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 03:35:59 host sshd[23182]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136
Jan  3 03:36:02 host sshd[23182]: Failed password for invalid user gjx from 162.218.126.136 port 33468 ssh2
Jan  3 03:36:02 host sshd[23182]: Connection closed by 162.218.126.136 port 33468 [preauth]
Jan  3 03:36:30 host sshd[23257]: User root from 43.153.214.185 not allowed because not listed in AllowUsers
Jan  3 03:36:30 host sshd[23257]: input_userauth_request: invalid user root [preauth]
Jan  3 03:36:30 host unix_chkpwd[23259]: password check failed for user (root)
Jan  3 03:36:30 host sshd[23257]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.214.185  user=root
Jan  3 03:36:30 host sshd[23257]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 03:36:32 host sshd[23257]: Failed password for invalid user root from 43.153.214.185 port 41164 ssh2
Jan  3 03:36:32 host sshd[23257]: Received disconnect from 43.153.214.185 port 41164:11: Bye Bye [preauth]
Jan  3 03:36:32 host sshd[23257]: Disconnected from 43.153.214.185 port 41164 [preauth]
Jan  3 03:36:46 host sshd[23290]: User root from 196.3.164.45 not allowed because not listed in AllowUsers
Jan  3 03:36:46 host sshd[23290]: input_userauth_request: invalid user root [preauth]
Jan  3 03:36:46 host unix_chkpwd[23296]: password check failed for user (root)
Jan  3 03:36:46 host sshd[23290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.3.164.45  user=root
Jan  3 03:36:46 host sshd[23290]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 03:36:49 host sshd[23290]: Failed password for invalid user root from 196.3.164.45 port 44386 ssh2
Jan  3 03:36:49 host sshd[23290]: Received disconnect from 196.3.164.45 port 44386:11: Bye Bye [preauth]
Jan  3 03:36:49 host sshd[23290]: Disconnected from 196.3.164.45 port 44386 [preauth]
Jan  3 03:38:43 host sshd[23540]: User root from 192.3.211.39 not allowed because not listed in AllowUsers
Jan  3 03:38:43 host sshd[23540]: input_userauth_request: invalid user root [preauth]
Jan  3 03:38:43 host unix_chkpwd[23544]: password check failed for user (root)
Jan  3 03:38:43 host sshd[23540]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.3.211.39  user=root
Jan  3 03:38:43 host sshd[23540]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 03:38:45 host sshd[23540]: Failed password for invalid user root from 192.3.211.39 port 43258 ssh2
Jan  3 03:38:45 host sshd[23540]: Received disconnect from 192.3.211.39 port 43258:11: Bye Bye [preauth]
Jan  3 03:38:45 host sshd[23540]: Disconnected from 192.3.211.39 port 43258 [preauth]
Jan  3 03:40:06 host sshd[23722]: User root from 112.187.12.214 not allowed because not listed in AllowUsers
Jan  3 03:40:06 host sshd[23722]: input_userauth_request: invalid user root [preauth]
Jan  3 03:40:06 host unix_chkpwd[23727]: password check failed for user (root)
Jan  3 03:40:06 host sshd[23722]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.187.12.214  user=root
Jan  3 03:40:06 host sshd[23722]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 03:40:08 host sshd[23722]: Failed password for invalid user root from 112.187.12.214 port 36792 ssh2
Jan  3 03:40:08 host sshd[23722]: Received disconnect from 112.187.12.214 port 36792:11: Bye Bye [preauth]
Jan  3 03:40:08 host sshd[23722]: Disconnected from 112.187.12.214 port 36792 [preauth]
Jan  3 03:40:34 host sshd[23901]: User root from 185.236.228.33 not allowed because not listed in AllowUsers
Jan  3 03:40:34 host sshd[23901]: input_userauth_request: invalid user root [preauth]
Jan  3 03:40:34 host unix_chkpwd[23905]: password check failed for user (root)
Jan  3 03:40:34 host sshd[23901]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.236.228.33  user=root
Jan  3 03:40:34 host sshd[23901]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 03:40:36 host sshd[23907]: User root from 211.110.1.12 not allowed because not listed in AllowUsers
Jan  3 03:40:36 host sshd[23907]: input_userauth_request: invalid user root [preauth]
Jan  3 03:40:36 host unix_chkpwd[23910]: password check failed for user (root)
Jan  3 03:40:36 host sshd[23907]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.110.1.12  user=root
Jan  3 03:40:36 host sshd[23907]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 03:40:37 host sshd[23901]: Failed password for invalid user root from 185.236.228.33 port 38172 ssh2
Jan  3 03:40:37 host sshd[23901]: Received disconnect from 185.236.228.33 port 38172:11: Bye Bye [preauth]
Jan  3 03:40:37 host sshd[23901]: Disconnected from 185.236.228.33 port 38172 [preauth]
Jan  3 03:40:38 host sshd[23907]: Failed password for invalid user root from 211.110.1.12 port 59270 ssh2
Jan  3 03:40:38 host sshd[23907]: Received disconnect from 211.110.1.12 port 59270:11: Bye Bye [preauth]
Jan  3 03:40:38 host sshd[23907]: Disconnected from 211.110.1.12 port 59270 [preauth]
Jan  3 03:40:41 host sshd[23950]: User root from 143.110.234.191 not allowed because not listed in AllowUsers
Jan  3 03:40:41 host sshd[23950]: input_userauth_request: invalid user root [preauth]
Jan  3 03:40:41 host unix_chkpwd[23978]: password check failed for user (root)
Jan  3 03:40:41 host sshd[23950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.234.191  user=root
Jan  3 03:40:41 host sshd[23950]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 03:40:43 host sshd[23950]: Failed password for invalid user root from 143.110.234.191 port 33918 ssh2
Jan  3 03:40:44 host sshd[23950]: Received disconnect from 143.110.234.191 port 33918:11: Bye Bye [preauth]
Jan  3 03:40:44 host sshd[23950]: Disconnected from 143.110.234.191 port 33918 [preauth]
Jan  3 03:40:49 host sshd[24017]: User root from 191.189.59.219 not allowed because not listed in AllowUsers
Jan  3 03:40:49 host sshd[24017]: input_userauth_request: invalid user root [preauth]
Jan  3 03:40:49 host unix_chkpwd[24024]: password check failed for user (root)
Jan  3 03:40:49 host sshd[24017]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.189.59.219  user=root
Jan  3 03:40:49 host sshd[24017]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 03:40:52 host sshd[24027]: User root from 148.153.110.76 not allowed because not listed in AllowUsers
Jan  3 03:40:52 host sshd[24027]: input_userauth_request: invalid user root [preauth]
Jan  3 03:40:52 host unix_chkpwd[24029]: password check failed for user (root)
Jan  3 03:40:52 host sshd[24027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.153.110.76  user=root
Jan  3 03:40:52 host sshd[24027]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 03:40:52 host sshd[24017]: Failed password for invalid user root from 191.189.59.219 port 58456 ssh2
Jan  3 03:40:52 host sshd[24017]: Received disconnect from 191.189.59.219 port 58456:11: Bye Bye [preauth]
Jan  3 03:40:52 host sshd[24017]: Disconnected from 191.189.59.219 port 58456 [preauth]
Jan  3 03:40:54 host sshd[24027]: Failed password for invalid user root from 148.153.110.76 port 47396 ssh2
Jan  3 03:40:54 host sshd[24027]: Received disconnect from 148.153.110.76 port 47396:11: Bye Bye [preauth]
Jan  3 03:40:54 host sshd[24027]: Disconnected from 148.153.110.76 port 47396 [preauth]
Jan  3 03:41:00 host sshd[24099]: User root from 43.153.214.185 not allowed because not listed in AllowUsers
Jan  3 03:41:00 host sshd[24099]: input_userauth_request: invalid user root [preauth]
Jan  3 03:41:00 host unix_chkpwd[24102]: password check failed for user (root)
Jan  3 03:41:00 host sshd[24099]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.214.185  user=root
Jan  3 03:41:00 host sshd[24099]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 03:41:02 host sshd[24099]: Failed password for invalid user root from 43.153.214.185 port 34186 ssh2
Jan  3 03:41:02 host sshd[24099]: Received disconnect from 43.153.214.185 port 34186:11: Bye Bye [preauth]
Jan  3 03:41:02 host sshd[24099]: Disconnected from 43.153.214.185 port 34186 [preauth]
Jan  3 03:41:18 host sshd[24176]: User root from 196.3.164.45 not allowed because not listed in AllowUsers
Jan  3 03:41:18 host sshd[24176]: input_userauth_request: invalid user root [preauth]
Jan  3 03:41:18 host unix_chkpwd[24181]: password check failed for user (root)
Jan  3 03:41:18 host sshd[24176]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.3.164.45  user=root
Jan  3 03:41:18 host sshd[24176]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 03:41:20 host sshd[24176]: Failed password for invalid user root from 196.3.164.45 port 35422 ssh2
Jan  3 03:41:31 host sshd[24253]: User root from 192.3.211.39 not allowed because not listed in AllowUsers
Jan  3 03:41:31 host sshd[24253]: input_userauth_request: invalid user root [preauth]
Jan  3 03:41:31 host unix_chkpwd[24258]: password check failed for user (root)
Jan  3 03:41:31 host sshd[24253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.3.211.39  user=root
Jan  3 03:41:31 host sshd[24253]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 03:41:33 host sshd[24253]: Failed password for invalid user root from 192.3.211.39 port 25716 ssh2
Jan  3 03:41:34 host sshd[24253]: Received disconnect from 192.3.211.39 port 25716:11: Bye Bye [preauth]
Jan  3 03:41:34 host sshd[24253]: Disconnected from 192.3.211.39 port 25716 [preauth]
Jan  3 03:41:39 host sshd[24297]: User root from 112.187.12.214 not allowed because not listed in AllowUsers
Jan  3 03:41:39 host sshd[24297]: input_userauth_request: invalid user root [preauth]
Jan  3 03:41:39 host unix_chkpwd[24300]: password check failed for user (root)
Jan  3 03:41:39 host sshd[24297]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.187.12.214  user=root
Jan  3 03:41:39 host sshd[24297]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 03:41:41 host sshd[24297]: Failed password for invalid user root from 112.187.12.214 port 33570 ssh2
Jan  3 03:43:27 host sshd[24600]: Connection closed by 139.198.9.32 port 57822 [preauth]
Jan  3 03:43:47 host sshd[24636]: User root from 139.198.9.32 not allowed because not listed in AllowUsers
Jan  3 03:43:47 host sshd[24636]: input_userauth_request: invalid user root [preauth]
Jan  3 03:43:47 host unix_chkpwd[24640]: password check failed for user (root)
Jan  3 03:43:47 host sshd[24636]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.9.32  user=root
Jan  3 03:43:47 host sshd[24636]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 03:43:49 host sshd[24636]: Failed password for invalid user root from 139.198.9.32 port 34208 ssh2
Jan  3 03:43:50 host sshd[24636]: Received disconnect from 139.198.9.32 port 34208:11: Bye Bye [preauth]
Jan  3 03:43:50 host sshd[24636]: Disconnected from 139.198.9.32 port 34208 [preauth]
Jan  3 03:45:03 host sshd[24859]: Invalid user michael from 106.10.122.53 port 37848
Jan  3 03:45:03 host sshd[24859]: input_userauth_request: invalid user michael [preauth]
Jan  3 03:45:03 host sshd[24859]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 03:45:03 host sshd[24859]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53
Jan  3 03:45:04 host sshd[24859]: Failed password for invalid user michael from 106.10.122.53 port 37848 ssh2
Jan  3 03:45:05 host sshd[24859]: Connection closed by 106.10.122.53 port 37848 [preauth]
Jan  3 03:45:32 host sshd[24936]: User root from 220.203.8.38 not allowed because not listed in AllowUsers
Jan  3 03:45:32 host sshd[24936]: input_userauth_request: invalid user root [preauth]
Jan  3 03:45:32 host unix_chkpwd[24939]: password check failed for user (root)
Jan  3 03:45:32 host sshd[24936]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.203.8.38  user=root
Jan  3 03:45:32 host sshd[24936]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 03:45:34 host sshd[24936]: Failed password for invalid user root from 220.203.8.38 port 59428 ssh2
Jan  3 03:45:35 host sshd[24936]: Received disconnect from 220.203.8.38 port 59428:11: Bye Bye [preauth]
Jan  3 03:45:35 host sshd[24936]: Disconnected from 220.203.8.38 port 59428 [preauth]
Jan  3 03:46:44 host sshd[25221]: User root from 95.165.138.108 not allowed because not listed in AllowUsers
Jan  3 03:46:44 host sshd[25221]: input_userauth_request: invalid user root [preauth]
Jan  3 03:46:44 host unix_chkpwd[25224]: password check failed for user (root)
Jan  3 03:46:44 host sshd[25221]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.165.138.108  user=root
Jan  3 03:46:44 host sshd[25221]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 03:46:47 host sshd[25221]: Failed password for invalid user root from 95.165.138.108 port 45886 ssh2
Jan  3 03:46:47 host sshd[25221]: Received disconnect from 95.165.138.108 port 45886:11: Bye Bye [preauth]
Jan  3 03:46:47 host sshd[25221]: Disconnected from 95.165.138.108 port 45886 [preauth]
Jan  3 03:49:00 host sshd[25477]: Did not receive identification string from 92.255.85.115 port 38029
Jan  3 03:50:21 host sshd[25640]: User root from 101.36.104.218 not allowed because not listed in AllowUsers
Jan  3 03:50:21 host sshd[25640]: input_userauth_request: invalid user root [preauth]
Jan  3 03:50:21 host unix_chkpwd[25643]: password check failed for user (root)
Jan  3 03:50:21 host sshd[25640]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.36.104.218  user=root
Jan  3 03:50:21 host sshd[25640]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 03:50:23 host sshd[25640]: Failed password for invalid user root from 101.36.104.218 port 24986 ssh2
Jan  3 03:50:23 host sshd[25640]: Received disconnect from 101.36.104.218 port 24986:11: Bye Bye [preauth]
Jan  3 03:50:23 host sshd[25640]: Disconnected from 101.36.104.218 port 24986 [preauth]
Jan  3 03:51:13 host sshd[25725]: User root from 95.165.138.108 not allowed because not listed in AllowUsers
Jan  3 03:51:13 host sshd[25725]: input_userauth_request: invalid user root [preauth]
Jan  3 03:51:13 host unix_chkpwd[25728]: password check failed for user (root)
Jan  3 03:51:13 host sshd[25725]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.165.138.108  user=root
Jan  3 03:51:13 host sshd[25725]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 03:51:14 host sshd[25729]: Invalid user  from 64.62.197.60 port 54327
Jan  3 03:51:14 host sshd[25729]: input_userauth_request: invalid user  [preauth]
Jan  3 03:51:14 host sshd[25725]: Failed password for invalid user root from 95.165.138.108 port 49074 ssh2
Jan  3 03:51:15 host sshd[25725]: Received disconnect from 95.165.138.108 port 49074:11: Bye Bye [preauth]
Jan  3 03:51:15 host sshd[25725]: Disconnected from 95.165.138.108 port 49074 [preauth]
Jan  3 03:51:17 host sshd[25729]: Connection closed by 64.62.197.60 port 54327 [preauth]
Jan  3 03:53:20 host sshd[26102]: User root from 101.36.104.218 not allowed because not listed in AllowUsers
Jan  3 03:53:20 host sshd[26102]: input_userauth_request: invalid user root [preauth]
Jan  3 03:53:20 host unix_chkpwd[26105]: password check failed for user (root)
Jan  3 03:53:20 host sshd[26102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.36.104.218  user=root
Jan  3 03:53:20 host sshd[26102]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 03:53:22 host sshd[26102]: Failed password for invalid user root from 101.36.104.218 port 51574 ssh2
Jan  3 03:53:22 host sshd[26102]: Received disconnect from 101.36.104.218 port 51574:11: Bye Bye [preauth]
Jan  3 03:53:22 host sshd[26102]: Disconnected from 101.36.104.218 port 51574 [preauth]
Jan  3 03:55:53 host sshd[26424]: User root from 219.127.2.185 not allowed because not listed in AllowUsers
Jan  3 03:55:53 host sshd[26424]: input_userauth_request: invalid user root [preauth]
Jan  3 03:55:53 host unix_chkpwd[26426]: password check failed for user (root)
Jan  3 03:55:53 host sshd[26424]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.127.2.185  user=root
Jan  3 03:55:53 host sshd[26424]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 03:55:55 host sshd[26424]: Failed password for invalid user root from 219.127.2.185 port 47581 ssh2
Jan  3 03:55:56 host sshd[26424]: Received disconnect from 219.127.2.185 port 47581:11: Bye Bye [preauth]
Jan  3 03:55:56 host sshd[26424]: Disconnected from 219.127.2.185 port 47581 [preauth]
Jan  3 03:56:13 host sshd[26464]: Invalid user oracle from 92.46.108.20 port 47726
Jan  3 03:56:13 host sshd[26464]: input_userauth_request: invalid user oracle [preauth]
Jan  3 03:56:15 host sshd[26464]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 03:56:15 host sshd[26464]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20
Jan  3 03:56:17 host sshd[26464]: Failed password for invalid user oracle from 92.46.108.20 port 47726 ssh2
Jan  3 03:56:18 host sshd[26464]: Connection closed by 92.46.108.20 port 47726 [preauth]
Jan  3 04:00:51 host sshd[27131]: User root from 219.127.2.185 not allowed because not listed in AllowUsers
Jan  3 04:00:51 host sshd[27131]: input_userauth_request: invalid user root [preauth]
Jan  3 04:00:51 host unix_chkpwd[27134]: password check failed for user (root)
Jan  3 04:00:51 host sshd[27131]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.127.2.185  user=root
Jan  3 04:00:51 host sshd[27131]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 04:00:53 host sshd[27131]: Failed password for invalid user root from 219.127.2.185 port 59613 ssh2
Jan  3 04:00:53 host sshd[27131]: Received disconnect from 219.127.2.185 port 59613:11: Bye Bye [preauth]
Jan  3 04:00:53 host sshd[27131]: Disconnected from 219.127.2.185 port 59613 [preauth]
Jan  3 04:06:17 host sshd[27992]: Invalid user bzrx1098ui from 92.255.85.115 port 60133
Jan  3 04:06:17 host sshd[27992]: input_userauth_request: invalid user bzrx1098ui [preauth]
Jan  3 04:06:18 host sshd[27992]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 04:06:18 host sshd[27992]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.255.85.115
Jan  3 04:06:20 host sshd[27992]: Failed password for invalid user bzrx1098ui from 92.255.85.115 port 60133 ssh2
Jan  3 04:06:20 host sshd[27992]: Connection reset by 92.255.85.115 port 60133 [preauth]
Jan  3 04:12:35 host sshd[29093]: Invalid user telecomadmin from 92.255.85.115 port 10203
Jan  3 04:12:35 host sshd[29093]: input_userauth_request: invalid user telecomadmin [preauth]
Jan  3 04:12:36 host sshd[29093]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 04:12:36 host sshd[29093]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.255.85.115
Jan  3 04:12:38 host sshd[29093]: Failed password for invalid user telecomadmin from 92.255.85.115 port 10203 ssh2
Jan  3 04:12:38 host sshd[29093]: Connection reset by 92.255.85.115 port 10203 [preauth]
Jan  3 04:17:37 host sshd[30203]: Invalid user user1 from 103.13.40.2 port 49472
Jan  3 04:17:37 host sshd[30203]: input_userauth_request: invalid user user1 [preauth]
Jan  3 04:17:37 host sshd[30203]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 04:17:37 host sshd[30203]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2
Jan  3 04:17:39 host sshd[30203]: Failed password for invalid user user1 from 103.13.40.2 port 49472 ssh2
Jan  3 04:17:39 host sshd[30203]: Connection closed by 103.13.40.2 port 49472 [preauth]
Jan  3 04:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  3 04:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 04:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 04:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  3 04:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 04:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 04:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  3 04:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 04:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 04:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  3 04:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 04:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 04:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  3 04:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 04:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 04:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  3 04:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 04:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 04:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  3 04:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 04:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 04:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  3 04:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 04:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 04:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  3 04:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 04:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 04:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  3 04:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 04:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 04:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  3 04:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 04:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 04:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  3 04:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 04:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 04:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  3 04:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 04:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 04:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=travelboniface user-2=wwwrmswll user-3=wwwresourcehunte user-4=keralaholi user-5=ugotscom user-6=wwwpmcresource user-7=dartsimp user-8=a2zgroup user-9=laundryboniface user-10=cochintaxi user-11=wwwkaretakers user-12=gifterman user-13=palco123 user-14=kottayamcalldriv user-15=phmetals user-16=wwwnexidigital user-17=mrsclean user-18=bonifacegroup user-19=wwwevmhonda user-20=straightcurve user-21=wwwletsstalkfood user-22=vfmassets user-23=wwwtestugo user-24=shalinijames user-25=pmcresources user-26=disposeat user-27=remysagr user-28=wwwkmaorg user-29=wwwkapin user-30=woodpeck feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  3 04:21:52 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  3 04:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 04:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 04:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  3 04:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 04:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 04:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ApVE1eBnCrxCgFKa.~
Jan  3 04:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 04:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 04:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ApVE1eBnCrxCgFKa.~'
Jan  3 04:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 04:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 04:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ApVE1eBnCrxCgFKa.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  3 04:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 04:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 04:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  3 04:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 04:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 04:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  3 04:21:53 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 04:21:53 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 04:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  3 04:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 04:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 04:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  3 04:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 04:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 04:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  3 04:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 04:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 04:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  3 04:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 04:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 04:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  3 04:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 04:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 04:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  3 04:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  3 04:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  3 04:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  3 04:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  3 04:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  3 04:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  3 04:21:57 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  3 04:22:00 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  3 04:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  3 04:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 04:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 04:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  3 04:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 04:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 04:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  3 04:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 04:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 04:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  3 04:22:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 04:22:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 04:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  3 04:22:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 04:22:15 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 04:22:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  3 04:22:16 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  3 04:22:17 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  3 04:23:02 host sshd[31176]: User root from 43.131.52.157 not allowed because not listed in AllowUsers
Jan  3 04:23:02 host sshd[31176]: input_userauth_request: invalid user root [preauth]
Jan  3 04:23:02 host unix_chkpwd[31189]: password check failed for user (root)
Jan  3 04:23:02 host sshd[31176]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.131.52.157  user=root
Jan  3 04:23:02 host sshd[31176]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 04:23:04 host sshd[31176]: Failed password for invalid user root from 43.131.52.157 port 45460 ssh2
Jan  3 04:23:04 host sshd[31176]: Received disconnect from 43.131.52.157 port 45460:11: Bye Bye [preauth]
Jan  3 04:23:04 host sshd[31176]: Disconnected from 43.131.52.157 port 45460 [preauth]
Jan  3 04:25:42 host sshd[31647]: User root from 46.105.29.159 not allowed because not listed in AllowUsers
Jan  3 04:25:42 host sshd[31647]: input_userauth_request: invalid user root [preauth]
Jan  3 04:25:42 host unix_chkpwd[31651]: password check failed for user (root)
Jan  3 04:25:42 host sshd[31647]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.105.29.159  user=root
Jan  3 04:25:42 host sshd[31647]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 04:25:43 host sshd[31647]: Failed password for invalid user root from 46.105.29.159 port 37112 ssh2
Jan  3 04:25:43 host sshd[31647]: Received disconnect from 46.105.29.159 port 37112:11: Bye Bye [preauth]
Jan  3 04:25:43 host sshd[31647]: Disconnected from 46.105.29.159 port 37112 [preauth]
Jan  3 04:25:56 host sshd[31669]: User root from 34.78.185.36 not allowed because not listed in AllowUsers
Jan  3 04:25:56 host sshd[31669]: input_userauth_request: invalid user root [preauth]
Jan  3 04:25:56 host unix_chkpwd[31676]: password check failed for user (root)
Jan  3 04:25:56 host sshd[31669]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.78.185.36  user=root
Jan  3 04:25:56 host sshd[31669]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 04:25:58 host sshd[31669]: Failed password for invalid user root from 34.78.185.36 port 54886 ssh2
Jan  3 04:25:59 host sshd[31669]: Received disconnect from 34.78.185.36 port 54886:11: Bye Bye [preauth]
Jan  3 04:25:59 host sshd[31669]: Disconnected from 34.78.185.36 port 54886 [preauth]
Jan  3 04:26:54 host sshd[31820]: User root from 190.128.239.54 not allowed because not listed in AllowUsers
Jan  3 04:26:54 host sshd[31820]: input_userauth_request: invalid user root [preauth]
Jan  3 04:26:54 host unix_chkpwd[31824]: password check failed for user (root)
Jan  3 04:26:54 host sshd[31820]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.128.239.54  user=root
Jan  3 04:26:54 host sshd[31820]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 04:26:56 host sshd[31820]: Failed password for invalid user root from 190.128.239.54 port 50168 ssh2
Jan  3 04:26:57 host sshd[31820]: Received disconnect from 190.128.239.54 port 50168:11: Bye Bye [preauth]
Jan  3 04:26:57 host sshd[31820]: Disconnected from 190.128.239.54 port 50168 [preauth]
Jan  3 04:27:18 host sshd[31866]: User root from 167.99.137.201 not allowed because not listed in AllowUsers
Jan  3 04:27:18 host sshd[31866]: input_userauth_request: invalid user root [preauth]
Jan  3 04:27:18 host unix_chkpwd[31869]: password check failed for user (root)
Jan  3 04:27:18 host sshd[31866]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.137.201  user=root
Jan  3 04:27:18 host sshd[31866]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 04:27:21 host sshd[31866]: Failed password for invalid user root from 167.99.137.201 port 49294 ssh2
Jan  3 04:27:21 host sshd[31866]: Received disconnect from 167.99.137.201 port 49294:11: Bye Bye [preauth]
Jan  3 04:27:21 host sshd[31866]: Disconnected from 167.99.137.201 port 49294 [preauth]
Jan  3 04:27:30 host sshd[31908]: User root from 5.78.51.65 not allowed because not listed in AllowUsers
Jan  3 04:27:30 host sshd[31908]: input_userauth_request: invalid user root [preauth]
Jan  3 04:27:30 host unix_chkpwd[31914]: password check failed for user (root)
Jan  3 04:27:30 host sshd[31908]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.78.51.65  user=root
Jan  3 04:27:30 host sshd[31908]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 04:27:32 host sshd[31908]: Failed password for invalid user root from 5.78.51.65 port 44122 ssh2
Jan  3 04:27:32 host sshd[31908]: Received disconnect from 5.78.51.65 port 44122:11: Bye Bye [preauth]
Jan  3 04:27:32 host sshd[31908]: Disconnected from 5.78.51.65 port 44122 [preauth]
Jan  3 04:27:43 host sshd[31943]: User root from 161.18.228.75 not allowed because not listed in AllowUsers
Jan  3 04:27:43 host sshd[31943]: input_userauth_request: invalid user root [preauth]
Jan  3 04:27:43 host unix_chkpwd[31946]: password check failed for user (root)
Jan  3 04:27:43 host sshd[31943]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.18.228.75  user=root
Jan  3 04:27:43 host sshd[31943]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 04:27:45 host sshd[31943]: Failed password for invalid user root from 161.18.228.75 port 39178 ssh2
Jan  3 04:27:45 host sshd[31943]: Received disconnect from 161.18.228.75 port 39178:11: Bye Bye [preauth]
Jan  3 04:27:45 host sshd[31943]: Disconnected from 161.18.228.75 port 39178 [preauth]
Jan  3 04:28:57 host sshd[32200]: User root from 167.99.137.201 not allowed because not listed in AllowUsers
Jan  3 04:28:57 host sshd[32200]: input_userauth_request: invalid user root [preauth]
Jan  3 04:28:57 host unix_chkpwd[32204]: password check failed for user (root)
Jan  3 04:28:57 host sshd[32200]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.137.201  user=root
Jan  3 04:28:57 host sshd[32200]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 04:28:59 host sshd[32200]: Failed password for invalid user root from 167.99.137.201 port 54094 ssh2
Jan  3 04:28:59 host sshd[32200]: Received disconnect from 167.99.137.201 port 54094:11: Bye Bye [preauth]
Jan  3 04:28:59 host sshd[32200]: Disconnected from 167.99.137.201 port 54094 [preauth]
Jan  3 04:29:04 host sshd[32253]: User root from 43.131.52.157 not allowed because not listed in AllowUsers
Jan  3 04:29:04 host sshd[32253]: input_userauth_request: invalid user root [preauth]
Jan  3 04:29:04 host unix_chkpwd[32258]: password check failed for user (root)
Jan  3 04:29:04 host sshd[32253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.131.52.157  user=root
Jan  3 04:29:04 host sshd[32253]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 04:29:06 host sshd[32253]: Failed password for invalid user root from 43.131.52.157 port 45082 ssh2
Jan  3 04:29:06 host sshd[32253]: Received disconnect from 43.131.52.157 port 45082:11: Bye Bye [preauth]
Jan  3 04:29:06 host sshd[32253]: Disconnected from 43.131.52.157 port 45082 [preauth]
Jan  3 04:29:18 host sshd[32320]: User root from 46.105.29.159 not allowed because not listed in AllowUsers
Jan  3 04:29:18 host sshd[32320]: input_userauth_request: invalid user root [preauth]
Jan  3 04:29:18 host unix_chkpwd[32324]: password check failed for user (root)
Jan  3 04:29:18 host sshd[32320]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.105.29.159  user=root
Jan  3 04:29:18 host sshd[32320]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 04:29:20 host sshd[32320]: Failed password for invalid user root from 46.105.29.159 port 45770 ssh2
Jan  3 04:29:20 host sshd[32320]: Received disconnect from 46.105.29.159 port 45770:11: Bye Bye [preauth]
Jan  3 04:29:20 host sshd[32320]: Disconnected from 46.105.29.159 port 45770 [preauth]
Jan  3 04:29:20 host sshd[32327]: User root from 34.78.185.36 not allowed because not listed in AllowUsers
Jan  3 04:29:20 host sshd[32327]: input_userauth_request: invalid user root [preauth]
Jan  3 04:29:20 host unix_chkpwd[32332]: password check failed for user (root)
Jan  3 04:29:20 host sshd[32327]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.78.185.36  user=root
Jan  3 04:29:20 host sshd[32327]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 04:29:23 host sshd[32327]: Failed password for invalid user root from 34.78.185.36 port 44114 ssh2
Jan  3 04:29:24 host sshd[32400]: User root from 161.18.228.75 not allowed because not listed in AllowUsers
Jan  3 04:29:24 host sshd[32400]: input_userauth_request: invalid user root [preauth]
Jan  3 04:29:24 host unix_chkpwd[32408]: password check failed for user (root)
Jan  3 04:29:24 host sshd[32400]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.18.228.75  user=root
Jan  3 04:29:24 host sshd[32400]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 04:29:26 host sshd[32400]: Failed password for invalid user root from 161.18.228.75 port 41392 ssh2
Jan  3 04:29:26 host sshd[32400]: Received disconnect from 161.18.228.75 port 41392:11: Bye Bye [preauth]
Jan  3 04:29:26 host sshd[32400]: Disconnected from 161.18.228.75 port 41392 [preauth]
Jan  3 04:29:32 host sshd[32486]: User root from 190.128.239.54 not allowed because not listed in AllowUsers
Jan  3 04:29:32 host sshd[32486]: input_userauth_request: invalid user root [preauth]
Jan  3 04:29:32 host unix_chkpwd[32490]: password check failed for user (root)
Jan  3 04:29:32 host sshd[32486]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.128.239.54  user=root
Jan  3 04:29:32 host sshd[32486]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 04:29:34 host sshd[32486]: Failed password for invalid user root from 190.128.239.54 port 57690 ssh2
Jan  3 04:29:35 host sshd[32486]: Received disconnect from 190.128.239.54 port 57690:11: Bye Bye [preauth]
Jan  3 04:29:35 host sshd[32486]: Disconnected from 190.128.239.54 port 57690 [preauth]
Jan  3 04:29:39 host sshd[32525]: User root from 5.78.51.65 not allowed because not listed in AllowUsers
Jan  3 04:29:39 host sshd[32525]: input_userauth_request: invalid user root [preauth]
Jan  3 04:29:39 host unix_chkpwd[32533]: password check failed for user (root)
Jan  3 04:29:39 host sshd[32525]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.78.51.65  user=root
Jan  3 04:29:39 host sshd[32525]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 04:29:41 host sshd[32525]: Failed password for invalid user root from 5.78.51.65 port 48658 ssh2
Jan  3 04:29:41 host sshd[32525]: Received disconnect from 5.78.51.65 port 48658:11: Bye Bye [preauth]
Jan  3 04:29:41 host sshd[32525]: Disconnected from 5.78.51.65 port 48658 [preauth]
Jan  3 04:33:59 host sshd[737]: User root from 80.94.92.241 not allowed because not listed in AllowUsers
Jan  3 04:33:59 host sshd[737]: input_userauth_request: invalid user root [preauth]
Jan  3 04:33:59 host sshd[739]: User root from 80.94.92.241 not allowed because not listed in AllowUsers
Jan  3 04:33:59 host sshd[739]: input_userauth_request: invalid user root [preauth]
Jan  3 04:34:00 host unix_chkpwd[744]: password check failed for user (root)
Jan  3 04:34:00 host sshd[737]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.94.92.241  user=root
Jan  3 04:34:00 host sshd[737]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 04:34:00 host unix_chkpwd[746]: password check failed for user (root)
Jan  3 04:34:00 host sshd[739]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.94.92.241  user=root
Jan  3 04:34:00 host sshd[739]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 04:34:02 host sshd[737]: Failed password for invalid user root from 80.94.92.241 port 37668 ssh2
Jan  3 04:34:02 host sshd[739]: Failed password for invalid user root from 80.94.92.241 port 37672 ssh2
Jan  3 04:34:02 host sshd[737]: Connection closed by 80.94.92.241 port 37668 [preauth]
Jan  3 04:34:02 host sshd[739]: Connection closed by 80.94.92.241 port 37672 [preauth]
Jan  3 04:38:18 host sshd[1574]: Invalid user service from 194.169.175.102 port 50635
Jan  3 04:38:18 host sshd[1574]: input_userauth_request: invalid user service [preauth]
Jan  3 04:38:18 host sshd[1574]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 04:38:18 host sshd[1574]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.169.175.102
Jan  3 04:38:20 host sshd[1574]: Failed password for invalid user service from 194.169.175.102 port 50635 ssh2
Jan  3 04:38:21 host sshd[1574]: Received disconnect from 194.169.175.102 port 50635:11: Client disconnecting normally [preauth]
Jan  3 04:38:21 host sshd[1574]: Disconnected from 194.169.175.102 port 50635 [preauth]
Jan  3 04:40:03 host sshd[2080]: Invalid user zhangtao from 162.218.126.136 port 53778
Jan  3 04:40:03 host sshd[2080]: input_userauth_request: invalid user zhangtao [preauth]
Jan  3 04:40:04 host sshd[2080]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 04:40:04 host sshd[2080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136
Jan  3 04:40:06 host sshd[2080]: Failed password for invalid user zhangtao from 162.218.126.136 port 53778 ssh2
Jan  3 04:40:06 host sshd[2080]: Connection closed by 162.218.126.136 port 53778 [preauth]
Jan  3 04:51:46 host sshd[3808]: Invalid user peter from 107.189.30.59 port 34596
Jan  3 04:51:46 host sshd[3808]: input_userauth_request: invalid user peter [preauth]
Jan  3 04:51:46 host sshd[3808]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 04:51:46 host sshd[3808]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59
Jan  3 04:51:48 host sshd[3808]: Failed password for invalid user peter from 107.189.30.59 port 34596 ssh2
Jan  3 04:51:49 host sshd[3808]: Connection closed by 107.189.30.59 port 34596 [preauth]
Jan  3 04:56:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  3 04:56:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 04:56:01 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 04:56:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  3 04:56:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 04:56:01 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 04:56:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  3 04:56:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 04:56:01 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 04:56:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  3 04:56:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 04:56:01 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 04:56:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  3 04:56:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 04:56:01 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 04:56:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  3 04:56:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 04:56:01 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 04:56:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  3 04:56:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 04:56:01 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 05:03:08 host sshd[5419]: Invalid user user1 from 41.197.31.178 port 39408
Jan  3 05:03:08 host sshd[5419]: input_userauth_request: invalid user user1 [preauth]
Jan  3 05:03:08 host sshd[5419]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 05:03:08 host sshd[5419]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178
Jan  3 05:03:10 host sshd[5419]: Failed password for invalid user user1 from 41.197.31.178 port 39408 ssh2
Jan  3 05:03:11 host sshd[5419]: Connection closed by 41.197.31.178 port 39408 [preauth]
Jan  3 05:06:22 host sshd[5840]: User root from 106.10.122.53 not allowed because not listed in AllowUsers
Jan  3 05:06:22 host sshd[5840]: input_userauth_request: invalid user root [preauth]
Jan  3 05:06:22 host unix_chkpwd[5844]: password check failed for user (root)
Jan  3 05:06:22 host sshd[5840]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53  user=root
Jan  3 05:06:22 host sshd[5840]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 05:06:23 host sshd[5840]: Failed password for invalid user root from 106.10.122.53 port 39202 ssh2
Jan  3 05:06:23 host sshd[5840]: Connection closed by 106.10.122.53 port 39202 [preauth]
Jan  3 05:07:59 host sshd[6093]: Invalid user admin from 45.93.201.90 port 44424
Jan  3 05:07:59 host sshd[6093]: input_userauth_request: invalid user admin [preauth]
Jan  3 05:07:59 host sshd[6093]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 05:07:59 host sshd[6093]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90
Jan  3 05:08:01 host sshd[6093]: Failed password for invalid user admin from 45.93.201.90 port 44424 ssh2
Jan  3 05:08:04 host sshd[6093]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 05:08:06 host sshd[6093]: Failed password for invalid user admin from 45.93.201.90 port 44424 ssh2
Jan  3 05:08:09 host sshd[6093]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 05:08:11 host sshd[6093]: Failed password for invalid user admin from 45.93.201.90 port 44424 ssh2
Jan  3 05:08:14 host sshd[6093]: Connection closed by 45.93.201.90 port 44424 [preauth]
Jan  3 05:08:14 host sshd[6093]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90
Jan  3 05:13:07 host sshd[7076]: Did not receive identification string from 64.227.181.236 port 61000
Jan  3 05:14:45 host sshd[7405]: Did not receive identification string from 36.156.28.133 port 40890
Jan  3 05:14:48 host sshd[7410]: Protocol major versions differ for 36.156.28.133 port 41178: SSH-2.0-OpenSSH_7.4 vs. SSH-1.5-Nmap-SSH1-Hostkey
Jan  3 05:15:16 host sshd[7426]: Did not receive identification string from 36.156.28.133 port 43382
Jan  3 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  3 05:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 05:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  3 05:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 05:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  3 05:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 05:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  3 05:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 05:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  3 05:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 05:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  3 05:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 05:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  3 05:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 05:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  3 05:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 05:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  3 05:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 05:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  3 05:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 05:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  3 05:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 05:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  3 05:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 05:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  3 05:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 05:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwletsstalkfood user-2=straightcurve user-3=wwwevmhonda user-4=bonifacegroup user-5=mrsclean user-6=wwwnexidigital user-7=phmetals user-8=kottayamcalldriv user-9=gifterman user-10=palco123 user-11=wwwkapin user-12=woodpeck user-13=disposeat user-14=remysagr user-15=wwwkmaorg user-16=pmcresources user-17=wwwtestugo user-18=shalinijames user-19=vfmassets user-20=wwwpmcresource user-21=ugotscom user-22=wwwrmswll user-23=wwwresourcehunte user-24=keralaholi user-25=travelboniface user-26=wwwkaretakers user-27=cochintaxi user-28=laundryboniface user-29=dartsimp user-30=a2zgroup feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  3 05:21:51 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  3 05:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 05:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  3 05:21:51 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 05:21:51 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=evmhonda.com --output=json
Jan  3 05:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 05:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/test -e /home/wwwevmhonda/wordpress-backups
Jan  3 05:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  3 05:21:51 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  3 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && find -H /home/wwwevmhonda/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  3 05:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  3 05:21:51 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  3 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=letsstalkfood.com --output=json
Jan  3 05:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 05:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/wordpress-backups
Jan  3 05:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  3 05:21:51 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  3 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && find -H /home/wwwletsstalkfood/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  3 05:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  3 05:21:51 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  3 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=mrsclean.co.in --output=json
Jan  3 05:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 05:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/wordpress-backups
Jan  3 05:21:52 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  3 05:21:52 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  3 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/backup && find -H /home/mrsclean/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  3 05:21:52 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  3 05:21:52 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  3 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/wordpress-backups
Jan  3 05:21:52 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  3 05:21:52 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  3 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/blog && find -H /home/mrsclean/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  3 05:21:52 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  3 05:21:52 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  3 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=shalinijames.com --output=json
Jan  3 05:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 05:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/wordpress-backups
Jan  3 05:21:52 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  3 05:21:52 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  3 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && find -H /home/shalinijames/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  3 05:21:52 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  3 05:21:52 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  3 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=testugo.in --output=json
Jan  3 05:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 05:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups
Jan  3 05:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 05:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && find -H /home/wwwtestugo/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  3 05:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 05:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups
Jan  3 05:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 05:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && find -H /home/wwwtestugo/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  3 05:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 05:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups
Jan  3 05:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 05:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && find -H /home/wwwtestugo/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  3 05:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 05:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=ugotechnologies.com --output=json
Jan  3 05:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 05:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups
Jan  3 05:21:52 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 05:21:52 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/boniface/blog && find -H /home/ugotscom/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  3 05:21:52 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 05:21:52 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups
Jan  3 05:21:53 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 05:21:53 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && find -H /home/ugotscom/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  3 05:21:53 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 05:21:53 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups
Jan  3 05:21:53 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 05:21:53 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && find -H /home/ugotscom/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  3 05:21:53 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 05:21:53 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=woodpeckerindia.com --output=json
Jan  3 05:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 05:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/test -e /home/woodpeck/wordpress-backups
Jan  3 05:21:53 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0)
Jan  3 05:21:53 host sudo: pam_unix(sudo:session): session closed for user woodpeck
Jan  3 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html/wp && find -H /home/woodpeck/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  3 05:21:53 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0)
Jan  3 05:21:53 host sudo: pam_unix(sudo:session): session closed for user woodpeck
Jan  3 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=panlys.com --output=json
Jan  3 05:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 05:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/wordpress-backups
Jan  3 05:21:53 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  3 05:21:53 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  3 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && find -H /home/palco123/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  3 05:21:53 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  3 05:21:53 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  3 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=resourcehunters.com --output=json
Jan  3 05:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 05:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/test -e /home/wwwresourcehunte/wordpress-backups
Jan  3 05:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  3 05:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  3 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && find -H /home/wwwresourcehunte/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  3 05:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  3 05:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  3 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /var/cpanel/licenseid_credentials.json
Jan  3 05:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 05:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  3 05:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 05:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/cat /home/wwwletsstalkfood/.wp-toolkit-identifier
Jan  3 05:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  3 05:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  3 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=straightcurve ; COMMAND=/bin/cat /home/straightcurve/.wp-toolkit-identifier
Jan  3 05:21:53 host sudo: pam_unix(sudo:session): session opened for user straightcurve by (uid=0)
Jan  3 05:21:53 host sudo: pam_unix(sudo:session): session closed for user straightcurve
Jan  3 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/cat /home/wwwevmhonda/.wp-toolkit-identifier
Jan  3 05:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  3 05:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  3 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=bonifacegroup ; COMMAND=/bin/cat /home/bonifacegroup/.wp-toolkit-identifier
Jan  3 05:21:53 host sudo: pam_unix(sudo:session): session opened for user bonifacegroup by (uid=0)
Jan  3 05:21:53 host sudo: pam_unix(sudo:session): session closed for user bonifacegroup
Jan  3 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/cat /home/mrsclean/.wp-toolkit-identifier
Jan  3 05:21:54 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  3 05:21:54 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  3 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwnexidigital ; COMMAND=/bin/cat /home/wwwnexidigital/.wp-toolkit-identifier
Jan  3 05:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwnexidigital by (uid=0)
Jan  3 05:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwnexidigital
Jan  3 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=phmetals ; COMMAND=/bin/cat /home/phmetals/.wp-toolkit-identifier
Jan  3 05:21:54 host sudo: pam_unix(sudo:session): session opened for user phmetals by (uid=0)
Jan  3 05:21:54 host sudo: pam_unix(sudo:session): session closed for user phmetals
Jan  3 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=kottayamcalldriv ; COMMAND=/bin/cat /home/kottayamcalldriv/.wp-toolkit-identifier
Jan  3 05:21:54 host sudo: pam_unix(sudo:session): session opened for user kottayamcalldriv by (uid=0)
Jan  3 05:21:54 host sudo: pam_unix(sudo:session): session closed for user kottayamcalldriv
Jan  3 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=gifterman ; COMMAND=/bin/cat /home/gifterman/.wp-toolkit-identifier
Jan  3 05:21:54 host sudo: pam_unix(sudo:session): session opened for user gifterman by (uid=0)
Jan  3 05:21:54 host sudo: pam_unix(sudo:session): session closed for user gifterman
Jan  3 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/cat /home/palco123/.wp-toolkit-identifier
Jan  3 05:21:54 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  3 05:21:54 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  3 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkapin ; COMMAND=/bin/cat /home/wwwkapin/.wp-toolkit-identifier
Jan  3 05:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwkapin by (uid=0)
Jan  3 05:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwkapin
Jan  3 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/cat /home/woodpeck/.wp-toolkit-identifier
Jan  3 05:21:54 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0)
Jan  3 05:21:54 host sudo: pam_unix(sudo:session): session closed for user woodpeck
Jan  3 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=disposeat ; COMMAND=/bin/cat /home/disposeat/.wp-toolkit-identifier
Jan  3 05:21:54 host sudo: pam_unix(sudo:session): session opened for user disposeat by (uid=0)
Jan  3 05:21:54 host sudo: pam_unix(sudo:session): session closed for user disposeat
Jan  3 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=remysagr ; COMMAND=/bin/cat /home/remysagr/.wp-toolkit-identifier
Jan  3 05:21:54 host sudo: pam_unix(sudo:session): session opened for user remysagr by (uid=0)
Jan  3 05:21:54 host sudo: pam_unix(sudo:session): session closed for user remysagr
Jan  3 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkmaorg ; COMMAND=/bin/cat /home/wwwkmaorg/.wp-toolkit-identifier
Jan  3 05:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwkmaorg by (uid=0)
Jan  3 05:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwkmaorg
Jan  3 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=pmcresources ; COMMAND=/bin/cat /home/pmcresources/.wp-toolkit-identifier
Jan  3 05:21:54 host sudo: pam_unix(sudo:session): session opened for user pmcresources by (uid=0)
Jan  3 05:21:54 host sudo: pam_unix(sudo:session): session closed for user pmcresources
Jan  3 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/cat /home/wwwtestugo/.wp-toolkit-identifier
Jan  3 05:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 05:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/cat /home/shalinijames/.wp-toolkit-identifier
Jan  3 05:21:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  3 05:21:54 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  3 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=vfmassets ; COMMAND=/bin/cat /home/vfmassets/.wp-toolkit-identifier
Jan  3 05:21:54 host sudo: pam_unix(sudo:session): session opened for user vfmassets by (uid=0)
Jan  3 05:21:54 host sudo: pam_unix(sudo:session): session closed for user vfmassets
Jan  3 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwpmcresource ; COMMAND=/bin/cat /home/wwwpmcresource/.wp-toolkit-identifier
Jan  3 05:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwpmcresource by (uid=0)
Jan  3 05:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwpmcresource
Jan  3 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwrmswll ; COMMAND=/bin/cat /home/wwwrmswll/.wp-toolkit-identifier
Jan  3 05:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwrmswll by (uid=0)
Jan  3 05:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwrmswll
Jan  3 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/cat /home/wwwresourcehunte/.wp-toolkit-identifier
Jan  3 05:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  3 05:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  3 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/cat /home/keralaholi/.wp-toolkit-identifier
Jan  3 05:21:54 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0)
Jan  3 05:21:54 host sudo: pam_unix(sudo:session): session closed for user keralaholi
Jan  3 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -f /home/keralaholi/.wp-toolkit-identifier
Jan  3 05:21:54 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0)
Jan  3 05:21:54 host sudo: pam_unix(sudo:session): session closed for user keralaholi
Jan  3 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -e /home/keralaholi/-wpt-tmp-Wp6oeFrq2CWiHBDm.wp-toolkit-identifier
Jan  3 05:21:55 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0)
Jan  3 05:21:55 host sudo: pam_unix(sudo:session): session closed for user keralaholi
Jan  3 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/sh -c cat > /home/keralaholi/-wpt-tmp-Wp6oeFrq2CWiHBDm.wp-toolkit-identifier
Jan  3 05:21:55 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0)
Jan  3 05:21:55 host sudo: pam_unix(sudo:session): session closed for user keralaholi
Jan  3 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=travelboniface ; COMMAND=/bin/cat /home/travelboniface/.wp-toolkit-identifier
Jan  3 05:21:55 host sudo: pam_unix(sudo:session): session opened for user travelboniface by (uid=0)
Jan  3 05:21:55 host sudo: pam_unix(sudo:session): session closed for user travelboniface
Jan  3 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkaretakers ; COMMAND=/bin/cat /home/wwwkaretakers/.wp-toolkit-identifier
Jan  3 05:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwkaretakers by (uid=0)
Jan  3 05:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwkaretakers
Jan  3 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=cochintaxi ; COMMAND=/bin/cat /home/cochintaxi/.wp-toolkit-identifier
Jan  3 05:21:55 host sudo: pam_unix(sudo:session): session opened for user cochintaxi by (uid=0)
Jan  3 05:21:55 host sudo: pam_unix(sudo:session): session closed for user cochintaxi
Jan  3 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=laundryboniface ; COMMAND=/bin/cat /home/laundryboniface/.wp-toolkit-identifier
Jan  3 05:21:55 host sudo: pam_unix(sudo:session): session opened for user laundryboniface by (uid=0)
Jan  3 05:21:55 host sudo: pam_unix(sudo:session): session closed for user laundryboniface
Jan  3 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=dartsimp ; COMMAND=/bin/cat /home/dartsimp/.wp-toolkit-identifier
Jan  3 05:21:55 host sudo: pam_unix(sudo:session): session opened for user dartsimp by (uid=0)
Jan  3 05:21:55 host sudo: pam_unix(sudo:session): session closed for user dartsimp
Jan  3 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=a2zgroup ; COMMAND=/bin/cat /home/a2zgroup/.wp-toolkit-identifier
Jan  3 05:21:55 host sudo: pam_unix(sudo:session): session opened for user a2zgroup by (uid=0)
Jan  3 05:21:55 host sudo: pam_unix(sudo:session): session closed for user a2zgroup
Jan  3 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/cat /home/keralaholi/.wp-toolkit-identifier
Jan  3 05:21:55 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0)
Jan  3 05:21:55 host sudo: pam_unix(sudo:session): session closed for user keralaholi
Jan  3 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -f /home/keralaholi/.wp-toolkit-identifier
Jan  3 05:21:55 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0)
Jan  3 05:21:55 host sudo: pam_unix(sudo:session): session closed for user keralaholi
Jan  3 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -e /home/keralaholi/-wpt-tmp-HQKizjwM1Kxnvnig.wp-toolkit-identifier
Jan  3 05:21:55 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0)
Jan  3 05:21:55 host sudo: pam_unix(sudo:session): session closed for user keralaholi
Jan  3 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/sh -c cat > /home/keralaholi/-wpt-tmp-HQKizjwM1Kxnvnig.wp-toolkit-identifier
Jan  3 05:21:55 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0)
Jan  3 05:21:55 host sudo: pam_unix(sudo:session): session closed for user keralaholi
Jan  3 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_shared_ip --output=json
Jan  3 05:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 05:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_public_ip ip=167.71.234.10 --output=json
Jan  3 05:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 05:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  3 05:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 05:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Dz4lVv8eoV8OunN7.~
Jan  3 05:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 05:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Dz4lVv8eoV8OunN7.~'
Jan  3 05:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 05:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Dz4lVv8eoV8OunN7.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  3 05:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 05:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  3 05:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 05:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  3 05:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 05:21:59 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  3 05:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 05:21:59 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  3 05:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 05:21:59 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  3 05:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 05:21:59 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  3 05:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 05:22:00 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  3 05:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  3 05:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  3 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  3 05:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  3 05:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  3 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  3 05:22:03 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  3 05:22:05 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  3 05:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  3 05:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 05:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 05:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  3 05:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 05:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 05:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  3 05:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 05:22:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 05:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  3 05:22:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 05:22:10 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 05:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  3 05:22:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 05:22:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 05:22:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  3 05:22:13 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  3 05:22:16 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  3 05:40:31 host sshd[12260]: Invalid user git from 103.13.40.2 port 40474
Jan  3 05:40:31 host sshd[12260]: input_userauth_request: invalid user git [preauth]
Jan  3 05:40:31 host sshd[12260]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 05:40:31 host sshd[12260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2
Jan  3 05:40:34 host sshd[12260]: Failed password for invalid user git from 103.13.40.2 port 40474 ssh2
Jan  3 05:40:34 host sshd[12260]: Connection closed by 103.13.40.2 port 40474 [preauth]
Jan  3 05:44:01 host sshd[12919]: Invalid user user1 from 162.218.126.136 port 38738
Jan  3 05:44:01 host sshd[12919]: input_userauth_request: invalid user user1 [preauth]
Jan  3 05:44:01 host sshd[12919]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 05:44:01 host sshd[12919]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136
Jan  3 05:44:04 host sshd[12919]: Failed password for invalid user user1 from 162.218.126.136 port 38738 ssh2
Jan  3 05:44:04 host sshd[12919]: Connection closed by 162.218.126.136 port 38738 [preauth]
Jan  3 05:56:19 host sshd[14862]: Did not receive identification string from 115.91.170.141 port 41400
Jan  3 06:05:44 host sshd[16356]: User root from 41.242.141.201 not allowed because not listed in AllowUsers
Jan  3 06:05:44 host sshd[16356]: input_userauth_request: invalid user root [preauth]
Jan  3 06:05:45 host unix_chkpwd[16359]: password check failed for user (root)
Jan  3 06:05:45 host sshd[16356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.242.141.201  user=root
Jan  3 06:05:45 host sshd[16356]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 06:05:46 host sshd[16356]: Failed password for invalid user root from 41.242.141.201 port 43334 ssh2
Jan  3 06:05:47 host sshd[16356]: Received disconnect from 41.242.141.201 port 43334:11: Bye Bye [preauth]
Jan  3 06:05:47 host sshd[16356]: Disconnected from 41.242.141.201 port 43334 [preauth]
Jan  3 06:07:00 host sshd[16509]: User root from 187.251.123.99 not allowed because not listed in AllowUsers
Jan  3 06:07:00 host sshd[16509]: input_userauth_request: invalid user root [preauth]
Jan  3 06:07:00 host unix_chkpwd[16512]: password check failed for user (root)
Jan  3 06:07:00 host sshd[16509]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.251.123.99  user=root
Jan  3 06:07:00 host sshd[16509]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 06:07:02 host sshd[16509]: Failed password for invalid user root from 187.251.123.99 port 42916 ssh2
Jan  3 06:07:03 host sshd[16509]: Received disconnect from 187.251.123.99 port 42916:11: Bye Bye [preauth]
Jan  3 06:07:03 host sshd[16509]: Disconnected from 187.251.123.99 port 42916 [preauth]
Jan  3 06:07:20 host sshd[16550]: User root from 42.200.78.78 not allowed because not listed in AllowUsers
Jan  3 06:07:20 host sshd[16550]: input_userauth_request: invalid user root [preauth]
Jan  3 06:07:20 host unix_chkpwd[16553]: password check failed for user (root)
Jan  3 06:07:20 host sshd[16550]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.200.78.78  user=root
Jan  3 06:07:20 host sshd[16550]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 06:07:22 host sshd[16550]: Failed password for invalid user root from 42.200.78.78 port 40846 ssh2
Jan  3 06:07:22 host sshd[16550]: Received disconnect from 42.200.78.78 port 40846:11: Bye Bye [preauth]
Jan  3 06:07:22 host sshd[16550]: Disconnected from 42.200.78.78 port 40846 [preauth]
Jan  3 06:07:26 host sshd[16559]: User root from 154.83.15.109 not allowed because not listed in AllowUsers
Jan  3 06:07:26 host sshd[16559]: input_userauth_request: invalid user root [preauth]
Jan  3 06:07:26 host unix_chkpwd[16581]: password check failed for user (root)
Jan  3 06:07:26 host sshd[16559]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.83.15.109  user=root
Jan  3 06:07:26 host sshd[16559]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 06:07:27 host sshd[16559]: Failed password for invalid user root from 154.83.15.109 port 56752 ssh2
Jan  3 06:07:27 host sshd[16559]: Received disconnect from 154.83.15.109 port 56752:11: Bye Bye [preauth]
Jan  3 06:07:27 host sshd[16559]: Disconnected from 154.83.15.109 port 56752 [preauth]
Jan  3 06:10:29 host sshd[17071]: User root from 167.71.238.89 not allowed because not listed in AllowUsers
Jan  3 06:10:29 host sshd[17071]: input_userauth_request: invalid user root [preauth]
Jan  3 06:10:29 host unix_chkpwd[17073]: password check failed for user (root)
Jan  3 06:10:29 host sshd[17071]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.238.89  user=root
Jan  3 06:10:29 host sshd[17071]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 06:10:31 host sshd[17071]: Failed password for invalid user root from 167.71.238.89 port 58202 ssh2
Jan  3 06:10:31 host sshd[17071]: Received disconnect from 167.71.238.89 port 58202:11: Bye Bye [preauth]
Jan  3 06:10:31 host sshd[17071]: Disconnected from 167.71.238.89 port 58202 [preauth]
Jan  3 06:10:44 host sshd[17092]: User root from 143.198.226.152 not allowed because not listed in AllowUsers
Jan  3 06:10:44 host sshd[17092]: input_userauth_request: invalid user root [preauth]
Jan  3 06:10:44 host unix_chkpwd[17097]: password check failed for user (root)
Jan  3 06:10:44 host sshd[17092]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.226.152  user=root
Jan  3 06:10:44 host sshd[17092]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 06:10:46 host sshd[17092]: Failed password for invalid user root from 143.198.226.152 port 55870 ssh2
Jan  3 06:10:46 host sshd[17092]: Received disconnect from 143.198.226.152 port 55870:11: Bye Bye [preauth]
Jan  3 06:10:46 host sshd[17092]: Disconnected from 143.198.226.152 port 55870 [preauth]
Jan  3 06:11:02 host sshd[17117]: User root from 165.227.95.131 not allowed because not listed in AllowUsers
Jan  3 06:11:02 host sshd[17117]: input_userauth_request: invalid user root [preauth]
Jan  3 06:11:02 host unix_chkpwd[17130]: password check failed for user (root)
Jan  3 06:11:02 host sshd[17117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.95.131  user=root
Jan  3 06:11:02 host sshd[17117]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 06:11:04 host sshd[17117]: Failed password for invalid user root from 165.227.95.131 port 51670 ssh2
Jan  3 06:11:04 host sshd[17117]: Received disconnect from 165.227.95.131 port 51670:11: Bye Bye [preauth]
Jan  3 06:11:04 host sshd[17117]: Disconnected from 165.227.95.131 port 51670 [preauth]
Jan  3 06:11:55 host sshd[17219]: User root from 42.200.78.78 not allowed because not listed in AllowUsers
Jan  3 06:11:55 host sshd[17219]: input_userauth_request: invalid user root [preauth]
Jan  3 06:11:55 host unix_chkpwd[17222]: password check failed for user (root)
Jan  3 06:11:55 host sshd[17219]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.200.78.78  user=root
Jan  3 06:11:55 host sshd[17219]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 06:11:58 host sshd[17219]: Failed password for invalid user root from 42.200.78.78 port 35298 ssh2
Jan  3 06:11:58 host sshd[17219]: Received disconnect from 42.200.78.78 port 35298:11: Bye Bye [preauth]
Jan  3 06:11:58 host sshd[17219]: Disconnected from 42.200.78.78 port 35298 [preauth]
Jan  3 06:12:22 host sshd[17305]: User root from 187.251.123.99 not allowed because not listed in AllowUsers
Jan  3 06:12:22 host sshd[17305]: input_userauth_request: invalid user root [preauth]
Jan  3 06:12:22 host unix_chkpwd[17310]: password check failed for user (root)
Jan  3 06:12:22 host sshd[17305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.251.123.99  user=root
Jan  3 06:12:22 host sshd[17305]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 06:12:23 host sshd[17302]: User root from 41.59.86.232 not allowed because not listed in AllowUsers
Jan  3 06:12:23 host sshd[17302]: input_userauth_request: invalid user root [preauth]
Jan  3 06:12:23 host unix_chkpwd[17312]: password check failed for user (root)
Jan  3 06:12:23 host sshd[17302]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.59.86.232  user=root
Jan  3 06:12:23 host sshd[17302]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 06:12:24 host sshd[17305]: Failed password for invalid user root from 187.251.123.99 port 58000 ssh2
Jan  3 06:12:24 host sshd[17305]: Received disconnect from 187.251.123.99 port 58000:11: Bye Bye [preauth]
Jan  3 06:12:24 host sshd[17305]: Disconnected from 187.251.123.99 port 58000 [preauth]
Jan  3 06:12:25 host sshd[17302]: Failed password for invalid user root from 41.59.86.232 port 48308 ssh2
Jan  3 06:12:26 host sshd[17302]: Received disconnect from 41.59.86.232 port 48308:11: Bye Bye [preauth]
Jan  3 06:12:26 host sshd[17302]: Disconnected from 41.59.86.232 port 48308 [preauth]
Jan  3 06:12:35 host sshd[17374]: User root from 165.227.95.131 not allowed because not listed in AllowUsers
Jan  3 06:12:35 host sshd[17374]: input_userauth_request: invalid user root [preauth]
Jan  3 06:12:35 host unix_chkpwd[17378]: password check failed for user (root)
Jan  3 06:12:35 host sshd[17374]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.95.131  user=root
Jan  3 06:12:35 host sshd[17374]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 06:12:37 host sshd[17374]: Failed password for invalid user root from 165.227.95.131 port 54512 ssh2
Jan  3 06:12:37 host sshd[17374]: Received disconnect from 165.227.95.131 port 54512:11: Bye Bye [preauth]
Jan  3 06:12:37 host sshd[17374]: Disconnected from 165.227.95.131 port 54512 [preauth]
Jan  3 06:12:50 host sshd[17430]: User root from 154.83.15.109 not allowed because not listed in AllowUsers
Jan  3 06:12:50 host sshd[17430]: input_userauth_request: invalid user root [preauth]
Jan  3 06:12:50 host unix_chkpwd[17432]: password check failed for user (root)
Jan  3 06:12:50 host sshd[17430]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.83.15.109  user=root
Jan  3 06:12:50 host sshd[17430]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 06:12:53 host sshd[17430]: Failed password for invalid user root from 154.83.15.109 port 52122 ssh2
Jan  3 06:12:53 host sshd[17430]: Received disconnect from 154.83.15.109 port 52122:11: Bye Bye [preauth]
Jan  3 06:12:53 host sshd[17430]: Disconnected from 154.83.15.109 port 52122 [preauth]
Jan  3 06:13:05 host sshd[17498]: User root from 167.71.238.89 not allowed because not listed in AllowUsers
Jan  3 06:13:05 host sshd[17498]: input_userauth_request: invalid user root [preauth]
Jan  3 06:13:05 host unix_chkpwd[17500]: password check failed for user (root)
Jan  3 06:13:05 host sshd[17498]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.238.89  user=root
Jan  3 06:13:05 host sshd[17498]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 06:13:07 host sshd[17498]: Failed password for invalid user root from 167.71.238.89 port 51558 ssh2
Jan  3 06:13:07 host sshd[17498]: Received disconnect from 167.71.238.89 port 51558:11: Bye Bye [preauth]
Jan  3 06:13:07 host sshd[17498]: Disconnected from 167.71.238.89 port 51558 [preauth]
Jan  3 06:13:18 host sshd[17551]: User root from 41.242.141.201 not allowed because not listed in AllowUsers
Jan  3 06:13:18 host sshd[17551]: input_userauth_request: invalid user root [preauth]
Jan  3 06:13:18 host unix_chkpwd[17554]: password check failed for user (root)
Jan  3 06:13:18 host sshd[17551]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.242.141.201  user=root
Jan  3 06:13:18 host sshd[17551]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 06:13:20 host sshd[17551]: Failed password for invalid user root from 41.242.141.201 port 47070 ssh2
Jan  3 06:13:50 host sshd[17647]: User root from 143.198.226.152 not allowed because not listed in AllowUsers
Jan  3 06:13:50 host sshd[17647]: input_userauth_request: invalid user root [preauth]
Jan  3 06:13:50 host unix_chkpwd[17652]: password check failed for user (root)
Jan  3 06:13:50 host sshd[17647]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.226.152  user=root
Jan  3 06:13:50 host sshd[17647]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 06:13:52 host sshd[17647]: Failed password for invalid user root from 143.198.226.152 port 40914 ssh2
Jan  3 06:13:52 host sshd[17647]: Received disconnect from 143.198.226.152 port 40914:11: Bye Bye [preauth]
Jan  3 06:13:52 host sshd[17647]: Disconnected from 143.198.226.152 port 40914 [preauth]
Jan  3 06:15:19 host sshd[17927]: Connection closed by 192.155.90.118 port 43040 [preauth]
Jan  3 06:15:20 host sshd[17929]: User root from 41.59.86.232 not allowed because not listed in AllowUsers
Jan  3 06:15:20 host sshd[17929]: input_userauth_request: invalid user root [preauth]
Jan  3 06:15:20 host unix_chkpwd[17952]: password check failed for user (root)
Jan  3 06:15:20 host sshd[17929]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.59.86.232  user=root
Jan  3 06:15:20 host sshd[17929]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 06:15:22 host sshd[17934]: Connection closed by 192.155.90.118 port 43042 [preauth]
Jan  3 06:15:22 host sshd[17929]: Failed password for invalid user root from 41.59.86.232 port 35284 ssh2
Jan  3 06:15:23 host sshd[17929]: Received disconnect from 41.59.86.232 port 35284:11: Bye Bye [preauth]
Jan  3 06:15:23 host sshd[17929]: Disconnected from 41.59.86.232 port 35284 [preauth]
Jan  3 06:15:24 host sshd[18012]: Connection closed by 192.155.90.118 port 51010 [preauth]
Jan  3 06:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  3 06:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 06:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 06:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  3 06:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 06:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 06:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  3 06:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 06:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 06:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  3 06:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 06:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 06:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  3 06:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 06:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 06:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  3 06:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 06:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 06:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  3 06:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 06:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 06:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  3 06:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 06:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 06:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  3 06:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 06:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 06:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  3 06:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 06:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 06:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  3 06:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 06:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 06:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  3 06:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 06:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 06:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  3 06:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 06:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 06:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkapin user-2=woodpeck user-3=wwwkmaorg user-4=disposeat user-5=remysagr user-6=pmcresources user-7=vfmassets user-8=wwwtestugo user-9=shalinijames user-10=wwwletsstalkfood user-11=straightcurve user-12=bonifacegroup user-13=wwwevmhonda user-14=mrsclean user-15=wwwnexidigital user-16=gifterman user-17=palco123 user-18=kottayamcalldriv user-19=phmetals user-20=wwwkaretakers user-21=cochintaxi user-22=laundryboniface user-23=dartsimp user-24=a2zgroup user-25=wwwpmcresource user-26=wwwrmswll user-27=keralaholi user-28=wwwresourcehunte user-29=ugotscom user-30=travelboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  3 06:21:51 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  3 06:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 06:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 06:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  3 06:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 06:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 06:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-UbouQa86dM8nel9l.~
Jan  3 06:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 06:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 06:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-UbouQa86dM8nel9l.~'
Jan  3 06:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 06:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 06:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-UbouQa86dM8nel9l.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  3 06:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 06:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 06:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  3 06:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 06:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 06:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  3 06:21:52 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 06:21:52 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 06:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  3 06:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 06:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 06:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  3 06:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 06:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 06:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  3 06:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 06:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 06:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  3 06:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 06:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 06:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  3 06:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 06:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 06:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  3 06:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  3 06:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  3 06:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  3 06:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  3 06:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  3 06:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  3 06:21:58 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  3 06:22:00 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  3 06:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  3 06:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 06:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 06:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  3 06:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 06:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 06:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  3 06:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 06:22:10 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 06:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  3 06:22:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 06:22:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 06:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  3 06:22:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 06:22:13 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 06:22:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  3 06:22:13 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  3 06:22:15 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  3 06:27:44 host sshd[20197]: Invalid user jboss from 106.10.122.53 port 46860
Jan  3 06:27:44 host sshd[20197]: input_userauth_request: invalid user jboss [preauth]
Jan  3 06:27:44 host sshd[20197]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 06:27:44 host sshd[20197]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53
Jan  3 06:27:46 host sshd[20197]: Failed password for invalid user jboss from 106.10.122.53 port 46860 ssh2
Jan  3 06:27:47 host sshd[20197]: Connection closed by 106.10.122.53 port 46860 [preauth]
Jan  3 06:32:46 host sshd[21088]: Invalid user user from 92.46.108.20 port 51296
Jan  3 06:32:46 host sshd[21088]: input_userauth_request: invalid user user [preauth]
Jan  3 06:32:46 host sshd[21088]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 06:32:46 host sshd[21088]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20
Jan  3 06:32:48 host sshd[21088]: Failed password for invalid user user from 92.46.108.20 port 51296 ssh2
Jan  3 06:32:49 host sshd[21088]: Connection closed by 92.46.108.20 port 51296 [preauth]
Jan  3 06:33:56 host sshd[21255]: User root from 41.197.31.178 not allowed because not listed in AllowUsers
Jan  3 06:33:56 host sshd[21255]: input_userauth_request: invalid user root [preauth]
Jan  3 06:33:57 host unix_chkpwd[21261]: password check failed for user (root)
Jan  3 06:33:57 host sshd[21255]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178  user=root
Jan  3 06:33:57 host sshd[21255]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 06:33:59 host sshd[21255]: Failed password for invalid user root from 41.197.31.178 port 52814 ssh2
Jan  3 06:33:59 host sshd[21255]: Connection closed by 41.197.31.178 port 52814 [preauth]
Jan  3 06:48:32 host sshd[23862]: User root from 162.218.126.136 not allowed because not listed in AllowUsers
Jan  3 06:48:32 host sshd[23862]: input_userauth_request: invalid user root [preauth]
Jan  3 06:48:32 host unix_chkpwd[23866]: password check failed for user (root)
Jan  3 06:48:32 host sshd[23862]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136  user=root
Jan  3 06:48:32 host sshd[23862]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 06:48:34 host sshd[23862]: Failed password for invalid user root from 162.218.126.136 port 38976 ssh2
Jan  3 06:48:34 host sshd[23862]: Connection closed by 162.218.126.136 port 38976 [preauth]
Jan  3 07:06:03 host sshd[26727]: User root from 103.13.40.2 not allowed because not listed in AllowUsers
Jan  3 07:06:03 host sshd[26727]: input_userauth_request: invalid user root [preauth]
Jan  3 07:06:03 host unix_chkpwd[26729]: password check failed for user (root)
Jan  3 07:06:03 host sshd[26727]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2  user=root
Jan  3 07:06:03 host sshd[26727]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 07:06:05 host sshd[26727]: Failed password for invalid user root from 103.13.40.2 port 47380 ssh2
Jan  3 07:06:05 host sshd[26727]: Connection closed by 103.13.40.2 port 47380 [preauth]
Jan  3 07:17:15 host sshd[28413]: User root from 36.110.228.254 not allowed because not listed in AllowUsers
Jan  3 07:17:15 host sshd[28413]: input_userauth_request: invalid user root [preauth]
Jan  3 07:17:15 host unix_chkpwd[28420]: password check failed for user (root)
Jan  3 07:17:15 host sshd[28413]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.110.228.254  user=root
Jan  3 07:17:15 host sshd[28413]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 07:17:17 host sshd[28413]: Failed password for invalid user root from 36.110.228.254 port 55978 ssh2
Jan  3 07:17:17 host unix_chkpwd[28423]: password check failed for user (root)
Jan  3 07:17:17 host sshd[28413]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 07:17:20 host sshd[28413]: Failed password for invalid user root from 36.110.228.254 port 55978 ssh2
Jan  3 07:17:20 host unix_chkpwd[28426]: password check failed for user (root)
Jan  3 07:17:20 host sshd[28413]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 07:17:22 host sshd[28413]: Failed password for invalid user root from 36.110.228.254 port 55978 ssh2
Jan  3 07:17:23 host unix_chkpwd[28435]: password check failed for user (root)
Jan  3 07:17:23 host sshd[28413]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 07:17:25 host sshd[28413]: Failed password for invalid user root from 36.110.228.254 port 55978 ssh2
Jan  3 07:17:25 host unix_chkpwd[28438]: password check failed for user (root)
Jan  3 07:17:25 host sshd[28413]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 07:17:27 host sshd[28413]: Failed password for invalid user root from 36.110.228.254 port 55978 ssh2
Jan  3 07:17:27 host unix_chkpwd[28469]: password check failed for user (root)
Jan  3 07:17:27 host sshd[28413]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 07:17:29 host sshd[28413]: Failed password for invalid user root from 36.110.228.254 port 55978 ssh2
Jan  3 07:17:29 host sshd[28413]: error: maximum authentication attempts exceeded for invalid user root from 36.110.228.254 port 55978 ssh2 [preauth]
Jan  3 07:17:29 host sshd[28413]: Disconnecting: Too many authentication failures [preauth]
Jan  3 07:17:29 host sshd[28413]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.110.228.254  user=root
Jan  3 07:17:29 host sshd[28413]: PAM service(sshd) ignoring max retries; 6 > 3
Jan  3 07:18:29 host sshd[28725]: Invalid user admin from 45.93.201.90 port 38456
Jan  3 07:18:29 host sshd[28725]: input_userauth_request: invalid user admin [preauth]
Jan  3 07:18:29 host sshd[28725]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 07:18:29 host sshd[28725]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90
Jan  3 07:18:30 host sshd[28725]: Failed password for invalid user admin from 45.93.201.90 port 38456 ssh2
Jan  3 07:18:33 host sshd[28725]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 07:18:35 host sshd[28725]: Failed password for invalid user admin from 45.93.201.90 port 38456 ssh2
Jan  3 07:18:39 host sshd[28725]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 07:18:41 host sshd[28725]: Failed password for invalid user admin from 45.93.201.90 port 38456 ssh2
Jan  3 07:18:44 host sshd[28725]: Connection closed by 45.93.201.90 port 38456 [preauth]
Jan  3 07:18:44 host sshd[28725]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90
Jan  3 07:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  3 07:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 07:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 07:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  3 07:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 07:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 07:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  3 07:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 07:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 07:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  3 07:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 07:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 07:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  3 07:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 07:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 07:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  3 07:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 07:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 07:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  3 07:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 07:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 07:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  3 07:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 07:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 07:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  3 07:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 07:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 07:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  3 07:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 07:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 07:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  3 07:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 07:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 07:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  3 07:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 07:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 07:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  3 07:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 07:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 07:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=vfmassets user-2=shalinijames user-3=wwwtestugo user-4=pmcresources user-5=disposeat user-6=wwwkmaorg user-7=remysagr user-8=woodpeck user-9=wwwkapin user-10=palco123 user-11=gifterman user-12=kottayamcalldriv user-13=phmetals user-14=wwwnexidigital user-15=mrsclean user-16=bonifacegroup user-17=wwwevmhonda user-18=straightcurve user-19=wwwletsstalkfood user-20=a2zgroup user-21=dartsimp user-22=laundryboniface user-23=wwwkaretakers user-24=cochintaxi user-25=travelboniface user-26=keralaholi user-27=wwwresourcehunte user-28=wwwrmswll user-29=ugotscom user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  3 07:21:51 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  3 07:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 07:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 07:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  3 07:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 07:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 07:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-UkTM2NeTk79FtoYJ.~
Jan  3 07:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 07:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 07:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-UkTM2NeTk79FtoYJ.~'
Jan  3 07:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 07:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 07:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-UkTM2NeTk79FtoYJ.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  3 07:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 07:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 07:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  3 07:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 07:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 07:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  3 07:21:52 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 07:21:52 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 07:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  3 07:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 07:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 07:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  3 07:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 07:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 07:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  3 07:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 07:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 07:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  3 07:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 07:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 07:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  3 07:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 07:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 07:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  3 07:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  3 07:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  3 07:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  3 07:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  3 07:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  3 07:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  3 07:21:56 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  3 07:21:58 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  3 07:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  3 07:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 07:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 07:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  3 07:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 07:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 07:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  3 07:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 07:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 07:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  3 07:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 07:22:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 07:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  3 07:22:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 07:22:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 07:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  3 07:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  3 07:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  3 07:49:00 host sshd[2048]: Invalid user lj from 106.10.122.53 port 48978
Jan  3 07:49:00 host sshd[2048]: input_userauth_request: invalid user lj [preauth]
Jan  3 07:49:00 host sshd[2048]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 07:49:00 host sshd[2048]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53
Jan  3 07:49:03 host sshd[2048]: Failed password for invalid user lj from 106.10.122.53 port 48978 ssh2
Jan  3 07:49:03 host sshd[2048]: Connection closed by 106.10.122.53 port 48978 [preauth]
Jan  3 07:49:36 host sshd[2159]: Did not receive identification string from 178.88.161.82 port 55348
Jan  3 07:49:37 host sshd[2161]: Invalid user steam from 178.88.161.82 port 55520
Jan  3 07:49:37 host sshd[2161]: input_userauth_request: invalid user steam [preauth]
Jan  3 07:49:37 host sshd[2162]: Invalid user guest from 178.88.161.82 port 55464
Jan  3 07:49:37 host sshd[2162]: input_userauth_request: invalid user guest [preauth]
Jan  3 07:49:37 host sshd[2164]: User centos from 178.88.161.82 not allowed because not listed in AllowUsers
Jan  3 07:49:37 host sshd[2164]: input_userauth_request: invalid user centos [preauth]
Jan  3 07:49:37 host sshd[2165]: Invalid user steam from 178.88.161.82 port 55412
Jan  3 07:49:37 host sshd[2165]: input_userauth_request: invalid user steam [preauth]
Jan  3 07:49:37 host sshd[2166]: Invalid user ftpuser from 178.88.161.82 port 55680
Jan  3 07:49:37 host sshd[2166]: input_userauth_request: invalid user ftpuser [preauth]
Jan  3 07:49:37 host sshd[2163]: Invalid user test from 178.88.161.82 port 55672
Jan  3 07:49:37 host sshd[2163]: input_userauth_request: invalid user test [preauth]
Jan  3 07:49:37 host sshd[2167]: User mysql from 178.88.161.82 not allowed because not listed in AllowUsers
Jan  3 07:49:37 host sshd[2167]: input_userauth_request: invalid user mysql [preauth]
Jan  3 07:49:37 host sshd[2169]: Invalid user guest from 178.88.161.82 port 55486
Jan  3 07:49:37 host sshd[2169]: input_userauth_request: invalid user guest [preauth]
Jan  3 07:49:37 host sshd[2171]: Invalid user steam from 178.88.161.82 port 55602
Jan  3 07:49:37 host sshd[2171]: input_userauth_request: invalid user steam [preauth]
Jan  3 07:49:37 host sshd[2170]: Invalid user posiflex from 178.88.161.82 port 55530
Jan  3 07:49:37 host sshd[2170]: input_userauth_request: invalid user posiflex [preauth]
Jan  3 07:49:37 host sshd[2172]: Invalid user vagrant from 178.88.161.82 port 55546
Jan  3 07:49:37 host sshd[2172]: input_userauth_request: invalid user vagrant [preauth]
Jan  3 07:49:37 host sshd[2175]: Invalid user ftpuser from 178.88.161.82 port 55402
Jan  3 07:49:37 host sshd[2175]: input_userauth_request: invalid user ftpuser [preauth]
Jan  3 07:49:37 host sshd[2176]: Invalid user user from 178.88.161.82 port 55378
Jan  3 07:49:37 host sshd[2176]: input_userauth_request: invalid user user [preauth]
Jan  3 07:49:37 host sshd[2178]: Invalid user user from 178.88.161.82 port 55606
Jan  3 07:49:37 host sshd[2178]: input_userauth_request: invalid user user [preauth]
Jan  3 07:49:37 host sshd[2173]: Invalid user hadoop from 178.88.161.82 port 55670
Jan  3 07:49:37 host sshd[2173]: input_userauth_request: invalid user hadoop [preauth]
Jan  3 07:49:37 host sshd[2179]: Invalid user test from 178.88.161.82 port 55700
Jan  3 07:49:37 host sshd[2179]: input_userauth_request: invalid user test [preauth]
Jan  3 07:49:37 host sshd[2182]: Invalid user bot from 178.88.161.82 port 55618
Jan  3 07:49:37 host sshd[2182]: input_userauth_request: invalid user bot [preauth]
Jan  3 07:49:37 host sshd[2177]: User centos from 178.88.161.82 not allowed because not listed in AllowUsers
Jan  3 07:49:37 host sshd[2177]: input_userauth_request: invalid user centos [preauth]
Jan  3 07:49:37 host sshd[2180]: Invalid user ansadmin from 178.88.161.82 port 55568
Jan  3 07:49:37 host sshd[2180]: input_userauth_request: invalid user ansadmin [preauth]
Jan  3 07:49:37 host sshd[2189]: Invalid user web from 178.88.161.82 port 55436
Jan  3 07:49:37 host sshd[2189]: input_userauth_request: invalid user web [preauth]
Jan  3 07:49:37 host sshd[2183]: Invalid user posiflex from 178.88.161.82 port 55578
Jan  3 07:49:37 host sshd[2184]: Invalid user mailadmin from 178.88.161.82 port 55552
Jan  3 07:49:37 host sshd[2183]: input_userauth_request: invalid user posiflex [preauth]
Jan  3 07:49:37 host sshd[2185]: Invalid user linux from 178.88.161.82 port 55702
Jan  3 07:49:37 host sshd[2185]: input_userauth_request: invalid user linux [preauth]
Jan  3 07:49:37 host sshd[2188]: User mysql from 178.88.161.82 not allowed because not listed in AllowUsers
Jan  3 07:49:37 host sshd[2188]: input_userauth_request: invalid user mysql [preauth]
Jan  3 07:49:37 host sshd[2184]: input_userauth_request: invalid user mailadmin [preauth]
Jan  3 07:49:37 host sshd[2187]: Invalid user ubuntu from 178.88.161.82 port 55650
Jan  3 07:49:37 host sshd[2187]: input_userauth_request: invalid user ubuntu [preauth]
Jan  3 07:49:37 host sshd[2196]: Invalid user devops from 178.88.161.82 port 55474
Jan  3 07:49:37 host sshd[2196]: input_userauth_request: invalid user devops [preauth]
Jan  3 07:49:37 host sshd[2197]: Invalid user ec2-user from 178.88.161.82 port 55694
Jan  3 07:49:37 host sshd[2197]: input_userauth_request: invalid user ec2-user [preauth]
Jan  3 07:49:37 host sshd[2194]: Invalid user ftpuser from 178.88.161.82 port 55496
Jan  3 07:49:37 host sshd[2194]: input_userauth_request: invalid user ftpuser [preauth]
Jan  3 07:49:37 host sshd[2195]: Invalid user ftpuser from 178.88.161.82 port 55664
Jan  3 07:49:37 host sshd[2195]: input_userauth_request: invalid user ftpuser [preauth]
Jan  3 07:49:37 host sshd[2161]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 07:49:37 host sshd[2161]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82
Jan  3 07:49:37 host sshd[2206]: Invalid user oracle from 178.88.161.82 port 55590
Jan  3 07:49:37 host sshd[2206]: input_userauth_request: invalid user oracle [preauth]
Jan  3 07:49:37 host sshd[2162]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 07:49:37 host sshd[2162]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82
Jan  3 07:49:37 host unix_chkpwd[2222]: password check failed for user (centos)
Jan  3 07:49:37 host sshd[2164]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82  user=centos
Jan  3 07:49:37 host sshd[2166]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 07:49:37 host sshd[2165]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 07:49:37 host sshd[2163]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 07:49:37 host sshd[2166]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82
Jan  3 07:49:37 host sshd[2163]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82
Jan  3 07:49:37 host sshd[2165]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82
Jan  3 07:49:37 host unix_chkpwd[2223]: password check failed for user (mysql)
Jan  3 07:49:37 host sshd[2167]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82  user=mysql
Jan  3 07:49:37 host sshd[2167]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "mysql"
Jan  3 07:49:37 host sshd[2171]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 07:49:37 host sshd[2171]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82
Jan  3 07:49:37 host sshd[2169]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 07:49:37 host sshd[2169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82
Jan  3 07:49:37 host sshd[2170]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 07:49:37 host sshd[2170]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82
Jan  3 07:49:37 host sshd[2172]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 07:49:37 host sshd[2172]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82
Jan  3 07:49:37 host sshd[2175]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 07:49:37 host sshd[2175]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82
Jan  3 07:49:37 host sshd[2176]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 07:49:37 host sshd[2176]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82
Jan  3 07:49:37 host sshd[2173]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 07:49:37 host sshd[2173]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82
Jan  3 07:49:37 host sshd[2178]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 07:49:37 host sshd[2178]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82
Jan  3 07:49:37 host sshd[2179]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 07:49:37 host sshd[2179]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82
Jan  3 07:49:37 host sshd[2182]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 07:49:37 host sshd[2182]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82
Jan  3 07:49:37 host sshd[2180]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 07:49:37 host sshd[2180]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82
Jan  3 07:49:37 host unix_chkpwd[2224]: password check failed for user (centos)
Jan  3 07:49:37 host sshd[2177]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82  user=centos
Jan  3 07:49:37 host sshd[2189]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 07:49:37 host sshd[2189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82
Jan  3 07:49:37 host sshd[2184]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 07:49:37 host sshd[2184]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82
Jan  3 07:49:37 host sshd[2185]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 07:49:37 host sshd[2185]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82
Jan  3 07:49:37 host unix_chkpwd[2225]: password check failed for user (mysql)
Jan  3 07:49:37 host sshd[2188]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82  user=mysql
Jan  3 07:49:37 host sshd[2188]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "mysql"
Jan  3 07:49:37 host sshd[2183]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 07:49:37 host sshd[2183]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82
Jan  3 07:49:37 host sshd[2187]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 07:49:37 host sshd[2187]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82
Jan  3 07:49:37 host sshd[2197]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 07:49:37 host sshd[2197]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82
Jan  3 07:49:38 host sshd[2196]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 07:49:38 host sshd[2196]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82
Jan  3 07:49:38 host sshd[2194]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 07:49:38 host sshd[2194]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82
Jan  3 07:49:38 host sshd[2206]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 07:49:38 host sshd[2206]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82
Jan  3 07:49:38 host sshd[2195]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 07:49:38 host sshd[2195]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82
Jan  3 07:49:39 host sshd[2161]: Failed password for invalid user steam from 178.88.161.82 port 55520 ssh2
Jan  3 07:49:39 host sshd[2162]: Failed password for invalid user guest from 178.88.161.82 port 55464 ssh2
Jan  3 07:49:39 host sshd[2164]: Failed password for invalid user centos from 178.88.161.82 port 55638 ssh2
Jan  3 07:49:39 host sshd[2163]: Failed password for invalid user test from 178.88.161.82 port 55672 ssh2
Jan  3 07:49:39 host sshd[2166]: Failed password for invalid user ftpuser from 178.88.161.82 port 55680 ssh2
Jan  3 07:49:39 host sshd[2165]: Failed password for invalid user steam from 178.88.161.82 port 55412 ssh2
Jan  3 07:49:39 host sshd[2167]: Failed password for invalid user mysql from 178.88.161.82 port 55492 ssh2
Jan  3 07:49:39 host sshd[2171]: Failed password for invalid user steam from 178.88.161.82 port 55602 ssh2
Jan  3 07:49:39 host sshd[2169]: Failed password for invalid user guest from 178.88.161.82 port 55486 ssh2
Jan  3 07:49:39 host sshd[2170]: Failed password for invalid user posiflex from 178.88.161.82 port 55530 ssh2
Jan  3 07:49:39 host sshd[2172]: Failed password for invalid user vagrant from 178.88.161.82 port 55546 ssh2
Jan  3 07:49:39 host sshd[2175]: Failed password for invalid user ftpuser from 178.88.161.82 port 55402 ssh2
Jan  3 07:49:39 host sshd[2176]: Failed password for invalid user user from 178.88.161.82 port 55378 ssh2
Jan  3 07:49:39 host sshd[2173]: Failed password for invalid user hadoop from 178.88.161.82 port 55670 ssh2
Jan  3 07:49:39 host sshd[2178]: Failed password for invalid user user from 178.88.161.82 port 55606 ssh2
Jan  3 07:49:39 host sshd[2179]: Failed password for invalid user test from 178.88.161.82 port 55700 ssh2
Jan  3 07:49:39 host sshd[2182]: Failed password for invalid user bot from 178.88.161.82 port 55618 ssh2
Jan  3 07:49:39 host sshd[2180]: Failed password for invalid user ansadmin from 178.88.161.82 port 55568 ssh2
Jan  3 07:49:39 host sshd[2177]: Failed password for invalid user centos from 178.88.161.82 port 55388 ssh2
Jan  3 07:49:39 host sshd[2189]: Failed password for invalid user web from 178.88.161.82 port 55436 ssh2
Jan  3 07:49:39 host sshd[2184]: Failed password for invalid user mailadmin from 178.88.161.82 port 55552 ssh2
Jan  3 07:49:39 host sshd[2185]: Failed password for invalid user linux from 178.88.161.82 port 55702 ssh2
Jan  3 07:49:39 host sshd[2188]: Failed password for invalid user mysql from 178.88.161.82 port 55612 ssh2
Jan  3 07:49:39 host sshd[2183]: Failed password for invalid user posiflex from 178.88.161.82 port 55578 ssh2
Jan  3 07:49:40 host sshd[2187]: Failed password for invalid user ubuntu from 178.88.161.82 port 55650 ssh2
Jan  3 07:49:40 host sshd[2197]: Failed password for invalid user ec2-user from 178.88.161.82 port 55694 ssh2
Jan  3 07:49:41 host sshd[2196]: Failed password for invalid user devops from 178.88.161.82 port 55474 ssh2
Jan  3 07:49:41 host sshd[2194]: Failed password for invalid user ftpuser from 178.88.161.82 port 55496 ssh2
Jan  3 07:49:41 host sshd[2206]: Failed password for invalid user oracle from 178.88.161.82 port 55590 ssh2
Jan  3 07:49:41 host sshd[2195]: Failed password for invalid user ftpuser from 178.88.161.82 port 55664 ssh2
Jan  3 07:57:06 host sshd[3379]: Invalid user user33 from 162.218.126.136 port 45514
Jan  3 07:57:06 host sshd[3379]: input_userauth_request: invalid user user33 [preauth]
Jan  3 07:57:07 host sshd[3379]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 07:57:07 host sshd[3379]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136
Jan  3 07:57:09 host sshd[3379]: Failed password for invalid user user33 from 162.218.126.136 port 45514 ssh2
Jan  3 07:57:09 host sshd[3379]: Connection closed by 162.218.126.136 port 45514 [preauth]
Jan  3 07:57:54 host sshd[3470]: User root from 80.19.204.177 not allowed because not listed in AllowUsers
Jan  3 07:57:54 host sshd[3470]: input_userauth_request: invalid user root [preauth]
Jan  3 07:57:54 host unix_chkpwd[3474]: password check failed for user (root)
Jan  3 07:57:54 host sshd[3470]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.19.204.177  user=root
Jan  3 07:57:54 host sshd[3470]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 07:57:56 host sshd[3470]: Failed password for invalid user root from 80.19.204.177 port 47464 ssh2
Jan  3 07:57:57 host sshd[3470]: Received disconnect from 80.19.204.177 port 47464:11: Bye Bye [preauth]
Jan  3 07:57:57 host sshd[3470]: Disconnected from 80.19.204.177 port 47464 [preauth]
Jan  3 08:02:19 host sshd[4158]: User root from 80.19.204.177 not allowed because not listed in AllowUsers
Jan  3 08:02:19 host sshd[4158]: input_userauth_request: invalid user root [preauth]
Jan  3 08:02:19 host unix_chkpwd[4161]: password check failed for user (root)
Jan  3 08:02:19 host sshd[4158]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.19.204.177  user=root
Jan  3 08:02:19 host sshd[4158]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 08:02:22 host sshd[4158]: Failed password for invalid user root from 80.19.204.177 port 38554 ssh2
Jan  3 08:02:22 host sshd[4158]: Received disconnect from 80.19.204.177 port 38554:11: Bye Bye [preauth]
Jan  3 08:02:22 host sshd[4158]: Disconnected from 80.19.204.177 port 38554 [preauth]
Jan  3 08:08:58 host sshd[5138]: User root from 41.197.31.178 not allowed because not listed in AllowUsers
Jan  3 08:08:58 host sshd[5138]: input_userauth_request: invalid user root [preauth]
Jan  3 08:08:59 host unix_chkpwd[5141]: password check failed for user (root)
Jan  3 08:08:59 host sshd[5138]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178  user=root
Jan  3 08:08:59 host sshd[5138]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 08:09:01 host sshd[5138]: Failed password for invalid user root from 41.197.31.178 port 44550 ssh2
Jan  3 08:09:01 host sshd[5138]: Connection closed by 41.197.31.178 port 44550 [preauth]
Jan  3 08:18:03 host sshd[6645]: Did not receive identification string from 187.95.144.110 port 48600
Jan  3 08:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  3 08:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 08:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 08:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  3 08:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 08:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 08:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  3 08:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 08:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 08:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  3 08:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 08:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 08:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  3 08:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 08:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 08:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  3 08:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 08:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 08:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  3 08:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 08:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 08:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  3 08:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 08:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 08:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  3 08:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 08:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 08:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  3 08:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 08:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 08:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  3 08:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 08:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 08:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  3 08:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 08:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 08:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  3 08:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 08:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 08:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=keralaholi user-3=wwwresourcehunte user-4=wwwrmswll user-5=ugotscom user-6=travelboniface user-7=wwwkaretakers user-8=cochintaxi user-9=laundryboniface user-10=a2zgroup user-11=dartsimp user-12=wwwletsstalkfood user-13=straightcurve user-14=bonifacegroup user-15=wwwevmhonda user-16=wwwnexidigital user-17=mrsclean user-18=palco123 user-19=gifterman user-20=kottayamcalldriv user-21=phmetals user-22=woodpeck user-23=wwwkapin user-24=remysagr user-25=disposeat user-26=wwwkmaorg user-27=pmcresources user-28=vfmassets user-29=shalinijames user-30=wwwtestugo feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  3 08:21:51 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  3 08:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 08:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 08:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  3 08:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 08:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 08:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-TMiQlHKLvQIIrIER.~
Jan  3 08:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 08:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 08:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-TMiQlHKLvQIIrIER.~'
Jan  3 08:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 08:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 08:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-TMiQlHKLvQIIrIER.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  3 08:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 08:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 08:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  3 08:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 08:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 08:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  3 08:21:52 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 08:21:52 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 08:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  3 08:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 08:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 08:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  3 08:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 08:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 08:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  3 08:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 08:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 08:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  3 08:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 08:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 08:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  3 08:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 08:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 08:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  3 08:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  3 08:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  3 08:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  3 08:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  3 08:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  3 08:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  3 08:22:02 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  3 08:22:09 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  3 08:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  3 08:22:09 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 08:22:10 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 08:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  3 08:22:10 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 08:22:11 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 08:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  3 08:22:11 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 08:22:13 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 08:22:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  3 08:22:13 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 08:22:17 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 08:22:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  3 08:22:18 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 08:22:21 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 08:22:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  3 08:22:22 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  3 08:22:26 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  3 08:31:37 host sshd[8660]: User root from 103.13.40.2 not allowed because not listed in AllowUsers
Jan  3 08:31:37 host sshd[8660]: input_userauth_request: invalid user root [preauth]
Jan  3 08:31:37 host unix_chkpwd[8663]: password check failed for user (root)
Jan  3 08:31:37 host sshd[8660]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2  user=root
Jan  3 08:31:37 host sshd[8660]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 08:31:39 host sshd[8660]: Failed password for invalid user root from 103.13.40.2 port 43330 ssh2
Jan  3 08:31:39 host sshd[8660]: Connection closed by 103.13.40.2 port 43330 [preauth]
Jan  3 08:51:14 host sshd[11621]: User root from 141.145.194.205 not allowed because not listed in AllowUsers
Jan  3 08:51:14 host sshd[11621]: input_userauth_request: invalid user root [preauth]
Jan  3 08:51:14 host unix_chkpwd[11624]: password check failed for user (root)
Jan  3 08:51:14 host sshd[11621]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.145.194.205  user=root
Jan  3 08:51:14 host sshd[11621]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 08:51:16 host sshd[11621]: Failed password for invalid user root from 141.145.194.205 port 52836 ssh2
Jan  3 08:51:16 host sshd[11621]: Received disconnect from 141.145.194.205 port 52836:11: Bye Bye [preauth]
Jan  3 08:51:16 host sshd[11621]: Disconnected from 141.145.194.205 port 52836 [preauth]
Jan  3 08:56:43 host sshd[12468]: User root from 141.145.194.205 not allowed because not listed in AllowUsers
Jan  3 08:56:43 host sshd[12468]: input_userauth_request: invalid user root [preauth]
Jan  3 08:56:43 host unix_chkpwd[12470]: password check failed for user (root)
Jan  3 08:56:43 host sshd[12468]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.145.194.205  user=root
Jan  3 08:56:43 host sshd[12468]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 08:56:45 host sshd[12468]: Failed password for invalid user root from 141.145.194.205 port 39764 ssh2
Jan  3 08:56:46 host sshd[12468]: Received disconnect from 141.145.194.205 port 39764:11: Bye Bye [preauth]
Jan  3 08:56:46 host sshd[12468]: Disconnected from 141.145.194.205 port 39764 [preauth]
Jan  3 08:57:40 host sshd[12634]: Invalid user irina from 164.90.172.83 port 36868
Jan  3 08:57:40 host sshd[12634]: input_userauth_request: invalid user irina [preauth]
Jan  3 08:57:40 host sshd[12634]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 08:57:40 host sshd[12634]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.90.172.83
Jan  3 08:57:43 host sshd[12634]: Failed password for invalid user irina from 164.90.172.83 port 36868 ssh2
Jan  3 08:57:43 host sshd[12634]: Received disconnect from 164.90.172.83 port 36868:11: Bye Bye [preauth]
Jan  3 08:57:43 host sshd[12634]: Disconnected from 164.90.172.83 port 36868 [preauth]
Jan  3 08:59:45 host sshd[12926]: User tomcat from 164.90.172.83 not allowed because not listed in AllowUsers
Jan  3 08:59:45 host sshd[12926]: input_userauth_request: invalid user tomcat [preauth]
Jan  3 08:59:45 host unix_chkpwd[12929]: password check failed for user (tomcat)
Jan  3 08:59:45 host sshd[12926]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.90.172.83  user=tomcat
Jan  3 08:59:45 host sshd[12926]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "tomcat"
Jan  3 08:59:47 host sshd[12926]: Failed password for invalid user tomcat from 164.90.172.83 port 42678 ssh2
Jan  3 08:59:47 host sshd[12926]: Received disconnect from 164.90.172.83 port 42678:11: Bye Bye [preauth]
Jan  3 08:59:47 host sshd[12926]: Disconnected from 164.90.172.83 port 42678 [preauth]
Jan  3 09:01:18 host sshd[13328]: Invalid user user1 from 162.218.126.136 port 49806
Jan  3 09:01:18 host sshd[13328]: input_userauth_request: invalid user user1 [preauth]
Jan  3 09:01:18 host sshd[13328]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 09:01:18 host sshd[13328]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136
Jan  3 09:01:21 host sshd[13328]: Failed password for invalid user user1 from 162.218.126.136 port 49806 ssh2
Jan  3 09:01:21 host sshd[13328]: Connection closed by 162.218.126.136 port 49806 [preauth]
Jan  3 09:10:22 host sshd[14562]: Invalid user lixin from 106.10.122.53 port 49922
Jan  3 09:10:22 host sshd[14562]: input_userauth_request: invalid user lixin [preauth]
Jan  3 09:10:22 host sshd[14562]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 09:10:22 host sshd[14562]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53
Jan  3 09:10:24 host sshd[14562]: Failed password for invalid user lixin from 106.10.122.53 port 49922 ssh2
Jan  3 09:10:24 host sshd[14562]: Connection closed by 106.10.122.53 port 49922 [preauth]
Jan  3 09:10:54 host sshd[14740]: Invalid user user from 92.46.108.20 port 45202
Jan  3 09:10:54 host sshd[14740]: input_userauth_request: invalid user user [preauth]
Jan  3 09:10:54 host sshd[14740]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 09:10:54 host sshd[14740]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20
Jan  3 09:10:56 host sshd[14740]: Failed password for invalid user user from 92.46.108.20 port 45202 ssh2
Jan  3 09:10:58 host sshd[14740]: Connection closed by 92.46.108.20 port 45202 [preauth]
Jan  3 09:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  3 09:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 09:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 09:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  3 09:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 09:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 09:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  3 09:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 09:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 09:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  3 09:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 09:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 09:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  3 09:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 09:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 09:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  3 09:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 09:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 09:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  3 09:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 09:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 09:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  3 09:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 09:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 09:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  3 09:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 09:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 09:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  3 09:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 09:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 09:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  3 09:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 09:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 09:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  3 09:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 09:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 09:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  3 09:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 09:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 09:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=disposeat user-2=wwwkmaorg user-3=remysagr user-4=woodpeck user-5=wwwkapin user-6=wwwtestugo user-7=shalinijames user-8=vfmassets user-9=pmcresources user-10=wwwevmhonda user-11=bonifacegroup user-12=straightcurve user-13=wwwletsstalkfood user-14=phmetals user-15=kottayamcalldriv user-16=gifterman user-17=palco123 user-18=mrsclean user-19=wwwnexidigital user-20=wwwkaretakers user-21=cochintaxi user-22=dartsimp user-23=a2zgroup user-24=laundryboniface user-25=wwwpmcresource user-26=travelboniface user-27=ugotscom user-28=wwwrmswll user-29=keralaholi user-30=wwwresourcehunte feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  3 09:21:52 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  3 09:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 09:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 09:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  3 09:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 09:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 09:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-AOgs8Y7numdSO7GE.~
Jan  3 09:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 09:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 09:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-AOgs8Y7numdSO7GE.~'
Jan  3 09:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 09:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 09:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-AOgs8Y7numdSO7GE.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  3 09:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 09:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 09:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  3 09:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 09:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 09:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  3 09:21:57 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 09:21:57 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 09:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  3 09:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 09:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 09:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  3 09:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 09:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 09:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  3 09:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 09:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 09:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  3 09:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 09:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 09:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  3 09:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 09:21:59 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 09:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  3 09:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  3 09:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  3 09:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  3 09:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  3 09:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  3 09:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  3 09:22:02 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  3 09:22:03 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  3 09:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  3 09:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 09:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 09:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  3 09:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 09:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 09:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  3 09:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 09:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 09:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  3 09:22:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 09:22:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 09:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  3 09:22:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 09:22:10 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 09:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  3 09:22:11 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  3 09:22:12 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  3 09:30:45 host sshd[17797]: Invalid user admin from 45.93.201.90 port 38042
Jan  3 09:30:45 host sshd[17797]: input_userauth_request: invalid user admin [preauth]
Jan  3 09:30:45 host sshd[17797]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 09:30:45 host sshd[17797]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90
Jan  3 09:30:47 host sshd[17797]: Failed password for invalid user admin from 45.93.201.90 port 38042 ssh2
Jan  3 09:30:50 host sshd[17797]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 09:30:52 host sshd[17797]: Failed password for invalid user admin from 45.93.201.90 port 38042 ssh2
Jan  3 09:30:55 host sshd[17797]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 09:30:58 host sshd[17797]: Failed password for invalid user admin from 45.93.201.90 port 38042 ssh2
Jan  3 09:31:01 host sshd[17797]: Connection closed by 45.93.201.90 port 38042 [preauth]
Jan  3 09:31:01 host sshd[17797]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90
Jan  3 09:45:27 host sshd[20112]: Did not receive identification string from 149.129.220.222 port 61000
Jan  3 09:50:13 host sshd[20781]: Invalid user admin from 73.176.112.150 port 48846
Jan  3 09:50:13 host sshd[20781]: input_userauth_request: invalid user admin [preauth]
Jan  3 09:50:13 host sshd[20781]: Failed none for invalid user admin from 73.176.112.150 port 48846 ssh2
Jan  3 09:50:14 host sshd[20781]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 09:50:14 host sshd[20781]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.176.112.150
Jan  3 09:50:16 host sshd[20781]: Failed password for invalid user admin from 73.176.112.150 port 48846 ssh2
Jan  3 09:50:17 host sshd[20781]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 09:50:19 host sshd[20781]: Failed password for invalid user admin from 73.176.112.150 port 48846 ssh2
Jan  3 09:50:20 host sshd[20781]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 09:50:23 host sshd[20781]: Failed password for invalid user admin from 73.176.112.150 port 48846 ssh2
Jan  3 09:50:24 host sshd[20781]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 09:50:26 host sshd[20781]: Failed password for invalid user admin from 73.176.112.150 port 48846 ssh2
Jan  3 09:50:27 host sshd[20781]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 09:50:30 host sshd[20781]: Failed password for invalid user admin from 73.176.112.150 port 48846 ssh2
Jan  3 09:50:30 host sshd[20781]: error: maximum authentication attempts exceeded for invalid user admin from 73.176.112.150 port 48846 ssh2 [preauth]
Jan  3 09:50:30 host sshd[20781]: Disconnecting: Too many authentication failures [preauth]
Jan  3 09:50:30 host sshd[20781]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.176.112.150
Jan  3 09:50:30 host sshd[20781]: PAM service(sshd) ignoring max retries; 5 > 3
Jan  3 09:54:18 host sshd[21423]: User root from 41.197.31.178 not allowed because not listed in AllowUsers
Jan  3 09:54:18 host sshd[21423]: input_userauth_request: invalid user root [preauth]
Jan  3 09:54:18 host unix_chkpwd[21427]: password check failed for user (root)
Jan  3 09:54:18 host sshd[21423]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178  user=root
Jan  3 09:54:18 host sshd[21423]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 09:54:20 host sshd[21423]: Failed password for invalid user root from 41.197.31.178 port 51840 ssh2
Jan  3 09:54:21 host sshd[21423]: Connection closed by 41.197.31.178 port 51840 [preauth]
Jan  3 09:56:31 host sshd[21702]: Invalid user user1 from 103.13.40.2 port 33450
Jan  3 09:56:31 host sshd[21702]: input_userauth_request: invalid user user1 [preauth]
Jan  3 09:56:31 host sshd[21702]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 09:56:31 host sshd[21702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2
Jan  3 09:56:33 host sshd[21702]: Failed password for invalid user user1 from 103.13.40.2 port 33450 ssh2
Jan  3 09:56:33 host sshd[21702]: Connection closed by 103.13.40.2 port 33450 [preauth]
Jan  3 10:02:16 host sshd[22753]: Did not receive identification string from 147.182.145.179 port 60000
Jan  3 10:02:35 host sshd[22802]: Did not receive identification string from 162.241.189.135 port 52964
Jan  3 10:04:09 host sshd[22940]: Invalid user viktor from 190.85.201.170 port 22659
Jan  3 10:04:09 host sshd[22940]: input_userauth_request: invalid user viktor [preauth]
Jan  3 10:04:09 host sshd[22940]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 10:04:09 host sshd[22940]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.85.201.170
Jan  3 10:04:11 host sshd[22940]: Failed password for invalid user viktor from 190.85.201.170 port 22659 ssh2
Jan  3 10:04:11 host sshd[22940]: Received disconnect from 190.85.201.170 port 22659:11: Bye Bye [preauth]
Jan  3 10:04:11 host sshd[22940]: Disconnected from 190.85.201.170 port 22659 [preauth]
Jan  3 10:04:30 host sshd[22988]: User root from 162.241.189.135 not allowed because not listed in AllowUsers
Jan  3 10:04:30 host sshd[22988]: input_userauth_request: invalid user root [preauth]
Jan  3 10:04:30 host unix_chkpwd[22991]: password check failed for user (root)
Jan  3 10:04:30 host sshd[22988]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.241.189.135  user=root
Jan  3 10:04:30 host sshd[22988]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 10:04:32 host sshd[22988]: Failed password for invalid user root from 162.241.189.135 port 53916 ssh2
Jan  3 10:04:32 host sshd[22988]: Received disconnect from 162.241.189.135 port 53916:11: Normal Shutdown, Thank you for playing [preauth]
Jan  3 10:04:32 host sshd[22988]: Disconnected from 162.241.189.135 port 53916 [preauth]
Jan  3 10:05:09 host sshd[23080]: User centos from 162.218.126.136 not allowed because not listed in AllowUsers
Jan  3 10:05:09 host sshd[23080]: input_userauth_request: invalid user centos [preauth]
Jan  3 10:05:09 host unix_chkpwd[23083]: password check failed for user (centos)
Jan  3 10:05:09 host sshd[23080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136  user=centos
Jan  3 10:05:11 host sshd[23080]: Failed password for invalid user centos from 162.218.126.136 port 38646 ssh2
Jan  3 10:05:11 host sshd[23080]: Connection closed by 162.218.126.136 port 38646 [preauth]
Jan  3 10:05:27 host sshd[23107]: Invalid user harold from 107.189.30.59 port 49288
Jan  3 10:05:27 host sshd[23107]: input_userauth_request: invalid user harold [preauth]
Jan  3 10:05:27 host sshd[23107]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 10:05:27 host sshd[23107]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59
Jan  3 10:05:29 host sshd[23107]: Failed password for invalid user harold from 107.189.30.59 port 49288 ssh2
Jan  3 10:05:30 host sshd[23107]: Connection closed by 107.189.30.59 port 49288 [preauth]
Jan  3 10:05:35 host sshd[23260]: Invalid user ubuntu from 43.159.40.244 port 39964
Jan  3 10:05:35 host sshd[23260]: input_userauth_request: invalid user ubuntu [preauth]
Jan  3 10:05:35 host sshd[23260]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 10:05:35 host sshd[23260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.159.40.244
Jan  3 10:05:36 host sshd[23258]: User root from 162.241.189.135 not allowed because not listed in AllowUsers
Jan  3 10:05:36 host sshd[23258]: input_userauth_request: invalid user root [preauth]
Jan  3 10:05:36 host unix_chkpwd[23263]: password check failed for user (root)
Jan  3 10:05:36 host sshd[23258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.241.189.135  user=root
Jan  3 10:05:36 host sshd[23258]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 10:05:37 host sshd[23260]: Failed password for invalid user ubuntu from 43.159.40.244 port 39964 ssh2
Jan  3 10:05:37 host sshd[23260]: Received disconnect from 43.159.40.244 port 39964:11: Bye Bye [preauth]
Jan  3 10:05:37 host sshd[23260]: Disconnected from 43.159.40.244 port 39964 [preauth]
Jan  3 10:05:37 host sshd[23258]: Failed password for invalid user root from 162.241.189.135 port 44824 ssh2
Jan  3 10:05:38 host sshd[23258]: Received disconnect from 162.241.189.135 port 44824:11: Normal Shutdown, Thank you for playing [preauth]
Jan  3 10:05:38 host sshd[23258]: Disconnected from 162.241.189.135 port 44824 [preauth]
Jan  3 10:06:31 host sshd[23390]: User root from 190.85.201.170 not allowed because not listed in AllowUsers
Jan  3 10:06:31 host sshd[23390]: input_userauth_request: invalid user root [preauth]
Jan  3 10:06:31 host unix_chkpwd[23393]: password check failed for user (root)
Jan  3 10:06:31 host sshd[23390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.85.201.170  user=root
Jan  3 10:06:31 host sshd[23390]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 10:06:32 host sshd[23390]: Failed password for invalid user root from 190.85.201.170 port 42347 ssh2
Jan  3 10:06:32 host sshd[23390]: Received disconnect from 190.85.201.170 port 42347:11: Bye Bye [preauth]
Jan  3 10:06:32 host sshd[23390]: Disconnected from 190.85.201.170 port 42347 [preauth]
Jan  3 10:08:57 host sshd[23715]: User root from 43.159.40.244 not allowed because not listed in AllowUsers
Jan  3 10:08:57 host sshd[23715]: input_userauth_request: invalid user root [preauth]
Jan  3 10:08:57 host unix_chkpwd[23718]: password check failed for user (root)
Jan  3 10:08:57 host sshd[23715]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.159.40.244  user=root
Jan  3 10:08:57 host sshd[23715]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 10:08:59 host sshd[23715]: Failed password for invalid user root from 43.159.40.244 port 46946 ssh2
Jan  3 10:08:59 host sshd[23715]: Received disconnect from 43.159.40.244 port 46946:11: Bye Bye [preauth]
Jan  3 10:08:59 host sshd[23715]: Disconnected from 43.159.40.244 port 46946 [preauth]
Jan  3 10:15:37 host sshd[24729]: Did not receive identification string from 193.42.33.214 port 54708
Jan  3 10:15:48 host sshd[24739]: User root from 193.42.33.214 not allowed because not listed in AllowUsers
Jan  3 10:15:48 host sshd[24739]: input_userauth_request: invalid user root [preauth]
Jan  3 10:15:48 host unix_chkpwd[24742]: password check failed for user (root)
Jan  3 10:15:48 host sshd[24739]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.42.33.214  user=root
Jan  3 10:15:48 host sshd[24739]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 10:15:50 host sshd[24739]: Failed password for invalid user root from 193.42.33.214 port 35816 ssh2
Jan  3 10:15:51 host sshd[24739]: Received disconnect from 193.42.33.214 port 35816:11: Normal Shutdown, Thank you for playing [preauth]
Jan  3 10:15:51 host sshd[24739]: Disconnected from 193.42.33.214 port 35816 [preauth]
Jan  3 10:15:59 host sshd[24752]: User root from 193.42.33.214 not allowed because not listed in AllowUsers
Jan  3 10:15:59 host sshd[24752]: input_userauth_request: invalid user root [preauth]
Jan  3 10:15:59 host unix_chkpwd[24758]: password check failed for user (root)
Jan  3 10:15:59 host sshd[24752]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.42.33.214  user=root
Jan  3 10:15:59 host sshd[24752]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 10:16:02 host sshd[24752]: Failed password for invalid user root from 193.42.33.214 port 58150 ssh2
Jan  3 10:16:02 host sshd[24752]: Received disconnect from 193.42.33.214 port 58150:11: Normal Shutdown, Thank you for playing [preauth]
Jan  3 10:16:02 host sshd[24752]: Disconnected from 193.42.33.214 port 58150 [preauth]
Jan  3 10:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  3 10:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 10:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 10:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  3 10:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 10:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 10:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  3 10:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 10:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 10:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  3 10:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 10:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 10:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  3 10:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 10:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 10:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  3 10:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 10:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 10:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  3 10:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 10:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 10:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  3 10:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 10:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 10:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  3 10:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 10:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 10:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  3 10:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 10:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 10:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  3 10:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 10:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 10:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  3 10:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 10:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 10:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  3 10:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 10:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 10:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=travelboniface user-2=wwwrmswll user-3=keralaholi user-4=wwwresourcehunte user-5=ugotscom user-6=wwwpmcresource user-7=dartsimp user-8=a2zgroup user-9=laundryboniface user-10=wwwkaretakers user-11=cochintaxi user-12=gifterman user-13=palco123 user-14=phmetals user-15=kottayamcalldriv user-16=mrsclean user-17=wwwnexidigital user-18=bonifacegroup user-19=wwwevmhonda user-20=wwwletsstalkfood user-21=straightcurve user-22=vfmassets user-23=wwwtestugo user-24=shalinijames user-25=pmcresources user-26=wwwkmaorg user-27=disposeat user-28=remysagr user-29=woodpeck user-30=wwwkapin feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  3 10:21:52 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  3 10:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 10:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 10:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  3 10:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 10:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 10:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Bvn5nGc8zp9LY8ur.~
Jan  3 10:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 10:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 10:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Bvn5nGc8zp9LY8ur.~'
Jan  3 10:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 10:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 10:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Bvn5nGc8zp9LY8ur.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  3 10:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 10:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 10:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  3 10:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 10:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 10:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  3 10:21:57 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 10:21:57 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 10:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  3 10:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 10:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 10:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  3 10:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 10:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 10:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  3 10:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 10:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 10:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  3 10:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 10:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 10:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  3 10:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 10:21:59 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 10:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  3 10:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  3 10:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  3 10:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  3 10:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  3 10:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  3 10:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  3 10:22:02 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  3 10:22:04 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  3 10:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  3 10:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 10:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 10:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  3 10:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 10:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 10:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  3 10:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 10:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 10:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  3 10:22:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 10:22:10 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 10:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  3 10:22:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 10:22:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 10:22:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  3 10:22:12 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  3 10:22:13 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  3 10:24:08 host sshd[26351]: Invalid user smart from 45.148.120.252 port 45350
Jan  3 10:24:08 host sshd[26351]: input_userauth_request: invalid user smart [preauth]
Jan  3 10:24:08 host sshd[26351]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 10:24:08 host sshd[26351]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.120.252
Jan  3 10:24:09 host sshd[26351]: Failed password for invalid user smart from 45.148.120.252 port 45350 ssh2
Jan  3 10:24:10 host sshd[26351]: Received disconnect from 45.148.120.252 port 45350:11: Bye Bye [preauth]
Jan  3 10:24:10 host sshd[26351]: Disconnected from 45.148.120.252 port 45350 [preauth]
Jan  3 10:24:22 host sshd[26380]: User root from 178.62.64.242 not allowed because not listed in AllowUsers
Jan  3 10:24:22 host sshd[26380]: input_userauth_request: invalid user root [preauth]
Jan  3 10:24:22 host unix_chkpwd[26384]: password check failed for user (root)
Jan  3 10:24:22 host sshd[26380]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.64.242  user=root
Jan  3 10:24:22 host sshd[26380]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 10:24:23 host sshd[26380]: Failed password for invalid user root from 178.62.64.242 port 55352 ssh2
Jan  3 10:24:24 host sshd[26380]: Received disconnect from 178.62.64.242 port 55352:11: Bye Bye [preauth]
Jan  3 10:24:24 host sshd[26380]: Disconnected from 178.62.64.242 port 55352 [preauth]
Jan  3 10:25:29 host sshd[26572]: User root from 2.34.98.134 not allowed because not listed in AllowUsers
Jan  3 10:25:29 host sshd[26572]: input_userauth_request: invalid user root [preauth]
Jan  3 10:25:29 host unix_chkpwd[26586]: password check failed for user (root)
Jan  3 10:25:29 host sshd[26572]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.34.98.134  user=root
Jan  3 10:25:29 host sshd[26572]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 10:25:30 host sshd[26572]: Failed password for invalid user root from 2.34.98.134 port 36608 ssh2
Jan  3 10:25:31 host sshd[26572]: Received disconnect from 2.34.98.134 port 36608:11: Bye Bye [preauth]
Jan  3 10:25:31 host sshd[26572]: Disconnected from 2.34.98.134 port 36608 [preauth]
Jan  3 10:27:59 host sshd[26862]: User root from 159.65.154.184 not allowed because not listed in AllowUsers
Jan  3 10:27:59 host sshd[26862]: input_userauth_request: invalid user root [preauth]
Jan  3 10:27:59 host unix_chkpwd[26864]: password check failed for user (root)
Jan  3 10:27:59 host sshd[26862]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.154.184  user=root
Jan  3 10:27:59 host sshd[26862]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 10:28:01 host sshd[26862]: Failed password for invalid user root from 159.65.154.184 port 41968 ssh2
Jan  3 10:28:01 host sshd[26862]: Received disconnect from 159.65.154.184 port 41968:11: Bye Bye [preauth]
Jan  3 10:28:01 host sshd[26862]: Disconnected from 159.65.154.184 port 41968 [preauth]
Jan  3 10:28:07 host sshd[26888]: User root from 159.203.10.59 not allowed because not listed in AllowUsers
Jan  3 10:28:07 host sshd[26888]: input_userauth_request: invalid user root [preauth]
Jan  3 10:28:07 host unix_chkpwd[26891]: password check failed for user (root)
Jan  3 10:28:07 host sshd[26888]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.10.59  user=root
Jan  3 10:28:07 host sshd[26888]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 10:28:09 host sshd[26888]: Failed password for invalid user root from 159.203.10.59 port 53832 ssh2
Jan  3 10:28:09 host sshd[26888]: Received disconnect from 159.203.10.59 port 53832:11: Bye Bye [preauth]
Jan  3 10:28:09 host sshd[26888]: Disconnected from 159.203.10.59 port 53832 [preauth]
Jan  3 10:29:17 host sshd[27118]: User root from 45.148.120.252 not allowed because not listed in AllowUsers
Jan  3 10:29:17 host sshd[27118]: input_userauth_request: invalid user root [preauth]
Jan  3 10:29:17 host unix_chkpwd[27121]: password check failed for user (root)
Jan  3 10:29:17 host sshd[27118]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.120.252  user=root
Jan  3 10:29:17 host sshd[27118]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 10:29:19 host sshd[27118]: Failed password for invalid user root from 45.148.120.252 port 34418 ssh2
Jan  3 10:29:19 host sshd[27118]: Received disconnect from 45.148.120.252 port 34418:11: Bye Bye [preauth]
Jan  3 10:29:19 host sshd[27118]: Disconnected from 45.148.120.252 port 34418 [preauth]
Jan  3 10:29:23 host sshd[27129]: Invalid user info from 178.62.64.242 port 53168
Jan  3 10:29:23 host sshd[27129]: input_userauth_request: invalid user info [preauth]
Jan  3 10:29:23 host sshd[27129]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 10:29:23 host sshd[27129]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.64.242
Jan  3 10:29:25 host sshd[27129]: Failed password for invalid user info from 178.62.64.242 port 53168 ssh2
Jan  3 10:29:25 host sshd[27129]: Received disconnect from 178.62.64.242 port 53168:11: Bye Bye [preauth]
Jan  3 10:29:25 host sshd[27129]: Disconnected from 178.62.64.242 port 53168 [preauth]
Jan  3 10:29:58 host sshd[27264]: Invalid user user from 159.203.10.59 port 39546
Jan  3 10:29:58 host sshd[27264]: input_userauth_request: invalid user user [preauth]
Jan  3 10:29:58 host sshd[27264]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 10:29:58 host sshd[27264]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.10.59
Jan  3 10:29:59 host sshd[27264]: Failed password for invalid user user from 159.203.10.59 port 39546 ssh2
Jan  3 10:29:59 host sshd[27264]: Received disconnect from 159.203.10.59 port 39546:11: Bye Bye [preauth]
Jan  3 10:29:59 host sshd[27264]: Disconnected from 159.203.10.59 port 39546 [preauth]
Jan  3 10:30:41 host sshd[27421]: Invalid user minecraft from 159.65.154.184 port 49714
Jan  3 10:30:41 host sshd[27421]: input_userauth_request: invalid user minecraft [preauth]
Jan  3 10:30:41 host sshd[27421]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 10:30:41 host sshd[27421]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.154.184
Jan  3 10:30:43 host sshd[27421]: Failed password for invalid user minecraft from 159.65.154.184 port 49714 ssh2
Jan  3 10:30:43 host sshd[27421]: Received disconnect from 159.65.154.184 port 49714:11: Bye Bye [preauth]
Jan  3 10:30:43 host sshd[27421]: Disconnected from 159.65.154.184 port 49714 [preauth]
Jan  3 10:31:47 host sshd[27577]: Invalid user user1 from 106.10.122.53 port 46330
Jan  3 10:31:47 host sshd[27577]: input_userauth_request: invalid user user1 [preauth]
Jan  3 10:31:47 host sshd[27577]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 10:31:47 host sshd[27577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53
Jan  3 10:31:49 host sshd[27577]: Failed password for invalid user user1 from 106.10.122.53 port 46330 ssh2
Jan  3 10:31:50 host sshd[27577]: Connection closed by 106.10.122.53 port 46330 [preauth]
Jan  3 10:40:15 host sshd[28796]: User root from 107.170.168.63 not allowed because not listed in AllowUsers
Jan  3 10:40:15 host sshd[28796]: input_userauth_request: invalid user root [preauth]
Jan  3 10:40:15 host unix_chkpwd[28802]: password check failed for user (root)
Jan  3 10:40:15 host sshd[28796]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.168.63  user=root
Jan  3 10:40:15 host sshd[28796]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 10:40:18 host sshd[28796]: Failed password for invalid user root from 107.170.168.63 port 35767 ssh2
Jan  3 10:40:18 host sshd[28796]: Received disconnect from 107.170.168.63 port 35767:11: Bye Bye [preauth]
Jan  3 10:40:18 host sshd[28796]: Disconnected from 107.170.168.63 port 35767 [preauth]
Jan  3 10:42:57 host sshd[29228]: Invalid user ansible from 139.59.70.64 port 55232
Jan  3 10:42:57 host sshd[29228]: input_userauth_request: invalid user ansible [preauth]
Jan  3 10:42:57 host sshd[29228]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 10:42:57 host sshd[29228]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.70.64
Jan  3 10:42:59 host sshd[29228]: Failed password for invalid user ansible from 139.59.70.64 port 55232 ssh2
Jan  3 10:42:59 host sshd[29228]: Received disconnect from 139.59.70.64 port 55232:11: Bye Bye [preauth]
Jan  3 10:42:59 host sshd[29228]: Disconnected from 139.59.70.64 port 55232 [preauth]
Jan  3 10:44:45 host sshd[29499]: Invalid user david from 107.170.168.63 port 33433
Jan  3 10:44:45 host sshd[29499]: input_userauth_request: invalid user david [preauth]
Jan  3 10:44:45 host sshd[29499]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 10:44:45 host sshd[29499]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.168.63
Jan  3 10:44:47 host sshd[29499]: Failed password for invalid user david from 107.170.168.63 port 33433 ssh2
Jan  3 10:44:47 host sshd[29499]: Received disconnect from 107.170.168.63 port 33433:11: Bye Bye [preauth]
Jan  3 10:44:47 host sshd[29499]: Disconnected from 107.170.168.63 port 33433 [preauth]
Jan  3 10:47:37 host sshd[30102]: Invalid user anton from 84.52.103.234 port 47041
Jan  3 10:47:37 host sshd[30102]: input_userauth_request: invalid user anton [preauth]
Jan  3 10:47:37 host sshd[30102]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 10:47:37 host sshd[30102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.52.103.234
Jan  3 10:47:39 host sshd[30102]: Failed password for invalid user anton from 84.52.103.234 port 47041 ssh2
Jan  3 10:47:39 host sshd[30102]: Received disconnect from 84.52.103.234 port 47041:11: Bye Bye [preauth]
Jan  3 10:47:39 host sshd[30102]: Disconnected from 84.52.103.234 port 47041 [preauth]
Jan  3 10:49:02 host sshd[30347]: Invalid user oracle from 139.59.70.64 port 58174
Jan  3 10:49:02 host sshd[30347]: input_userauth_request: invalid user oracle [preauth]
Jan  3 10:49:02 host sshd[30347]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 10:49:02 host sshd[30347]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.70.64
Jan  3 10:49:04 host sshd[30347]: Failed password for invalid user oracle from 139.59.70.64 port 58174 ssh2
Jan  3 10:49:04 host sshd[30347]: Received disconnect from 139.59.70.64 port 58174:11: Bye Bye [preauth]
Jan  3 10:49:04 host sshd[30347]: Disconnected from 139.59.70.64 port 58174 [preauth]
Jan  3 10:49:31 host sshd[30441]: User root from 84.52.103.234 not allowed because not listed in AllowUsers
Jan  3 10:49:31 host sshd[30441]: input_userauth_request: invalid user root [preauth]
Jan  3 10:49:31 host unix_chkpwd[30447]: password check failed for user (root)
Jan  3 10:49:31 host sshd[30441]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.52.103.234  user=root
Jan  3 10:49:31 host sshd[30441]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 10:49:33 host sshd[30441]: Failed password for invalid user root from 84.52.103.234 port 39943 ssh2
Jan  3 10:49:33 host sshd[30441]: Received disconnect from 84.52.103.234 port 39943:11: Bye Bye [preauth]
Jan  3 10:49:33 host sshd[30441]: Disconnected from 84.52.103.234 port 39943 [preauth]
Jan  3 10:50:25 host sshd[30735]: Invalid user desarrollo from 139.59.70.64 port 58042
Jan  3 10:50:25 host sshd[30735]: input_userauth_request: invalid user desarrollo [preauth]
Jan  3 10:50:25 host sshd[30735]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 10:50:25 host sshd[30735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.70.64
Jan  3 10:50:27 host sshd[30735]: Failed password for invalid user desarrollo from 139.59.70.64 port 58042 ssh2
Jan  3 10:50:27 host sshd[30735]: Received disconnect from 139.59.70.64 port 58042:11: Bye Bye [preauth]
Jan  3 10:50:27 host sshd[30735]: Disconnected from 139.59.70.64 port 58042 [preauth]
Jan  3 11:08:46 host sshd[1136]: Invalid user user1 from 162.218.126.136 port 47274
Jan  3 11:08:46 host sshd[1136]: input_userauth_request: invalid user user1 [preauth]
Jan  3 11:08:46 host sshd[1136]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 11:08:46 host sshd[1136]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136
Jan  3 11:08:47 host sshd[1136]: Failed password for invalid user user1 from 162.218.126.136 port 47274 ssh2
Jan  3 11:08:48 host sshd[1136]: Connection closed by 162.218.126.136 port 47274 [preauth]
Jan  3 11:19:07 host sshd[2673]: Invalid user control from 69.119.94.212 port 45691
Jan  3 11:19:07 host sshd[2673]: input_userauth_request: invalid user control [preauth]
Jan  3 11:19:07 host sshd[2673]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 11:19:07 host sshd[2673]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.119.94.212
Jan  3 11:19:09 host sshd[2673]: Failed password for invalid user control from 69.119.94.212 port 45691 ssh2
Jan  3 11:19:10 host sshd[2673]: Received disconnect from 69.119.94.212 port 45691:11: Bye Bye [preauth]
Jan  3 11:19:10 host sshd[2673]: Disconnected from 69.119.94.212 port 45691 [preauth]
Jan  3 11:19:47 host sshd[2783]: User root from 103.13.40.2 not allowed because not listed in AllowUsers
Jan  3 11:19:47 host sshd[2783]: input_userauth_request: invalid user root [preauth]
Jan  3 11:19:47 host unix_chkpwd[2785]: password check failed for user (root)
Jan  3 11:19:47 host sshd[2783]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2  user=root
Jan  3 11:19:47 host sshd[2783]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 11:19:50 host sshd[2783]: Failed password for invalid user root from 103.13.40.2 port 43804 ssh2
Jan  3 11:19:50 host sshd[2783]: Connection closed by 103.13.40.2 port 43804 [preauth]
Jan  3 11:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  3 11:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 11:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 11:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  3 11:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 11:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 11:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  3 11:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 11:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 11:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  3 11:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 11:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 11:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  3 11:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 11:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 11:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  3 11:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 11:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 11:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  3 11:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 11:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 11:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  3 11:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 11:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 11:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  3 11:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 11:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 11:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  3 11:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 11:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 11:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  3 11:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 11:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 11:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  3 11:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 11:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 11:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  3 11:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 11:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 11:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=ugotscom user-2=keralaholi user-3=wwwresourcehunte user-4=wwwrmswll user-5=travelboniface user-6=wwwpmcresource user-7=laundryboniface user-8=a2zgroup user-9=dartsimp user-10=cochintaxi user-11=wwwkaretakers user-12=mrsclean user-13=wwwnexidigital user-14=phmetals user-15=kottayamcalldriv user-16=palco123 user-17=gifterman user-18=straightcurve user-19=wwwletsstalkfood user-20=wwwevmhonda user-21=bonifacegroup user-22=pmcresources user-23=shalinijames user-24=wwwtestugo user-25=vfmassets user-26=woodpeck user-27=wwwkapin user-28=disposeat user-29=remysagr user-30=wwwkmaorg feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  3 11:21:52 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  3 11:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 11:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 11:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  3 11:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 11:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 11:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-L6s9S5d3GGQsY2oJ.~
Jan  3 11:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 11:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 11:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-L6s9S5d3GGQsY2oJ.~'
Jan  3 11:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 11:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 11:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-L6s9S5d3GGQsY2oJ.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  3 11:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 11:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 11:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  3 11:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 11:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 11:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  3 11:21:56 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 11:21:56 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 11:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  3 11:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 11:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 11:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  3 11:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 11:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 11:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  3 11:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 11:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 11:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  3 11:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 11:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 11:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  3 11:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 11:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 11:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  3 11:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  3 11:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  3 11:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  3 11:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  3 11:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  3 11:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  3 11:22:00 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  3 11:22:02 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  3 11:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  3 11:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 11:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 11:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  3 11:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 11:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 11:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  3 11:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 11:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 11:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  3 11:22:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 11:22:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 11:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  3 11:22:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 11:22:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 11:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  3 11:22:10 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  3 11:22:11 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  3 11:22:55 host sshd[3583]: Invalid user secretaria from 178.22.168.220 port 43420
Jan  3 11:22:55 host sshd[3583]: input_userauth_request: invalid user secretaria [preauth]
Jan  3 11:22:55 host sshd[3583]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 11:22:55 host sshd[3583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.22.168.220
Jan  3 11:22:55 host sshd[3585]: User root from 79.17.69.184 not allowed because not listed in AllowUsers
Jan  3 11:22:55 host sshd[3585]: input_userauth_request: invalid user root [preauth]
Jan  3 11:22:55 host unix_chkpwd[3588]: password check failed for user (root)
Jan  3 11:22:55 host sshd[3585]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.17.69.184  user=root
Jan  3 11:22:55 host sshd[3585]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 11:22:57 host sshd[3583]: Failed password for invalid user secretaria from 178.22.168.220 port 43420 ssh2
Jan  3 11:22:58 host sshd[3585]: Failed password for invalid user root from 79.17.69.184 port 59744 ssh2
Jan  3 11:22:58 host sshd[3583]: Received disconnect from 178.22.168.220 port 43420:11: Bye Bye [preauth]
Jan  3 11:22:58 host sshd[3583]: Disconnected from 178.22.168.220 port 43420 [preauth]
Jan  3 11:22:58 host sshd[3585]: Received disconnect from 79.17.69.184 port 59744:11: Bye Bye [preauth]
Jan  3 11:22:58 host sshd[3585]: Disconnected from 79.17.69.184 port 59744 [preauth]
Jan  3 11:23:19 host sshd[3635]: Invalid user secretaria from 211.253.24.250 port 33634
Jan  3 11:23:19 host sshd[3635]: input_userauth_request: invalid user secretaria [preauth]
Jan  3 11:23:19 host sshd[3635]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 11:23:19 host sshd[3635]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.253.24.250
Jan  3 11:23:20 host sshd[3635]: Failed password for invalid user secretaria from 211.253.24.250 port 33634 ssh2
Jan  3 11:23:21 host sshd[3635]: Received disconnect from 211.253.24.250 port 33634:11: Bye Bye [preauth]
Jan  3 11:23:21 host sshd[3635]: Disconnected from 211.253.24.250 port 33634 [preauth]
Jan  3 11:24:21 host sshd[3774]: User root from 178.22.168.220 not allowed because not listed in AllowUsers
Jan  3 11:24:21 host sshd[3774]: input_userauth_request: invalid user root [preauth]
Jan  3 11:24:21 host unix_chkpwd[3777]: password check failed for user (root)
Jan  3 11:24:21 host sshd[3774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.22.168.220  user=root
Jan  3 11:24:21 host sshd[3774]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 11:24:24 host sshd[3774]: Failed password for invalid user root from 178.22.168.220 port 39526 ssh2
Jan  3 11:24:24 host sshd[3774]: Received disconnect from 178.22.168.220 port 39526:11: Bye Bye [preauth]
Jan  3 11:24:24 host sshd[3774]: Disconnected from 178.22.168.220 port 39526 [preauth]
Jan  3 11:24:24 host sshd[3779]: Invalid user joe from 69.119.94.212 port 42861
Jan  3 11:24:24 host sshd[3779]: input_userauth_request: invalid user joe [preauth]
Jan  3 11:24:24 host sshd[3779]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 11:24:24 host sshd[3779]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.119.94.212
Jan  3 11:24:26 host sshd[3779]: Failed password for invalid user joe from 69.119.94.212 port 42861 ssh2
Jan  3 11:24:26 host sshd[3779]: Received disconnect from 69.119.94.212 port 42861:11: Bye Bye [preauth]
Jan  3 11:24:26 host sshd[3779]: Disconnected from 69.119.94.212 port 42861 [preauth]
Jan  3 11:25:10 host sshd[3908]: Invalid user postgres from 211.253.24.250 port 48677
Jan  3 11:25:10 host sshd[3908]: input_userauth_request: invalid user postgres [preauth]
Jan  3 11:25:10 host sshd[3908]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 11:25:10 host sshd[3908]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.253.24.250
Jan  3 11:25:12 host sshd[3908]: Failed password for invalid user postgres from 211.253.24.250 port 48677 ssh2
Jan  3 11:25:12 host sshd[3908]: Received disconnect from 211.253.24.250 port 48677:11: Bye Bye [preauth]
Jan  3 11:25:12 host sshd[3908]: Disconnected from 211.253.24.250 port 48677 [preauth]
Jan  3 11:25:35 host sshd[3976]: User root from 69.119.94.212 not allowed because not listed in AllowUsers
Jan  3 11:25:35 host sshd[3976]: input_userauth_request: invalid user root [preauth]
Jan  3 11:25:35 host unix_chkpwd[3979]: password check failed for user (root)
Jan  3 11:25:35 host sshd[3976]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.119.94.212  user=root
Jan  3 11:25:35 host sshd[3976]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 11:25:37 host sshd[3976]: Failed password for invalid user root from 69.119.94.212 port 54758 ssh2
Jan  3 11:25:41 host sshd[4015]: Invalid user rich from 79.17.69.184 port 48483
Jan  3 11:25:41 host sshd[4015]: input_userauth_request: invalid user rich [preauth]
Jan  3 11:25:41 host sshd[4015]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 11:25:41 host sshd[4015]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.17.69.184
Jan  3 11:25:43 host sshd[4015]: Failed password for invalid user rich from 79.17.69.184 port 48483 ssh2
Jan  3 11:25:43 host sshd[4015]: Received disconnect from 79.17.69.184 port 48483:11: Bye Bye [preauth]
Jan  3 11:25:43 host sshd[4015]: Disconnected from 79.17.69.184 port 48483 [preauth]
Jan  3 11:26:38 host sshd[4251]: Invalid user openerp from 46.101.144.67 port 38950
Jan  3 11:26:38 host sshd[4251]: input_userauth_request: invalid user openerp [preauth]
Jan  3 11:26:38 host sshd[4251]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 11:26:38 host sshd[4251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.144.67
Jan  3 11:26:41 host sshd[4251]: Failed password for invalid user openerp from 46.101.144.67 port 38950 ssh2
Jan  3 11:26:41 host sshd[4251]: Received disconnect from 46.101.144.67 port 38950:11: Bye Bye [preauth]
Jan  3 11:26:41 host sshd[4251]: Disconnected from 46.101.144.67 port 38950 [preauth]
Jan  3 11:26:42 host sshd[4259]: User root from 211.253.24.250 not allowed because not listed in AllowUsers
Jan  3 11:26:42 host sshd[4259]: input_userauth_request: invalid user root [preauth]
Jan  3 11:26:42 host unix_chkpwd[4262]: password check failed for user (root)
Jan  3 11:26:42 host sshd[4259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.253.24.250  user=root
Jan  3 11:26:42 host sshd[4259]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 11:26:44 host sshd[4259]: Failed password for invalid user root from 211.253.24.250 port 34722 ssh2
Jan  3 11:26:44 host sshd[4259]: Received disconnect from 211.253.24.250 port 34722:11: Bye Bye [preauth]
Jan  3 11:26:44 host sshd[4259]: Disconnected from 211.253.24.250 port 34722 [preauth]
Jan  3 11:27:10 host sshd[4352]: Invalid user vm from 190.187.237.243 port 57598
Jan  3 11:27:10 host sshd[4352]: input_userauth_request: invalid user vm [preauth]
Jan  3 11:27:10 host sshd[4352]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 11:27:10 host sshd[4352]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.187.237.243
Jan  3 11:27:13 host sshd[4352]: Failed password for invalid user vm from 190.187.237.243 port 57598 ssh2
Jan  3 11:27:13 host sshd[4352]: Received disconnect from 190.187.237.243 port 57598:11: Bye Bye [preauth]
Jan  3 11:27:13 host sshd[4352]: Disconnected from 190.187.237.243 port 57598 [preauth]
Jan  3 11:29:00 host sshd[4556]: User root from 158.160.39.60 not allowed because not listed in AllowUsers
Jan  3 11:29:00 host sshd[4556]: input_userauth_request: invalid user root [preauth]
Jan  3 11:29:00 host unix_chkpwd[4560]: password check failed for user (root)
Jan  3 11:29:00 host sshd[4556]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.160.39.60  user=root
Jan  3 11:29:00 host sshd[4556]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 11:29:02 host sshd[4556]: Failed password for invalid user root from 158.160.39.60 port 38524 ssh2
Jan  3 11:29:02 host sshd[4556]: Received disconnect from 158.160.39.60 port 38524:11: Bye Bye [preauth]
Jan  3 11:29:02 host sshd[4556]: Disconnected from 158.160.39.60 port 38524 [preauth]
Jan  3 11:29:16 host sshd[4587]: User root from 139.59.231.120 not allowed because not listed in AllowUsers
Jan  3 11:29:16 host sshd[4587]: input_userauth_request: invalid user root [preauth]
Jan  3 11:29:16 host unix_chkpwd[4589]: password check failed for user (root)
Jan  3 11:29:16 host sshd[4587]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.231.120  user=root
Jan  3 11:29:16 host sshd[4587]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 11:29:18 host sshd[4587]: Failed password for invalid user root from 139.59.231.120 port 48354 ssh2
Jan  3 11:29:18 host sshd[4587]: Received disconnect from 139.59.231.120 port 48354:11: Bye Bye [preauth]
Jan  3 11:29:18 host sshd[4587]: Disconnected from 139.59.231.120 port 48354 [preauth]
Jan  3 11:29:28 host sshd[4626]: User root from 130.61.228.129 not allowed because not listed in AllowUsers
Jan  3 11:29:28 host sshd[4626]: input_userauth_request: invalid user root [preauth]
Jan  3 11:29:28 host unix_chkpwd[4629]: password check failed for user (root)
Jan  3 11:29:28 host sshd[4626]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.61.228.129  user=root
Jan  3 11:29:28 host sshd[4626]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 11:29:30 host sshd[4626]: Failed password for invalid user root from 130.61.228.129 port 38114 ssh2
Jan  3 11:29:30 host sshd[4626]: Received disconnect from 130.61.228.129 port 38114:11: Bye Bye [preauth]
Jan  3 11:29:30 host sshd[4626]: Disconnected from 130.61.228.129 port 38114 [preauth]
Jan  3 11:30:48 host sshd[4786]: Invalid user roy from 59.124.205.215 port 55476
Jan  3 11:30:48 host sshd[4786]: input_userauth_request: invalid user roy [preauth]
Jan  3 11:30:48 host sshd[4786]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 11:30:48 host sshd[4786]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.124.205.215
Jan  3 11:30:50 host sshd[4786]: Failed password for invalid user roy from 59.124.205.215 port 55476 ssh2
Jan  3 11:30:50 host sshd[4786]: Received disconnect from 59.124.205.215 port 55476:11: Bye Bye [preauth]
Jan  3 11:30:50 host sshd[4786]: Disconnected from 59.124.205.215 port 55476 [preauth]
Jan  3 11:31:38 host sshd[5006]: User root from 130.61.228.129 not allowed because not listed in AllowUsers
Jan  3 11:31:38 host sshd[5006]: input_userauth_request: invalid user root [preauth]
Jan  3 11:31:38 host unix_chkpwd[5008]: password check failed for user (root)
Jan  3 11:31:38 host sshd[5006]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.61.228.129  user=root
Jan  3 11:31:38 host sshd[5006]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 11:31:40 host sshd[5006]: Failed password for invalid user root from 130.61.228.129 port 62922 ssh2
Jan  3 11:31:41 host sshd[5006]: Received disconnect from 130.61.228.129 port 62922:11: Bye Bye [preauth]
Jan  3 11:31:41 host sshd[5006]: Disconnected from 130.61.228.129 port 62922 [preauth]
Jan  3 11:31:48 host sshd[5053]: Invalid user testuser from 190.187.237.243 port 57856
Jan  3 11:31:48 host sshd[5053]: input_userauth_request: invalid user testuser [preauth]
Jan  3 11:31:48 host sshd[5053]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 11:31:48 host sshd[5053]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.187.237.243
Jan  3 11:31:49 host sshd[5053]: Failed password for invalid user testuser from 190.187.237.243 port 57856 ssh2
Jan  3 11:31:50 host sshd[5053]: Received disconnect from 190.187.237.243 port 57856:11: Bye Bye [preauth]
Jan  3 11:31:50 host sshd[5053]: Disconnected from 190.187.237.243 port 57856 [preauth]
Jan  3 11:32:20 host sshd[5106]: User root from 158.160.39.60 not allowed because not listed in AllowUsers
Jan  3 11:32:20 host sshd[5106]: input_userauth_request: invalid user root [preauth]
Jan  3 11:32:20 host unix_chkpwd[5109]: password check failed for user (root)
Jan  3 11:32:20 host sshd[5106]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.160.39.60  user=root
Jan  3 11:32:20 host sshd[5106]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 11:32:22 host sshd[5106]: Failed password for invalid user root from 158.160.39.60 port 51948 ssh2
Jan  3 11:32:25 host sshd[5146]: Invalid user Guest from 46.101.144.67 port 59044
Jan  3 11:32:25 host sshd[5146]: input_userauth_request: invalid user Guest [preauth]
Jan  3 11:32:25 host sshd[5146]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 11:32:25 host sshd[5146]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.144.67
Jan  3 11:32:27 host sshd[5146]: Failed password for invalid user Guest from 46.101.144.67 port 59044 ssh2
Jan  3 11:32:28 host sshd[5146]: Received disconnect from 46.101.144.67 port 59044:11: Bye Bye [preauth]
Jan  3 11:32:28 host sshd[5146]: Disconnected from 46.101.144.67 port 59044 [preauth]
Jan  3 11:33:15 host sshd[5231]: Invalid user www from 190.187.237.243 port 58012
Jan  3 11:33:15 host sshd[5231]: input_userauth_request: invalid user www [preauth]
Jan  3 11:33:15 host sshd[5231]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 11:33:15 host sshd[5231]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.187.237.243
Jan  3 11:33:17 host sshd[5231]: Failed password for invalid user www from 190.187.237.243 port 58012 ssh2
Jan  3 11:33:18 host sshd[5271]: User root from 139.59.231.120 not allowed because not listed in AllowUsers
Jan  3 11:33:18 host sshd[5271]: input_userauth_request: invalid user root [preauth]
Jan  3 11:33:18 host unix_chkpwd[5275]: password check failed for user (root)
Jan  3 11:33:18 host sshd[5271]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.231.120  user=root
Jan  3 11:33:18 host sshd[5271]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 11:33:19 host sshd[5271]: Failed password for invalid user root from 139.59.231.120 port 32888 ssh2
Jan  3 11:33:19 host sshd[5271]: Received disconnect from 139.59.231.120 port 32888:11: Bye Bye [preauth]
Jan  3 11:33:19 host sshd[5271]: Disconnected from 139.59.231.120 port 32888 [preauth]
Jan  3 11:33:33 host sshd[5359]: Invalid user mqm from 46.101.144.67 port 50978
Jan  3 11:33:33 host sshd[5359]: input_userauth_request: invalid user mqm [preauth]
Jan  3 11:33:33 host sshd[5359]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 11:33:33 host sshd[5359]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.144.67
Jan  3 11:33:35 host sshd[5359]: Failed password for invalid user mqm from 46.101.144.67 port 50978 ssh2
Jan  3 11:33:36 host sshd[5359]: Received disconnect from 46.101.144.67 port 50978:11: Bye Bye [preauth]
Jan  3 11:33:36 host sshd[5359]: Disconnected from 46.101.144.67 port 50978 [preauth]
Jan  3 11:33:47 host sshd[5410]: User root from 59.124.205.215 not allowed because not listed in AllowUsers
Jan  3 11:33:47 host sshd[5410]: input_userauth_request: invalid user root [preauth]
Jan  3 11:33:47 host unix_chkpwd[5415]: password check failed for user (root)
Jan  3 11:33:47 host sshd[5410]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.124.205.215  user=root
Jan  3 11:33:47 host sshd[5410]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 11:33:49 host sshd[5410]: Failed password for invalid user root from 59.124.205.215 port 60182 ssh2
Jan  3 11:33:50 host sshd[5410]: Received disconnect from 59.124.205.215 port 60182:11: Bye Bye [preauth]
Jan  3 11:33:50 host sshd[5410]: Disconnected from 59.124.205.215 port 60182 [preauth]
Jan  3 11:39:47 host sshd[6324]: Did not receive identification string from 103.239.165.41 port 46590
Jan  3 11:41:35 host sshd[6546]: Invalid user wps from 103.239.165.41 port 37593
Jan  3 11:41:35 host sshd[6546]: input_userauth_request: invalid user wps [preauth]
Jan  3 11:41:35 host sshd[6546]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 11:41:35 host sshd[6546]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.239.165.41
Jan  3 11:41:37 host sshd[6546]: Failed password for invalid user wps from 103.239.165.41 port 37593 ssh2
Jan  3 11:41:37 host sshd[6546]: Received disconnect from 103.239.165.41 port 37593:11: Normal Shutdown, Thank you for playing [preauth]
Jan  3 11:41:37 host sshd[6546]: Disconnected from 103.239.165.41 port 37593 [preauth]
Jan  3 11:41:59 host sshd[6577]: User root from 103.239.165.41 not allowed because not listed in AllowUsers
Jan  3 11:41:59 host sshd[6577]: input_userauth_request: invalid user root [preauth]
Jan  3 11:41:59 host unix_chkpwd[6579]: password check failed for user (root)
Jan  3 11:41:59 host sshd[6577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.239.165.41  user=root
Jan  3 11:41:59 host sshd[6577]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 11:42:01 host sshd[6577]: Failed password for invalid user root from 103.239.165.41 port 52590 ssh2
Jan  3 11:42:02 host sshd[6577]: Received disconnect from 103.239.165.41 port 52590:11: Normal Shutdown, Thank you for playing [preauth]
Jan  3 11:42:02 host sshd[6577]: Disconnected from 103.239.165.41 port 52590 [preauth]
Jan  3 11:42:40 host sshd[6788]: Invalid user admin from 45.93.201.90 port 43022
Jan  3 11:42:40 host sshd[6788]: input_userauth_request: invalid user admin [preauth]
Jan  3 11:42:40 host sshd[6788]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 11:42:40 host sshd[6788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90
Jan  3 11:42:42 host sshd[6788]: Failed password for invalid user admin from 45.93.201.90 port 43022 ssh2
Jan  3 11:42:45 host sshd[6788]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 11:42:47 host sshd[6788]: Failed password for invalid user admin from 45.93.201.90 port 43022 ssh2
Jan  3 11:42:50 host sshd[6788]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 11:42:52 host sshd[6788]: Failed password for invalid user admin from 45.93.201.90 port 43022 ssh2
Jan  3 11:42:55 host sshd[6788]: Connection closed by 45.93.201.90 port 43022 [preauth]
Jan  3 11:42:55 host sshd[6788]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90
Jan  3 11:44:31 host sshd[6989]: Invalid user pc from 41.197.31.178 port 56126
Jan  3 11:44:31 host sshd[6989]: input_userauth_request: invalid user pc [preauth]
Jan  3 11:44:31 host sshd[6989]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 11:44:31 host sshd[6989]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178
Jan  3 11:44:33 host sshd[6989]: Failed password for invalid user pc from 41.197.31.178 port 56126 ssh2
Jan  3 11:44:33 host sshd[6989]: Connection closed by 41.197.31.178 port 56126 [preauth]
Jan  3 11:45:03 host sshd[7076]: Did not receive identification string from 103.195.236.159 port 50564
Jan  3 11:45:04 host sshd[7078]: User centos from 103.195.236.159 not allowed because not listed in AllowUsers
Jan  3 11:45:04 host sshd[7078]: input_userauth_request: invalid user centos [preauth]
Jan  3 11:45:04 host sshd[7087]: Invalid user dmdba from 103.195.236.159 port 53068
Jan  3 11:45:04 host sshd[7091]: User centos from 103.195.236.159 not allowed because not listed in AllowUsers
Jan  3 11:45:04 host sshd[7087]: input_userauth_request: invalid user dmdba [preauth]
Jan  3 11:45:04 host sshd[7091]: input_userauth_request: invalid user centos [preauth]
Jan  3 11:45:04 host sshd[7082]: Invalid user git from 103.195.236.159 port 53040
Jan  3 11:45:04 host sshd[7082]: input_userauth_request: invalid user git [preauth]
Jan  3 11:45:04 host sshd[7103]: User centos from 103.195.236.159 not allowed because not listed in AllowUsers
Jan  3 11:45:04 host sshd[7103]: input_userauth_request: invalid user centos [preauth]
Jan  3 11:45:04 host sshd[7087]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 11:45:04 host sshd[7087]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.195.236.159
Jan  3 11:45:04 host unix_chkpwd[7131]: password check failed for user (centos)
Jan  3 11:45:04 host sshd[7103]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.195.236.159  user=centos
Jan  3 11:45:04 host sshd[7080]: Invalid user mc from 103.195.236.159 port 53060
Jan  3 11:45:04 host sshd[7080]: input_userauth_request: invalid user mc [preauth]
Jan  3 11:45:04 host sshd[7081]: Invalid user hadoop from 103.195.236.159 port 53042
Jan  3 11:45:04 host sshd[7081]: input_userauth_request: invalid user hadoop [preauth]
Jan  3 11:45:04 host sshd[7086]: User centos from 103.195.236.159 not allowed because not listed in AllowUsers
Jan  3 11:45:04 host sshd[7086]: input_userauth_request: invalid user centos [preauth]
Jan  3 11:45:04 host sshd[7101]: Invalid user es from 103.195.236.159 port 53082
Jan  3 11:45:04 host sshd[7101]: input_userauth_request: invalid user es [preauth]
Jan  3 11:45:04 host sshd[7102]: User centos from 103.195.236.159 not allowed because not listed in AllowUsers
Jan  3 11:45:04 host sshd[7102]: input_userauth_request: invalid user centos [preauth]
Jan  3 11:45:04 host sshd[7099]: Invalid user user from 103.195.236.159 port 53092
Jan  3 11:45:04 host sshd[7099]: input_userauth_request: invalid user user [preauth]
Jan  3 11:45:04 host sshd[7090]: Invalid user ftpuser from 103.195.236.159 port 53100
Jan  3 11:45:04 host sshd[7090]: input_userauth_request: invalid user ftpuser [preauth]
Jan  3 11:45:04 host sshd[7080]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 11:45:04 host sshd[7080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.195.236.159
Jan  3 11:45:04 host unix_chkpwd[7132]: password check failed for user (centos)
Jan  3 11:45:04 host sshd[7078]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.195.236.159  user=centos
Jan  3 11:45:04 host unix_chkpwd[7133]: password check failed for user (centos)
Jan  3 11:45:04 host sshd[7091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.195.236.159  user=centos
Jan  3 11:45:04 host sshd[7101]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 11:45:04 host sshd[7101]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.195.236.159
Jan  3 11:45:04 host sshd[7099]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 11:45:04 host sshd[7099]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.195.236.159
Jan  3 11:45:04 host sshd[7090]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 11:45:04 host sshd[7090]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.195.236.159
Jan  3 11:45:04 host unix_chkpwd[7135]: password check failed for user (centos)
Jan  3 11:45:04 host sshd[7102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.195.236.159  user=centos
Jan  3 11:45:04 host sshd[7092]: Invalid user dockeradmin from 103.195.236.159 port 53090
Jan  3 11:45:04 host sshd[7092]: input_userauth_request: invalid user dockeradmin [preauth]
Jan  3 11:45:05 host sshd[7095]: Invalid user ubuntu from 103.195.236.159 port 53080
Jan  3 11:45:05 host sshd[7095]: input_userauth_request: invalid user ubuntu [preauth]
Jan  3 11:45:05 host sshd[7081]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 11:45:05 host sshd[7081]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.195.236.159
Jan  3 11:45:05 host unix_chkpwd[7143]: password check failed for user (centos)
Jan  3 11:45:05 host sshd[7086]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.195.236.159  user=centos
Jan  3 11:45:05 host sshd[7092]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 11:45:05 host sshd[7092]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.195.236.159
Jan  3 11:45:05 host sshd[7085]: Invalid user zjw from 103.195.236.159 port 53052
Jan  3 11:45:05 host sshd[7085]: input_userauth_request: invalid user zjw [preauth]
Jan  3 11:45:05 host sshd[7083]: Invalid user www from 103.195.236.159 port 53058
Jan  3 11:45:05 host sshd[7084]: User centos from 103.195.236.159 not allowed because not listed in AllowUsers
Jan  3 11:45:05 host sshd[7084]: input_userauth_request: invalid user centos [preauth]
Jan  3 11:45:05 host sshd[7093]: Invalid user support from 103.195.236.159 port 53074
Jan  3 11:45:05 host sshd[7083]: input_userauth_request: invalid user www [preauth]
Jan  3 11:45:05 host sshd[7093]: input_userauth_request: invalid user support [preauth]
Jan  3 11:45:05 host sshd[7095]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 11:45:05 host sshd[7095]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.195.236.159
Jan  3 11:45:05 host sshd[7094]: Invalid user ftpuser from 103.195.236.159 port 53084
Jan  3 11:45:05 host sshd[7096]: Invalid user es from 103.195.236.159 port 53056
Jan  3 11:45:05 host sshd[7094]: input_userauth_request: invalid user ftpuser [preauth]
Jan  3 11:45:05 host sshd[7096]: input_userauth_request: invalid user es [preauth]
Jan  3 11:45:05 host sshd[7079]: Invalid user user from 103.195.236.159 port 53054
Jan  3 11:45:05 host sshd[7079]: input_userauth_request: invalid user user [preauth]
Jan  3 11:45:05 host sshd[7100]: Invalid user jenkins from 103.195.236.159 port 53108
Jan  3 11:45:05 host sshd[7100]: input_userauth_request: invalid user jenkins [preauth]
Jan  3 11:45:05 host sshd[7085]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 11:45:05 host sshd[7085]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.195.236.159
Jan  3 11:45:05 host sshd[7089]: Invalid user discordbot from 103.195.236.159 port 53088
Jan  3 11:45:05 host sshd[7089]: input_userauth_request: invalid user discordbot [preauth]
Jan  3 11:45:05 host sshd[7083]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 11:45:05 host sshd[7083]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.195.236.159
Jan  3 11:45:05 host sshd[7093]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 11:45:05 host sshd[7093]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.195.236.159
Jan  3 11:45:05 host unix_chkpwd[7144]: password check failed for user (centos)
Jan  3 11:45:05 host sshd[7084]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.195.236.159  user=centos
Jan  3 11:45:05 host sshd[7094]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 11:45:05 host sshd[7094]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.195.236.159
Jan  3 11:45:05 host sshd[7079]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 11:45:05 host sshd[7079]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.195.236.159
Jan  3 11:45:05 host sshd[7100]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 11:45:05 host sshd[7100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.195.236.159
Jan  3 11:45:05 host sshd[7137]: Invalid user jenkins from 103.195.236.159 port 53104
Jan  3 11:45:05 host sshd[7137]: input_userauth_request: invalid user jenkins [preauth]
Jan  3 11:45:05 host sshd[7137]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 11:45:05 host sshd[7137]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.195.236.159
Jan  3 11:45:05 host sshd[7088]: Invalid user git from 103.195.236.159 port 53046
Jan  3 11:45:05 host sshd[7088]: input_userauth_request: invalid user git [preauth]
Jan  3 11:45:05 host sshd[7096]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 11:45:05 host sshd[7096]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.195.236.159
Jan  3 11:45:05 host sshd[7098]: Invalid user dockeradmin from 103.195.236.159 port 53086
Jan  3 11:45:05 host sshd[7098]: input_userauth_request: invalid user dockeradmin [preauth]
Jan  3 11:45:06 host sshd[7089]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 11:45:06 host sshd[7089]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.195.236.159
Jan  3 11:45:06 host sshd[7082]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 11:45:06 host sshd[7082]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.195.236.159
Jan  3 11:45:06 host sshd[7087]: Failed password for invalid user dmdba from 103.195.236.159 port 53068 ssh2
Jan  3 11:45:06 host sshd[7103]: Failed password for invalid user centos from 103.195.236.159 port 53094 ssh2
Jan  3 11:45:06 host sshd[7103]: Connection closed by 103.195.236.159 port 53094 [preauth]
Jan  3 11:45:06 host sshd[7098]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 11:45:06 host sshd[7098]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.195.236.159
Jan  3 11:45:06 host sshd[7080]: Failed password for invalid user mc from 103.195.236.159 port 53060 ssh2
Jan  3 11:45:06 host sshd[7077]: Invalid user ubuntu from 103.195.236.159 port 53038
Jan  3 11:45:06 host sshd[7077]: input_userauth_request: invalid user ubuntu [preauth]
Jan  3 11:45:06 host sshd[7078]: Failed password for invalid user centos from 103.195.236.159 port 53050 ssh2
Jan  3 11:45:06 host sshd[7088]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 11:45:06 host sshd[7088]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.195.236.159
Jan  3 11:45:06 host sshd[7091]: Failed password for invalid user centos from 103.195.236.159 port 53066 ssh2
Jan  3 11:45:06 host sshd[7101]: Failed password for invalid user es from 103.195.236.159 port 53082 ssh2
Jan  3 11:45:06 host sshd[7077]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 11:45:06 host sshd[7077]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.195.236.159
Jan  3 11:45:06 host sshd[7078]: Connection closed by 103.195.236.159 port 53050 [preauth]
Jan  3 11:45:06 host sshd[7087]: Connection closed by 103.195.236.159 port 53068 [preauth]
Jan  3 11:45:06 host sshd[7101]: Connection closed by 103.195.236.159 port 53082 [preauth]
Jan  3 11:45:06 host sshd[7097]: Invalid user ftpuser from 103.195.236.159 port 53110
Jan  3 11:45:06 host sshd[7097]: input_userauth_request: invalid user ftpuser [preauth]
Jan  3 11:45:06 host sshd[7136]: Invalid user test from 103.195.236.159 port 53044
Jan  3 11:45:06 host sshd[7136]: input_userauth_request: invalid user test [preauth]
Jan  3 11:45:06 host sshd[7099]: Failed password for invalid user user from 103.195.236.159 port 53092 ssh2
Jan  3 11:45:06 host sshd[7090]: Failed password for invalid user ftpuser from 103.195.236.159 port 53100 ssh2
Jan  3 11:45:06 host sshd[7102]: Failed password for invalid user centos from 103.195.236.159 port 53048 ssh2
Jan  3 11:45:06 host sshd[7136]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 11:45:06 host sshd[7136]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.195.236.159
Jan  3 11:45:06 host sshd[7090]: Connection closed by 103.195.236.159 port 53100 [preauth]
Jan  3 11:45:07 host sshd[7099]: Connection closed by 103.195.236.159 port 53092 [preauth]
Jan  3 11:45:07 host sshd[7102]: Connection closed by 103.195.236.159 port 53048 [preauth]
Jan  3 11:45:07 host sshd[7081]: Failed password for invalid user hadoop from 103.195.236.159 port 53042 ssh2
Jan  3 11:45:07 host sshd[7086]: Failed password for invalid user centos from 103.195.236.159 port 53062 ssh2
Jan  3 11:45:07 host sshd[7092]: Failed password for invalid user dockeradmin from 103.195.236.159 port 53090 ssh2
Jan  3 11:45:07 host sshd[7091]: Connection closed by 103.195.236.159 port 53066 [preauth]
Jan  3 11:45:07 host sshd[7095]: Failed password for invalid user ubuntu from 103.195.236.159 port 53080 ssh2
Jan  3 11:45:07 host sshd[7085]: Failed password for invalid user zjw from 103.195.236.159 port 53052 ssh2
Jan  3 11:45:07 host sshd[7083]: Failed password for invalid user www from 103.195.236.159 port 53058 ssh2
Jan  3 11:45:07 host sshd[7093]: Failed password for invalid user support from 103.195.236.159 port 53074 ssh2
Jan  3 11:45:07 host sshd[7084]: Failed password for invalid user centos from 103.195.236.159 port 53098 ssh2
Jan  3 11:45:07 host sshd[7080]: Connection closed by 103.195.236.159 port 53060 [preauth]
Jan  3 11:45:07 host sshd[7086]: Connection closed by 103.195.236.159 port 53062 [preauth]
Jan  3 11:45:07 host sshd[7094]: Failed password for invalid user ftpuser from 103.195.236.159 port 53084 ssh2
Jan  3 11:45:07 host sshd[7095]: Connection closed by 103.195.236.159 port 53080 [preauth]
Jan  3 11:45:07 host sshd[7097]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 11:45:07 host sshd[7097]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.195.236.159
Jan  3 11:45:07 host sshd[7079]: Failed password for invalid user user from 103.195.236.159 port 53054 ssh2
Jan  3 11:45:07 host sshd[7100]: Failed password for invalid user jenkins from 103.195.236.159 port 53108 ssh2
Jan  3 11:45:07 host sshd[7084]: Connection closed by 103.195.236.159 port 53098 [preauth]
Jan  3 11:45:07 host sshd[7094]: Connection closed by 103.195.236.159 port 53084 [preauth]
Jan  3 11:45:08 host sshd[7137]: Failed password for invalid user jenkins from 103.195.236.159 port 53104 ssh2
Jan  3 11:45:08 host sshd[7089]: Failed password for invalid user discordbot from 103.195.236.159 port 53088 ssh2
Jan  3 11:45:08 host sshd[7082]: Failed password for invalid user git from 103.195.236.159 port 53040 ssh2
Jan  3 11:45:08 host sshd[7085]: Connection closed by 103.195.236.159 port 53052 [preauth]
Jan  3 11:45:08 host sshd[7093]: Connection closed by 103.195.236.159 port 53074 [preauth]
Jan  3 11:45:08 host sshd[7089]: Connection closed by 103.195.236.159 port 53088 [preauth]
Jan  3 11:45:08 host sshd[7079]: Connection closed by 103.195.236.159 port 53054 [preauth]
Jan  3 11:45:08 host sshd[7100]: Connection closed by 103.195.236.159 port 53108 [preauth]
Jan  3 11:45:08 host sshd[7082]: Connection closed by 103.195.236.159 port 53040 [preauth]
Jan  3 11:45:08 host sshd[7096]: Failed password for invalid user es from 103.195.236.159 port 53056 ssh2
Jan  3 11:45:08 host sshd[7077]: Failed password for invalid user ubuntu from 103.195.236.159 port 53038 ssh2
Jan  3 11:45:08 host sshd[7098]: Failed password for invalid user dockeradmin from 103.195.236.159 port 53086 ssh2
Jan  3 11:45:08 host sshd[7088]: Failed password for invalid user git from 103.195.236.159 port 53046 ssh2
Jan  3 11:45:08 host sshd[7092]: Connection closed by 103.195.236.159 port 53090 [preauth]
Jan  3 11:45:08 host sshd[7081]: Connection closed by 103.195.236.159 port 53042 [preauth]
Jan  3 11:45:08 host sshd[7137]: Connection closed by 103.195.236.159 port 53104 [preauth]
Jan  3 11:45:08 host sshd[7147]: Invalid user user from 103.195.236.159 port 53096
Jan  3 11:45:08 host sshd[7147]: input_userauth_request: invalid user user [preauth]
Jan  3 11:45:08 host sshd[7096]: Connection closed by 103.195.236.159 port 53056 [preauth]
Jan  3 11:45:08 host sshd[7077]: Connection closed by 103.195.236.159 port 53038 [preauth]
Jan  3 11:45:08 host sshd[7088]: Connection closed by 103.195.236.159 port 53046 [preauth]
Jan  3 11:45:08 host sshd[7083]: Connection closed by 103.195.236.159 port 53058 [preauth]
Jan  3 11:45:08 host sshd[7098]: Connection closed by 103.195.236.159 port 53086 [preauth]
Jan  3 11:45:08 host sshd[7136]: Failed password for invalid user test from 103.195.236.159 port 53044 ssh2
Jan  3 11:45:09 host sshd[7147]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 11:45:09 host sshd[7147]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.195.236.159
Jan  3 11:45:09 host sshd[7136]: Connection closed by 103.195.236.159 port 53044 [preauth]
Jan  3 11:45:10 host sshd[7097]: Failed password for invalid user ftpuser from 103.195.236.159 port 53110 ssh2
Jan  3 11:45:10 host sshd[7097]: Connection closed by 103.195.236.159 port 53110 [preauth]
Jan  3 11:45:10 host sshd[7147]: Failed password for invalid user user from 103.195.236.159 port 53096 ssh2
Jan  3 11:46:19 host sshd[7307]: User root from 92.46.108.20 not allowed because not listed in AllowUsers
Jan  3 11:46:19 host sshd[7307]: input_userauth_request: invalid user root [preauth]
Jan  3 11:46:20 host unix_chkpwd[7314]: password check failed for user (root)
Jan  3 11:46:20 host sshd[7307]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20  user=root
Jan  3 11:46:20 host sshd[7307]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 11:46:22 host sshd[7307]: Failed password for invalid user root from 92.46.108.20 port 43262 ssh2
Jan  3 11:46:23 host sshd[7307]: Connection closed by 92.46.108.20 port 43262 [preauth]
Jan  3 11:52:47 host sshd[8363]: Invalid user es from 106.10.122.53 port 40214
Jan  3 11:52:47 host sshd[8363]: input_userauth_request: invalid user es [preauth]
Jan  3 11:52:47 host sshd[8363]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 11:52:47 host sshd[8363]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53
Jan  3 11:52:49 host sshd[8363]: Failed password for invalid user es from 106.10.122.53 port 40214 ssh2
Jan  3 11:52:49 host sshd[8363]: Connection closed by 106.10.122.53 port 40214 [preauth]
Jan  3 12:04:10 host sshd[10015]: Invalid user rabbitmq from 79.9.67.252 port 58661
Jan  3 12:04:10 host sshd[10015]: input_userauth_request: invalid user rabbitmq [preauth]
Jan  3 12:04:10 host sshd[10015]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 12:04:10 host sshd[10015]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.9.67.252
Jan  3 12:04:12 host sshd[10015]: Failed password for invalid user rabbitmq from 79.9.67.252 port 58661 ssh2
Jan  3 12:04:12 host sshd[10015]: Received disconnect from 79.9.67.252 port 58661:11: Bye Bye [preauth]
Jan  3 12:04:12 host sshd[10015]: Disconnected from 79.9.67.252 port 58661 [preauth]
Jan  3 12:04:57 host sshd[10283]: Invalid user edu from 123.30.149.76 port 43147
Jan  3 12:04:57 host sshd[10283]: input_userauth_request: invalid user edu [preauth]
Jan  3 12:04:57 host sshd[10283]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 12:04:57 host sshd[10283]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.30.149.76
Jan  3 12:04:59 host sshd[10283]: Failed password for invalid user edu from 123.30.149.76 port 43147 ssh2
Jan  3 12:04:59 host sshd[10283]: Received disconnect from 123.30.149.76 port 43147:11: Bye Bye [preauth]
Jan  3 12:04:59 host sshd[10283]: Disconnected from 123.30.149.76 port 43147 [preauth]
Jan  3 12:09:05 host sshd[11435]: Invalid user edwin from 123.30.149.76 port 38260
Jan  3 12:09:05 host sshd[11435]: input_userauth_request: invalid user edwin [preauth]
Jan  3 12:09:05 host sshd[11435]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 12:09:05 host sshd[11435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.30.149.76
Jan  3 12:09:06 host sshd[11435]: Failed password for invalid user edwin from 123.30.149.76 port 38260 ssh2
Jan  3 12:09:06 host sshd[11435]: Received disconnect from 123.30.149.76 port 38260:11: Bye Bye [preauth]
Jan  3 12:09:06 host sshd[11435]: Disconnected from 123.30.149.76 port 38260 [preauth]
Jan  3 12:10:43 host sshd[11811]: User root from 79.9.67.252 not allowed because not listed in AllowUsers
Jan  3 12:10:43 host sshd[11811]: input_userauth_request: invalid user root [preauth]
Jan  3 12:10:43 host unix_chkpwd[11815]: password check failed for user (root)
Jan  3 12:10:43 host sshd[11811]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.9.67.252  user=root
Jan  3 12:10:43 host sshd[11811]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 12:10:44 host sshd[11818]: Invalid user oracle from 123.30.149.76 port 52560
Jan  3 12:10:44 host sshd[11818]: input_userauth_request: invalid user oracle [preauth]
Jan  3 12:10:44 host sshd[11818]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 12:10:44 host sshd[11818]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.30.149.76
Jan  3 12:10:45 host sshd[11811]: Failed password for invalid user root from 79.9.67.252 port 52835 ssh2
Jan  3 12:10:45 host sshd[11811]: Received disconnect from 79.9.67.252 port 52835:11: Bye Bye [preauth]
Jan  3 12:10:45 host sshd[11811]: Disconnected from 79.9.67.252 port 52835 [preauth]
Jan  3 12:10:46 host sshd[11818]: Failed password for invalid user oracle from 123.30.149.76 port 52560 ssh2
Jan  3 12:10:46 host sshd[11818]: Received disconnect from 123.30.149.76 port 52560:11: Bye Bye [preauth]
Jan  3 12:10:46 host sshd[11818]: Disconnected from 123.30.149.76 port 52560 [preauth]
Jan  3 12:11:04 host sshd[11910]: Connection closed by 192.155.90.220 port 55308 [preauth]
Jan  3 12:11:05 host sshd[11916]: Connection closed by 192.155.90.220 port 55322 [preauth]
Jan  3 12:11:06 host sshd[11919]: Connection closed by 192.155.90.220 port 55334 [preauth]
Jan  3 12:12:55 host sshd[12150]: Invalid user admin from 162.218.126.136 port 42114
Jan  3 12:12:55 host sshd[12150]: input_userauth_request: invalid user admin [preauth]
Jan  3 12:12:55 host sshd[12150]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 12:12:55 host sshd[12150]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136
Jan  3 12:12:57 host sshd[12150]: Failed password for invalid user admin from 162.218.126.136 port 42114 ssh2
Jan  3 12:12:57 host sshd[12150]: Connection closed by 162.218.126.136 port 42114 [preauth]
Jan  3 12:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  3 12:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 12:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 12:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  3 12:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 12:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 12:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  3 12:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 12:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 12:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  3 12:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 12:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 12:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  3 12:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 12:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 12:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  3 12:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 12:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 12:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  3 12:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 12:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 12:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  3 12:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 12:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 12:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  3 12:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 12:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 12:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  3 12:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 12:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 12:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  3 12:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 12:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 12:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  3 12:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 12:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 12:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  3 12:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 12:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 12:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=travelboniface user-3=ugotscom user-4=wwwresourcehunte user-5=keralaholi user-6=wwwrmswll user-7=cochintaxi user-8=wwwkaretakers user-9=a2zgroup user-10=dartsimp user-11=laundryboniface user-12=wwwevmhonda user-13=bonifacegroup user-14=straightcurve user-15=wwwletsstalkfood user-16=kottayamcalldriv user-17=phmetals user-18=palco123 user-19=gifterman user-20=wwwnexidigital user-21=mrsclean user-22=wwwkmaorg user-23=disposeat user-24=remysagr user-25=wwwkapin user-26=woodpeck user-27=shalinijames user-28=wwwtestugo user-29=vfmassets user-30=pmcresources feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  3 12:21:51 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  3 12:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 12:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 12:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  3 12:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 12:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 12:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-7GBur4agbdzoFLzb.~
Jan  3 12:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 12:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 12:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-7GBur4agbdzoFLzb.~'
Jan  3 12:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 12:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 12:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-7GBur4agbdzoFLzb.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  3 12:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 12:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 12:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  3 12:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 12:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 12:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  3 12:21:56 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 12:21:56 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 12:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  3 12:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 12:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 12:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  3 12:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 12:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 12:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  3 12:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 12:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 12:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  3 12:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 12:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 12:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  3 12:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 12:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 12:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  3 12:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  3 12:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  3 12:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  3 12:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  3 12:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  3 12:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  3 12:22:02 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  3 12:22:09 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  3 12:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  3 12:22:09 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 12:22:16 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 12:22:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  3 12:22:16 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 12:22:16 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 12:22:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  3 12:22:16 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 12:22:19 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 12:22:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  3 12:22:19 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 12:22:25 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 12:22:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  3 12:22:25 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 12:22:27 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 12:22:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  3 12:22:27 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  3 12:22:28 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  3 12:28:32 host sshd[14614]: Did not receive identification string from 192.53.164.39 port 51828
Jan  3 12:35:54 host sshd[15556]: Connection closed by 167.94.146.58 port 49218 [preauth]
Jan  3 12:43:03 host sshd[16465]: User root from 103.13.40.2 not allowed because not listed in AllowUsers
Jan  3 12:43:03 host sshd[16465]: input_userauth_request: invalid user root [preauth]
Jan  3 12:43:03 host unix_chkpwd[16467]: password check failed for user (root)
Jan  3 12:43:03 host sshd[16465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2  user=root
Jan  3 12:43:03 host sshd[16465]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 12:43:05 host sshd[16465]: Failed password for invalid user root from 103.13.40.2 port 34328 ssh2
Jan  3 12:43:05 host sshd[16465]: Connection closed by 103.13.40.2 port 34328 [preauth]
Jan  3 12:54:32 host sshd[18109]: User root from 192.99.59.56 not allowed because not listed in AllowUsers
Jan  3 12:54:32 host sshd[18109]: input_userauth_request: invalid user root [preauth]
Jan  3 12:54:32 host unix_chkpwd[18113]: password check failed for user (root)
Jan  3 12:54:32 host sshd[18109]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.59.56  user=root
Jan  3 12:54:32 host sshd[18109]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 12:54:35 host sshd[18109]: Failed password for invalid user root from 192.99.59.56 port 47524 ssh2
Jan  3 12:54:35 host sshd[18109]: Received disconnect from 192.99.59.56 port 47524:11: Bye Bye [preauth]
Jan  3 12:54:35 host sshd[18109]: Disconnected from 192.99.59.56 port 47524 [preauth]
Jan  3 12:59:57 host sshd[18971]: User root from 147.182.185.141 not allowed because not listed in AllowUsers
Jan  3 12:59:57 host sshd[18971]: input_userauth_request: invalid user root [preauth]
Jan  3 12:59:57 host unix_chkpwd[18975]: password check failed for user (root)
Jan  3 12:59:57 host sshd[18971]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.182.185.141  user=root
Jan  3 12:59:57 host sshd[18971]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 12:59:59 host sshd[18971]: Failed password for invalid user root from 147.182.185.141 port 51080 ssh2
Jan  3 12:59:59 host sshd[18971]: Received disconnect from 147.182.185.141 port 51080:11: Bye Bye [preauth]
Jan  3 12:59:59 host sshd[18971]: Disconnected from 147.182.185.141 port 51080 [preauth]
Jan  3 13:00:53 host sshd[19230]: Invalid user camille from 192.99.59.56 port 50994
Jan  3 13:00:53 host sshd[19230]: input_userauth_request: invalid user camille [preauth]
Jan  3 13:00:53 host sshd[19230]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 13:00:53 host sshd[19230]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.59.56
Jan  3 13:00:55 host sshd[19230]: Failed password for invalid user camille from 192.99.59.56 port 50994 ssh2
Jan  3 13:00:56 host sshd[19230]: Received disconnect from 192.99.59.56 port 50994:11: Bye Bye [preauth]
Jan  3 13:00:56 host sshd[19230]: Disconnected from 192.99.59.56 port 50994 [preauth]
Jan  3 13:01:23 host sshd[19355]: User root from 139.59.36.71 not allowed because not listed in AllowUsers
Jan  3 13:01:23 host sshd[19355]: input_userauth_request: invalid user root [preauth]
Jan  3 13:01:23 host unix_chkpwd[19357]: password check failed for user (root)
Jan  3 13:01:23 host sshd[19355]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.36.71  user=root
Jan  3 13:01:23 host sshd[19355]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 13:01:25 host sshd[19355]: Failed password for invalid user root from 139.59.36.71 port 48856 ssh2
Jan  3 13:01:25 host sshd[19355]: Received disconnect from 139.59.36.71 port 48856:11: Bye Bye [preauth]
Jan  3 13:01:25 host sshd[19355]: Disconnected from 139.59.36.71 port 48856 [preauth]
Jan  3 13:01:26 host sshd[19360]: Invalid user marielle from 147.182.185.141 port 51196
Jan  3 13:01:26 host sshd[19360]: input_userauth_request: invalid user marielle [preauth]
Jan  3 13:01:26 host sshd[19360]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 13:01:26 host sshd[19360]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.182.185.141
Jan  3 13:01:29 host sshd[19360]: Failed password for invalid user marielle from 147.182.185.141 port 51196 ssh2
Jan  3 13:01:29 host sshd[19360]: Received disconnect from 147.182.185.141 port 51196:11: Bye Bye [preauth]
Jan  3 13:01:29 host sshd[19360]: Disconnected from 147.182.185.141 port 51196 [preauth]
Jan  3 13:01:38 host sshd[19439]: User root from 200.43.89.216 not allowed because not listed in AllowUsers
Jan  3 13:01:38 host sshd[19439]: input_userauth_request: invalid user root [preauth]
Jan  3 13:01:38 host unix_chkpwd[19446]: password check failed for user (root)
Jan  3 13:01:38 host sshd[19439]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.43.89.216  user=root
Jan  3 13:01:38 host sshd[19439]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 13:01:40 host sshd[19439]: Failed password for invalid user root from 200.43.89.216 port 56806 ssh2
Jan  3 13:01:40 host sshd[19439]: Received disconnect from 200.43.89.216 port 56806:11: Bye Bye [preauth]
Jan  3 13:01:40 host sshd[19439]: Disconnected from 200.43.89.216 port 56806 [preauth]
Jan  3 13:01:52 host sshd[19468]: User root from 200.43.89.216 not allowed because not listed in AllowUsers
Jan  3 13:01:52 host sshd[19468]: input_userauth_request: invalid user root [preauth]
Jan  3 13:01:52 host unix_chkpwd[19476]: password check failed for user (root)
Jan  3 13:01:52 host sshd[19468]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.43.89.216  user=root
Jan  3 13:01:52 host sshd[19468]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 13:01:52 host sshd[19473]: User root from 209.141.55.27 not allowed because not listed in AllowUsers
Jan  3 13:01:52 host sshd[19473]: input_userauth_request: invalid user root [preauth]
Jan  3 13:01:52 host unix_chkpwd[19477]: password check failed for user (root)
Jan  3 13:01:52 host sshd[19473]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.55.27  user=root
Jan  3 13:01:52 host sshd[19473]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 13:01:54 host sshd[19468]: Failed password for invalid user root from 200.43.89.216 port 58352 ssh2
Jan  3 13:01:54 host sshd[19473]: Failed password for invalid user root from 209.141.55.27 port 55752 ssh2
Jan  3 13:01:54 host sshd[19473]: Received disconnect from 209.141.55.27 port 55752:11: Normal Shutdown, Thank you for playing [preauth]
Jan  3 13:01:54 host sshd[19473]: Disconnected from 209.141.55.27 port 55752 [preauth]
Jan  3 13:01:54 host sshd[19468]: Received disconnect from 200.43.89.216 port 58352:11: Bye Bye [preauth]
Jan  3 13:01:54 host sshd[19468]: Disconnected from 200.43.89.216 port 58352 [preauth]
Jan  3 13:03:22 host sshd[19697]: User root from 139.59.36.71 not allowed because not listed in AllowUsers
Jan  3 13:03:22 host sshd[19697]: input_userauth_request: invalid user root [preauth]
Jan  3 13:03:22 host unix_chkpwd[19699]: password check failed for user (root)
Jan  3 13:03:22 host sshd[19697]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.36.71  user=root
Jan  3 13:03:22 host sshd[19697]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 13:03:24 host sshd[19697]: Failed password for invalid user root from 139.59.36.71 port 46228 ssh2
Jan  3 13:03:24 host sshd[19697]: Received disconnect from 139.59.36.71 port 46228:11: Bye Bye [preauth]
Jan  3 13:03:24 host sshd[19697]: Disconnected from 139.59.36.71 port 46228 [preauth]
Jan  3 13:13:50 host sshd[21462]: Invalid user zhangzheng from 106.10.122.53 port 41840
Jan  3 13:13:50 host sshd[21462]: input_userauth_request: invalid user zhangzheng [preauth]
Jan  3 13:13:50 host sshd[21462]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 13:13:50 host sshd[21462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53
Jan  3 13:13:52 host sshd[21462]: Failed password for invalid user zhangzheng from 106.10.122.53 port 41840 ssh2
Jan  3 13:13:53 host sshd[21462]: Connection closed by 106.10.122.53 port 41840 [preauth]
Jan  3 13:17:25 host sshd[22040]: Invalid user user from 41.197.31.178 port 43294
Jan  3 13:17:25 host sshd[22040]: input_userauth_request: invalid user user [preauth]
Jan  3 13:17:25 host sshd[22040]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 13:17:25 host sshd[22040]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178
Jan  3 13:17:27 host sshd[22040]: Failed password for invalid user user from 41.197.31.178 port 43294 ssh2
Jan  3 13:17:27 host sshd[22040]: Connection closed by 41.197.31.178 port 43294 [preauth]
Jan  3 13:17:56 host sshd[22094]: Invalid user user1 from 162.218.126.136 port 48550
Jan  3 13:17:56 host sshd[22094]: input_userauth_request: invalid user user1 [preauth]
Jan  3 13:17:56 host sshd[22094]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 13:17:56 host sshd[22094]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136
Jan  3 13:17:58 host sshd[22094]: Failed password for invalid user user1 from 162.218.126.136 port 48550 ssh2
Jan  3 13:17:58 host sshd[22094]: Connection closed by 162.218.126.136 port 48550 [preauth]
Jan  3 13:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  3 13:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 13:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 13:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  3 13:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 13:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 13:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  3 13:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 13:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 13:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  3 13:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 13:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 13:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  3 13:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 13:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 13:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  3 13:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 13:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 13:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  3 13:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 13:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 13:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  3 13:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 13:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 13:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  3 13:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 13:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 13:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  3 13:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 13:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 13:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  3 13:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 13:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 13:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  3 13:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 13:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 13:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  3 13:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 13:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 13:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=travelboniface user-3=wwwresourcehunte user-4=keralaholi user-5=wwwrmswll user-6=ugotscom user-7=cochintaxi user-8=wwwkaretakers user-9=a2zgroup user-10=dartsimp user-11=laundryboniface user-12=bonifacegroup user-13=wwwevmhonda user-14=straightcurve user-15=wwwletsstalkfood user-16=palco123 user-17=gifterman user-18=phmetals user-19=kottayamcalldriv user-20=mrsclean user-21=wwwnexidigital user-22=wwwkmaorg user-23=disposeat user-24=remysagr user-25=woodpeck user-26=wwwkapin user-27=vfmassets user-28=shalinijames user-29=wwwtestugo user-30=pmcresources feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  3 13:21:51 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  3 13:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 13:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 13:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  3 13:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 13:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 13:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-en713FiTHI03F5oz.~
Jan  3 13:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 13:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 13:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-en713FiTHI03F5oz.~'
Jan  3 13:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 13:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 13:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-en713FiTHI03F5oz.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  3 13:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 13:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 13:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  3 13:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 13:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 13:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  3 13:21:55 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 13:21:55 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 13:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  3 13:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 13:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 13:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  3 13:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 13:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 13:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  3 13:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 13:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 13:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  3 13:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 13:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 13:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  3 13:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 13:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 13:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  3 13:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  3 13:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  3 13:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  3 13:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  3 13:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  3 13:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  3 13:22:06 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  3 13:22:07 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  3 13:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  3 13:22:08 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 13:22:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 13:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  3 13:22:09 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 13:22:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 13:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  3 13:22:10 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 13:22:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 13:22:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  3 13:22:12 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 13:22:13 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 13:22:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  3 13:22:13 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 13:22:20 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 13:22:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  3 13:22:21 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  3 13:22:27 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  3 13:37:33 host sshd[24947]: Invalid user william from 165.227.133.23 port 40804
Jan  3 13:37:33 host sshd[24947]: input_userauth_request: invalid user william [preauth]
Jan  3 13:37:33 host sshd[24947]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 13:37:33 host sshd[24947]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.133.23
Jan  3 13:37:35 host sshd[24947]: Failed password for invalid user william from 165.227.133.23 port 40804 ssh2
Jan  3 13:37:35 host sshd[24947]: Received disconnect from 165.227.133.23 port 40804:11: Bye Bye [preauth]
Jan  3 13:37:35 host sshd[24947]: Disconnected from 165.227.133.23 port 40804 [preauth]
Jan  3 13:39:59 host sshd[25301]: Invalid user vbox from 171.244.42.61 port 52182
Jan  3 13:39:59 host sshd[25301]: input_userauth_request: invalid user vbox [preauth]
Jan  3 13:39:59 host sshd[25301]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 13:39:59 host sshd[25301]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.244.42.61
Jan  3 13:40:01 host sshd[25301]: Failed password for invalid user vbox from 171.244.42.61 port 52182 ssh2
Jan  3 13:40:02 host sshd[25301]: Received disconnect from 171.244.42.61 port 52182:11: Bye Bye [preauth]
Jan  3 13:40:02 host sshd[25301]: Disconnected from 171.244.42.61 port 52182 [preauth]
Jan  3 13:40:51 host sshd[25442]: Invalid user p from 51.91.248.187 port 60664
Jan  3 13:40:51 host sshd[25442]: input_userauth_request: invalid user p [preauth]
Jan  3 13:40:51 host sshd[25442]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 13:40:51 host sshd[25442]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.248.187
Jan  3 13:40:53 host sshd[25442]: Failed password for invalid user p from 51.91.248.187 port 60664 ssh2
Jan  3 13:40:53 host sshd[25442]: Received disconnect from 51.91.248.187 port 60664:11: Bye Bye [preauth]
Jan  3 13:40:53 host sshd[25442]: Disconnected from 51.91.248.187 port 60664 [preauth]
Jan  3 13:42:34 host sshd[25655]: Invalid user facturacion from 165.227.133.23 port 33108
Jan  3 13:42:34 host sshd[25655]: input_userauth_request: invalid user facturacion [preauth]
Jan  3 13:42:34 host sshd[25655]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 13:42:34 host sshd[25655]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.133.23
Jan  3 13:42:35 host sshd[25655]: Failed password for invalid user facturacion from 165.227.133.23 port 33108 ssh2
Jan  3 13:42:36 host sshd[25655]: Received disconnect from 165.227.133.23 port 33108:11: Bye Bye [preauth]
Jan  3 13:42:36 host sshd[25655]: Disconnected from 165.227.133.23 port 33108 [preauth]
Jan  3 13:43:08 host sshd[25710]: User root from 51.91.248.187 not allowed because not listed in AllowUsers
Jan  3 13:43:08 host sshd[25710]: input_userauth_request: invalid user root [preauth]
Jan  3 13:43:08 host unix_chkpwd[25713]: password check failed for user (root)
Jan  3 13:43:08 host sshd[25710]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.248.187  user=root
Jan  3 13:43:08 host sshd[25710]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 13:43:10 host sshd[25710]: Failed password for invalid user root from 51.91.248.187 port 42684 ssh2
Jan  3 13:43:11 host sshd[25710]: Received disconnect from 51.91.248.187 port 42684:11: Bye Bye [preauth]
Jan  3 13:43:11 host sshd[25710]: Disconnected from 51.91.248.187 port 42684 [preauth]
Jan  3 13:43:36 host sshd[25925]: Invalid user ts3srv from 165.227.133.23 port 56372
Jan  3 13:43:36 host sshd[25925]: input_userauth_request: invalid user ts3srv [preauth]
Jan  3 13:43:36 host sshd[25925]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 13:43:36 host sshd[25925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.133.23
Jan  3 13:43:39 host sshd[25925]: Failed password for invalid user ts3srv from 165.227.133.23 port 56372 ssh2
Jan  3 13:45:53 host sshd[26594]: User root from 171.244.42.61 not allowed because not listed in AllowUsers
Jan  3 13:45:53 host sshd[26594]: input_userauth_request: invalid user root [preauth]
Jan  3 13:45:53 host unix_chkpwd[26604]: password check failed for user (root)
Jan  3 13:45:53 host sshd[26594]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.244.42.61  user=root
Jan  3 13:45:53 host sshd[26594]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 13:45:56 host sshd[26594]: Failed password for invalid user root from 171.244.42.61 port 41142 ssh2
Jan  3 13:45:57 host sshd[26594]: Received disconnect from 171.244.42.61 port 41142:11: Bye Bye [preauth]
Jan  3 13:45:57 host sshd[26594]: Disconnected from 171.244.42.61 port 41142 [preauth]
Jan  3 13:54:24 host sshd[27710]: Invalid user admin from 45.93.201.90 port 37128
Jan  3 13:54:24 host sshd[27710]: input_userauth_request: invalid user admin [preauth]
Jan  3 13:54:24 host sshd[27710]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 13:54:24 host sshd[27710]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90
Jan  3 13:54:25 host sshd[27710]: Failed password for invalid user admin from 45.93.201.90 port 37128 ssh2
Jan  3 13:54:28 host sshd[27710]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 13:54:30 host sshd[27710]: Failed password for invalid user admin from 45.93.201.90 port 37128 ssh2
Jan  3 13:54:33 host sshd[27710]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 13:54:35 host sshd[27710]: Failed password for invalid user admin from 45.93.201.90 port 37128 ssh2
Jan  3 13:54:38 host sshd[27710]: Connection closed by 45.93.201.90 port 37128 [preauth]
Jan  3 13:54:38 host sshd[27710]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90
Jan  3 14:01:06 host sshd[28728]: Invalid user matthew from 209.141.56.48 port 41068
Jan  3 14:01:06 host sshd[28728]: input_userauth_request: invalid user matthew [preauth]
Jan  3 14:01:06 host sshd[28728]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 14:01:06 host sshd[28728]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48
Jan  3 14:01:08 host sshd[28728]: Failed password for invalid user matthew from 209.141.56.48 port 41068 ssh2
Jan  3 14:01:08 host sshd[28728]: Connection closed by 209.141.56.48 port 41068 [preauth]
Jan  3 14:07:42 host sshd[29630]: Invalid user admin from 103.13.40.2 port 48562
Jan  3 14:07:42 host sshd[29630]: input_userauth_request: invalid user admin [preauth]
Jan  3 14:07:42 host sshd[29630]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 14:07:42 host sshd[29630]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2
Jan  3 14:07:44 host sshd[29630]: Failed password for invalid user admin from 103.13.40.2 port 48562 ssh2
Jan  3 14:07:44 host sshd[29630]: Connection closed by 103.13.40.2 port 48562 [preauth]
Jan  3 14:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  3 14:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 14:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 14:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  3 14:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 14:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 14:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  3 14:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 14:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 14:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  3 14:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 14:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 14:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  3 14:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 14:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 14:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  3 14:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 14:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 14:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  3 14:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 14:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 14:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  3 14:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 14:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 14:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  3 14:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 14:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 14:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  3 14:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 14:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 14:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  3 14:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 14:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 14:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  3 14:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 14:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 14:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  3 14:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 14:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 14:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=shalinijames user-2=wwwtestugo user-3=vfmassets user-4=pmcresources user-5=disposeat user-6=remysagr user-7=wwwkmaorg user-8=woodpeck user-9=wwwkapin user-10=kottayamcalldriv user-11=phmetals user-12=palco123 user-13=gifterman user-14=mrsclean user-15=wwwnexidigital user-16=wwwevmhonda user-17=bonifacegroup user-18=wwwletsstalkfood user-19=straightcurve user-20=a2zgroup user-21=dartsimp user-22=laundryboniface user-23=cochintaxi user-24=wwwkaretakers user-25=travelboniface user-26=ugotscom user-27=wwwresourcehunte user-28=keralaholi user-29=wwwrmswll user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  3 14:21:51 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  3 14:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 14:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 14:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  3 14:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 14:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 14:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-6cEAb9Zk0UezPSSb.~
Jan  3 14:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 14:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 14:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-6cEAb9Zk0UezPSSb.~'
Jan  3 14:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 14:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 14:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-6cEAb9Zk0UezPSSb.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  3 14:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 14:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 14:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  3 14:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 14:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 14:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  3 14:21:55 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 14:21:55 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 14:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  3 14:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 14:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 14:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  3 14:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 14:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 14:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  3 14:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 14:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 14:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  3 14:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 14:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 14:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  3 14:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 14:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 14:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  3 14:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  3 14:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  3 14:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  3 14:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  3 14:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  3 14:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  3 14:22:00 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  3 14:22:02 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  3 14:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  3 14:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 14:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 14:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  3 14:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 14:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 14:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  3 14:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 14:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 14:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  3 14:22:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 14:22:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 14:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  3 14:22:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 14:22:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 14:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  3 14:22:10 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  3 14:22:11 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  3 14:23:36 host sshd[32035]: Invalid user user from 92.46.108.20 port 53648
Jan  3 14:23:36 host sshd[32035]: input_userauth_request: invalid user user [preauth]
Jan  3 14:23:36 host sshd[32035]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 14:23:36 host sshd[32035]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20
Jan  3 14:23:39 host sshd[32035]: Failed password for invalid user user from 92.46.108.20 port 53648 ssh2
Jan  3 14:23:39 host sshd[32035]: Connection closed by 92.46.108.20 port 53648 [preauth]
Jan  3 14:31:11 host sshd[742]: Invalid user vncuser from 162.218.126.136 port 49496
Jan  3 14:31:11 host sshd[742]: input_userauth_request: invalid user vncuser [preauth]
Jan  3 14:31:13 host sshd[742]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 14:31:13 host sshd[742]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136
Jan  3 14:31:15 host sshd[742]: Failed password for invalid user vncuser from 162.218.126.136 port 49496 ssh2
Jan  3 14:31:16 host sshd[742]: Connection closed by 162.218.126.136 port 49496 [preauth]
Jan  3 14:34:38 host sshd[1242]: Invalid user user from 106.10.122.53 port 60388
Jan  3 14:34:38 host sshd[1242]: input_userauth_request: invalid user user [preauth]
Jan  3 14:34:38 host sshd[1242]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 14:34:38 host sshd[1242]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53
Jan  3 14:34:40 host sshd[1242]: Failed password for invalid user user from 106.10.122.53 port 60388 ssh2
Jan  3 14:34:41 host sshd[1242]: Connection closed by 106.10.122.53 port 60388 [preauth]
Jan  3 14:45:26 host sshd[2800]: User root from 178.251.140.3 not allowed because not listed in AllowUsers
Jan  3 14:45:26 host sshd[2800]: input_userauth_request: invalid user root [preauth]
Jan  3 14:45:26 host unix_chkpwd[2803]: password check failed for user (root)
Jan  3 14:45:26 host sshd[2800]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.251.140.3  user=root
Jan  3 14:45:26 host sshd[2800]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 14:45:28 host sshd[2800]: Failed password for invalid user root from 178.251.140.3 port 47935 ssh2
Jan  3 14:45:28 host sshd[2800]: Received disconnect from 178.251.140.3 port 47935:11: Bye Bye [preauth]
Jan  3 14:45:28 host sshd[2800]: Disconnected from 178.251.140.3 port 47935 [preauth]
Jan  3 14:45:34 host sshd[2814]: User root from 182.208.98.210 not allowed because not listed in AllowUsers
Jan  3 14:45:34 host sshd[2814]: input_userauth_request: invalid user root [preauth]
Jan  3 14:45:34 host unix_chkpwd[2816]: password check failed for user (root)
Jan  3 14:45:34 host sshd[2814]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.208.98.210  user=root
Jan  3 14:45:34 host sshd[2814]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 14:45:36 host sshd[2814]: Failed password for invalid user root from 182.208.98.210 port 43014 ssh2
Jan  3 14:45:36 host sshd[2814]: Received disconnect from 182.208.98.210 port 43014:11: Bye Bye [preauth]
Jan  3 14:45:36 host sshd[2814]: Disconnected from 182.208.98.210 port 43014 [preauth]
Jan  3 14:47:26 host sshd[3068]: User root from 114.35.182.104 not allowed because not listed in AllowUsers
Jan  3 14:47:26 host sshd[3068]: input_userauth_request: invalid user root [preauth]
Jan  3 14:47:26 host unix_chkpwd[3093]: password check failed for user (root)
Jan  3 14:47:26 host sshd[3068]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.35.182.104  user=root
Jan  3 14:47:26 host sshd[3068]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 14:47:28 host sshd[3068]: Failed password for invalid user root from 114.35.182.104 port 42704 ssh2
Jan  3 14:47:29 host sshd[3068]: Received disconnect from 114.35.182.104 port 42704:11: Bye Bye [preauth]
Jan  3 14:47:29 host sshd[3068]: Disconnected from 114.35.182.104 port 42704 [preauth]
Jan  3 14:48:22 host sshd[3203]: Invalid user steve from 142.93.116.249 port 47556
Jan  3 14:48:22 host sshd[3203]: input_userauth_request: invalid user steve [preauth]
Jan  3 14:48:22 host sshd[3203]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 14:48:22 host sshd[3203]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.116.249
Jan  3 14:48:24 host sshd[3203]: Failed password for invalid user steve from 142.93.116.249 port 47556 ssh2
Jan  3 14:48:25 host sshd[3203]: Received disconnect from 142.93.116.249 port 47556:11: Bye Bye [preauth]
Jan  3 14:48:25 host sshd[3203]: Disconnected from 142.93.116.249 port 47556 [preauth]
Jan  3 14:49:47 host sshd[3443]: User root from 210.187.80.132 not allowed because not listed in AllowUsers
Jan  3 14:49:47 host sshd[3443]: input_userauth_request: invalid user root [preauth]
Jan  3 14:49:47 host unix_chkpwd[3446]: password check failed for user (root)
Jan  3 14:49:47 host sshd[3443]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.187.80.132  user=root
Jan  3 14:49:47 host sshd[3443]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 14:49:50 host sshd[3443]: Failed password for invalid user root from 210.187.80.132 port 57650 ssh2
Jan  3 14:49:50 host sshd[3443]: Received disconnect from 210.187.80.132 port 57650:11: Bye Bye [preauth]
Jan  3 14:49:50 host sshd[3443]: Disconnected from 210.187.80.132 port 57650 [preauth]
Jan  3 14:51:20 host sshd[3767]: User root from 182.208.98.210 not allowed because not listed in AllowUsers
Jan  3 14:51:20 host sshd[3767]: input_userauth_request: invalid user root [preauth]
Jan  3 14:51:20 host unix_chkpwd[3771]: password check failed for user (root)
Jan  3 14:51:20 host sshd[3767]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.208.98.210  user=root
Jan  3 14:51:20 host sshd[3767]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 14:51:23 host sshd[3767]: Failed password for invalid user root from 182.208.98.210 port 45588 ssh2
Jan  3 14:51:23 host sshd[3767]: Received disconnect from 182.208.98.210 port 45588:11: Bye Bye [preauth]
Jan  3 14:51:23 host sshd[3767]: Disconnected from 182.208.98.210 port 45588 [preauth]
Jan  3 14:52:00 host sshd[3887]: User root from 14.97.218.174 not allowed because not listed in AllowUsers
Jan  3 14:52:00 host sshd[3887]: input_userauth_request: invalid user root [preauth]
Jan  3 14:52:00 host unix_chkpwd[3889]: password check failed for user (root)
Jan  3 14:52:00 host sshd[3887]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.97.218.174  user=root
Jan  3 14:52:00 host sshd[3887]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 14:52:01 host sshd[3887]: Failed password for invalid user root from 14.97.218.174 port 43284 ssh2
Jan  3 14:52:01 host sshd[3887]: Received disconnect from 14.97.218.174 port 43284:11: Bye Bye [preauth]
Jan  3 14:52:01 host sshd[3887]: Disconnected from 14.97.218.174 port 43284 [preauth]
Jan  3 14:52:06 host sshd[3906]: User root from 142.93.116.249 not allowed because not listed in AllowUsers
Jan  3 14:52:06 host sshd[3906]: input_userauth_request: invalid user root [preauth]
Jan  3 14:52:06 host unix_chkpwd[3910]: password check failed for user (root)
Jan  3 14:52:06 host sshd[3906]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.116.249  user=root
Jan  3 14:52:06 host sshd[3906]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 14:52:08 host sshd[3906]: Failed password for invalid user root from 142.93.116.249 port 60238 ssh2
Jan  3 14:52:08 host sshd[3906]: Received disconnect from 142.93.116.249 port 60238:11: Bye Bye [preauth]
Jan  3 14:52:08 host sshd[3906]: Disconnected from 142.93.116.249 port 60238 [preauth]
Jan  3 14:52:58 host sshd[4075]: Invalid user mycat from 210.187.80.132 port 36274
Jan  3 14:52:58 host sshd[4075]: input_userauth_request: invalid user mycat [preauth]
Jan  3 14:52:58 host sshd[4075]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 14:52:58 host sshd[4075]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.187.80.132
Jan  3 14:53:01 host sshd[4075]: Failed password for invalid user mycat from 210.187.80.132 port 36274 ssh2
Jan  3 14:53:01 host sshd[4075]: Received disconnect from 210.187.80.132 port 36274:11: Bye Bye [preauth]
Jan  3 14:53:01 host sshd[4075]: Disconnected from 210.187.80.132 port 36274 [preauth]
Jan  3 14:53:23 host sshd[4173]: User root from 114.35.182.104 not allowed because not listed in AllowUsers
Jan  3 14:53:23 host sshd[4173]: input_userauth_request: invalid user root [preauth]
Jan  3 14:53:23 host unix_chkpwd[4178]: password check failed for user (root)
Jan  3 14:53:23 host sshd[4173]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.35.182.104  user=root
Jan  3 14:53:23 host sshd[4173]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 14:53:25 host sshd[4173]: Failed password for invalid user root from 114.35.182.104 port 39353 ssh2
Jan  3 14:54:21 host sshd[4387]: Invalid user user from 41.197.31.178 port 45518
Jan  3 14:54:21 host sshd[4387]: input_userauth_request: invalid user user [preauth]
Jan  3 14:54:21 host sshd[4387]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 14:54:21 host sshd[4387]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178
Jan  3 14:54:23 host sshd[4387]: Failed password for invalid user user from 41.197.31.178 port 45518 ssh2
Jan  3 14:54:24 host sshd[4387]: Connection closed by 41.197.31.178 port 45518 [preauth]
Jan  3 14:55:04 host sshd[4570]: Invalid user user from 14.97.218.174 port 31815
Jan  3 14:55:04 host sshd[4570]: input_userauth_request: invalid user user [preauth]
Jan  3 14:55:04 host sshd[4570]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 14:55:04 host sshd[4570]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.97.218.174
Jan  3 14:55:07 host sshd[4570]: Failed password for invalid user user from 14.97.218.174 port 31815 ssh2
Jan  3 14:55:07 host sshd[4570]: Received disconnect from 14.97.218.174 port 31815:11: Bye Bye [preauth]
Jan  3 14:55:07 host sshd[4570]: Disconnected from 14.97.218.174 port 31815 [preauth]
Jan  3 15:04:27 host sshd[6169]: Did not receive identification string from 58.72.18.130 port 32814
Jan  3 15:10:18 host sshd[6945]: Invalid user matthew from 209.141.56.48 port 34242
Jan  3 15:10:19 host sshd[6945]: input_userauth_request: invalid user matthew [preauth]
Jan  3 15:10:19 host sshd[6945]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 15:10:19 host sshd[6945]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48
Jan  3 15:10:20 host sshd[6945]: Failed password for invalid user matthew from 209.141.56.48 port 34242 ssh2
Jan  3 15:10:20 host sshd[6945]: Connection closed by 209.141.56.48 port 34242 [preauth]
Jan  3 15:10:26 host sshd[6962]: Invalid user douglas from 107.189.30.59 port 35748
Jan  3 15:10:26 host sshd[6962]: input_userauth_request: invalid user douglas [preauth]
Jan  3 15:10:26 host sshd[6962]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 15:10:26 host sshd[6962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59
Jan  3 15:10:28 host sshd[6962]: Failed password for invalid user douglas from 107.189.30.59 port 35748 ssh2
Jan  3 15:10:29 host sshd[6962]: Connection closed by 107.189.30.59 port 35748 [preauth]
Jan  3 15:16:11 host sshd[7925]: Invalid user matthew from 209.141.56.48 port 37744
Jan  3 15:16:11 host sshd[7925]: input_userauth_request: invalid user matthew [preauth]
Jan  3 15:16:11 host sshd[7925]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 15:16:11 host sshd[7925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48
Jan  3 15:16:13 host sshd[7925]: Failed password for invalid user matthew from 209.141.56.48 port 37744 ssh2
Jan  3 15:16:13 host sshd[7925]: Connection closed by 209.141.56.48 port 37744 [preauth]
Jan  3 15:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  3 15:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 15:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 15:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  3 15:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 15:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 15:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  3 15:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 15:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 15:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  3 15:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 15:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 15:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  3 15:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 15:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 15:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  3 15:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 15:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 15:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  3 15:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 15:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 15:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  3 15:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 15:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 15:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  3 15:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 15:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 15:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  3 15:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 15:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 15:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  3 15:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 15:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 15:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  3 15:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 15:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 15:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  3 15:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 15:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 15:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=laundryboniface user-2=dartsimp user-3=a2zgroup user-4=wwwkaretakers user-5=cochintaxi user-6=wwwrmswll user-7=wwwresourcehunte user-8=keralaholi user-9=ugotscom user-10=travelboniface user-11=wwwpmcresource user-12=pmcresources user-13=vfmassets user-14=wwwtestugo user-15=shalinijames user-16=wwwkapin user-17=woodpeck user-18=disposeat user-19=remysagr user-20=wwwkmaorg user-21=wwwnexidigital user-22=mrsclean user-23=gifterman user-24=palco123 user-25=phmetals user-26=kottayamcalldriv user-27=straightcurve user-28=wwwletsstalkfood user-29=bonifacegroup user-30=wwwevmhonda feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  3 15:21:52 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  3 15:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 15:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 15:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  3 15:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 15:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 15:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-AOZSEJw2THpmoyip.~
Jan  3 15:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 15:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 15:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-AOZSEJw2THpmoyip.~'
Jan  3 15:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 15:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 15:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-AOZSEJw2THpmoyip.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  3 15:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 15:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 15:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  3 15:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 15:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 15:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  3 15:21:53 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 15:21:53 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 15:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  3 15:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 15:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 15:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  3 15:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 15:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 15:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  3 15:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 15:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 15:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  3 15:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 15:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 15:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  3 15:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 15:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 15:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  3 15:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  3 15:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  3 15:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  3 15:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  3 15:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  3 15:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  3 15:21:57 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  3 15:21:59 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  3 15:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  3 15:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 15:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 15:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  3 15:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 15:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 15:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  3 15:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 15:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 15:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  3 15:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 15:22:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 15:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  3 15:22:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 15:22:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 15:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  3 15:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  3 15:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  3 15:23:53 host sshd[9030]: Invalid user localhost from 178.251.140.3 port 34563
Jan  3 15:23:53 host sshd[9030]: input_userauth_request: invalid user localhost [preauth]
Jan  3 15:23:53 host sshd[9030]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 15:23:53 host sshd[9030]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.251.140.3
Jan  3 15:23:55 host sshd[9030]: Failed password for invalid user localhost from 178.251.140.3 port 34563 ssh2
Jan  3 15:23:55 host sshd[9030]: Received disconnect from 178.251.140.3 port 34563:11: Bye Bye [preauth]
Jan  3 15:23:55 host sshd[9030]: Disconnected from 178.251.140.3 port 34563 [preauth]
Jan  3 15:31:46 host sshd[10152]: Invalid user user1 from 103.13.40.2 port 57944
Jan  3 15:31:46 host sshd[10152]: input_userauth_request: invalid user user1 [preauth]
Jan  3 15:31:46 host sshd[10152]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 15:31:46 host sshd[10152]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2
Jan  3 15:31:47 host sshd[10152]: Failed password for invalid user user1 from 103.13.40.2 port 57944 ssh2
Jan  3 15:31:47 host sshd[10152]: Connection closed by 103.13.40.2 port 57944 [preauth]
Jan  3 15:33:08 host sshd[10279]: User root from 49.88.112.77 not allowed because not listed in AllowUsers
Jan  3 15:33:08 host sshd[10279]: input_userauth_request: invalid user root [preauth]
Jan  3 15:33:08 host unix_chkpwd[10284]: password check failed for user (root)
Jan  3 15:33:08 host sshd[10279]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.77  user=root
Jan  3 15:33:08 host sshd[10279]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 15:33:11 host sshd[10279]: Failed password for invalid user root from 49.88.112.77 port 57918 ssh2
Jan  3 15:33:11 host unix_chkpwd[10289]: password check failed for user (root)
Jan  3 15:33:11 host sshd[10279]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 15:33:13 host sshd[10279]: Failed password for invalid user root from 49.88.112.77 port 57918 ssh2
Jan  3 15:33:14 host unix_chkpwd[10293]: password check failed for user (root)
Jan  3 15:33:14 host sshd[10279]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 15:33:16 host sshd[10279]: Failed password for invalid user root from 49.88.112.77 port 57918 ssh2
Jan  3 15:33:16 host sshd[10279]: Received disconnect from 49.88.112.77 port 57918:11:  [preauth]
Jan  3 15:33:16 host sshd[10279]: Disconnected from 49.88.112.77 port 57918 [preauth]
Jan  3 15:33:16 host sshd[10279]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.77  user=root
Jan  3 15:40:12 host sshd[11307]: Invalid user matthew from 209.141.56.48 port 47376
Jan  3 15:40:12 host sshd[11307]: input_userauth_request: invalid user matthew [preauth]
Jan  3 15:40:12 host sshd[11307]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 15:40:12 host sshd[11307]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48
Jan  3 15:40:14 host sshd[11307]: Failed password for invalid user matthew from 209.141.56.48 port 47376 ssh2
Jan  3 15:40:14 host sshd[11307]: Connection closed by 209.141.56.48 port 47376 [preauth]
Jan  3 15:46:49 host sshd[12177]: Did not receive identification string from 54.183.153.23 port 60776
Jan  3 15:50:14 host sshd[12635]: Invalid user admin from 54.183.153.23 port 59502
Jan  3 15:50:14 host sshd[12635]: input_userauth_request: invalid user admin [preauth]
Jan  3 15:50:14 host sshd[12635]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 15:50:14 host sshd[12635]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.183.153.23
Jan  3 15:50:16 host sshd[12635]: Failed password for invalid user admin from 54.183.153.23 port 59502 ssh2
Jan  3 15:50:16 host sshd[12635]: Connection closed by 54.183.153.23 port 59502 [preauth]
Jan  3 15:55:32 host sshd[13363]: Invalid user user1 from 106.10.122.53 port 39352
Jan  3 15:55:32 host sshd[13363]: input_userauth_request: invalid user user1 [preauth]
Jan  3 15:55:32 host sshd[13363]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 15:55:32 host sshd[13363]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53
Jan  3 15:55:33 host sshd[13363]: Failed password for invalid user user1 from 106.10.122.53 port 39352 ssh2
Jan  3 15:55:34 host sshd[13363]: Connection closed by 106.10.122.53 port 39352 [preauth]
Jan  3 15:55:41 host sshd[13377]: Invalid user admin from 54.183.153.23 port 41698
Jan  3 15:55:41 host sshd[13377]: input_userauth_request: invalid user admin [preauth]
Jan  3 15:55:41 host sshd[13377]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 15:55:41 host sshd[13377]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.183.153.23
Jan  3 15:55:43 host sshd[13377]: Failed password for invalid user admin from 54.183.153.23 port 41698 ssh2
Jan  3 15:55:43 host sshd[13377]: Connection closed by 54.183.153.23 port 41698 [preauth]
Jan  3 16:07:05 host sshd[15105]: User root from 162.218.126.136 not allowed because not listed in AllowUsers
Jan  3 16:07:05 host sshd[15105]: input_userauth_request: invalid user root [preauth]
Jan  3 16:07:05 host unix_chkpwd[15108]: password check failed for user (root)
Jan  3 16:07:05 host sshd[15105]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136  user=root
Jan  3 16:07:05 host sshd[15105]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 16:07:06 host sshd[15105]: Failed password for invalid user root from 162.218.126.136 port 52114 ssh2
Jan  3 16:07:07 host sshd[15105]: Connection closed by 162.218.126.136 port 52114 [preauth]
Jan  3 16:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  3 16:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 16:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 16:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  3 16:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 16:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 16:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  3 16:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 16:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 16:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  3 16:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 16:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 16:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  3 16:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 16:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 16:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  3 16:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 16:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 16:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  3 16:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 16:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 16:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  3 16:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 16:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 16:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  3 16:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 16:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 16:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  3 16:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 16:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 16:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  3 16:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 16:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 16:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  3 16:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 16:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 16:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  3 16:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 16:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 16:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=laundryboniface user-2=dartsimp user-3=a2zgroup user-4=cochintaxi user-5=wwwkaretakers user-6=wwwrmswll user-7=wwwresourcehunte user-8=keralaholi user-9=ugotscom user-10=travelboniface user-11=wwwpmcresource user-12=pmcresources user-13=vfmassets user-14=wwwtestugo user-15=shalinijames user-16=wwwkapin user-17=woodpeck user-18=disposeat user-19=remysagr user-20=wwwkmaorg user-21=mrsclean user-22=wwwnexidigital user-23=gifterman user-24=palco123 user-25=kottayamcalldriv user-26=phmetals user-27=straightcurve user-28=wwwletsstalkfood user-29=bonifacegroup user-30=wwwevmhonda feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  3 16:21:51 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  3 16:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 16:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 16:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  3 16:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 16:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 16:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-5yFT41MIQ8Z4D7Pn.~
Jan  3 16:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 16:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 16:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-5yFT41MIQ8Z4D7Pn.~'
Jan  3 16:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 16:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 16:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-5yFT41MIQ8Z4D7Pn.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  3 16:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 16:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 16:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  3 16:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 16:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 16:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  3 16:21:55 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 16:21:55 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 16:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  3 16:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 16:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 16:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  3 16:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 16:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 16:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  3 16:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 16:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 16:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  3 16:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 16:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 16:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  3 16:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 16:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 16:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  3 16:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  3 16:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  3 16:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  3 16:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  3 16:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  3 16:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  3 16:22:03 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  3 16:22:05 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  3 16:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  3 16:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 16:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 16:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  3 16:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 16:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 16:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  3 16:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 16:22:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 16:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  3 16:22:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 16:22:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 16:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  3 16:22:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 16:22:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 16:22:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  3 16:22:13 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  3 16:22:14 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  3 16:31:48 host sshd[19467]: User root from 41.197.31.178 not allowed because not listed in AllowUsers
Jan  3 16:31:48 host sshd[19467]: input_userauth_request: invalid user root [preauth]
Jan  3 16:31:49 host unix_chkpwd[19471]: password check failed for user (root)
Jan  3 16:31:49 host sshd[19467]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178  user=root
Jan  3 16:31:49 host sshd[19467]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 16:31:51 host sshd[19467]: Failed password for invalid user root from 41.197.31.178 port 45772 ssh2
Jan  3 16:31:51 host sshd[19467]: Connection closed by 41.197.31.178 port 45772 [preauth]
Jan  3 16:51:22 host sshd[22147]: Invalid user python from 207.154.244.110 port 36792
Jan  3 16:51:22 host sshd[22147]: input_userauth_request: invalid user python [preauth]
Jan  3 16:51:22 host sshd[22147]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 16:51:22 host sshd[22147]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.244.110
Jan  3 16:51:24 host sshd[22147]: Failed password for invalid user python from 207.154.244.110 port 36792 ssh2
Jan  3 16:51:24 host sshd[22147]: Received disconnect from 207.154.244.110 port 36792:11: Bye Bye [preauth]
Jan  3 16:51:24 host sshd[22147]: Disconnected from 207.154.244.110 port 36792 [preauth]
Jan  3 16:52:09 host sshd[22244]: Invalid user test from 103.82.145.99 port 55213
Jan  3 16:52:09 host sshd[22244]: input_userauth_request: invalid user test [preauth]
Jan  3 16:52:09 host sshd[22244]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 16:52:09 host sshd[22244]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.82.145.99
Jan  3 16:52:11 host sshd[22244]: Failed password for invalid user test from 103.82.145.99 port 55213 ssh2
Jan  3 16:52:11 host sshd[22244]: Received disconnect from 103.82.145.99 port 55213:11: Bye Bye [preauth]
Jan  3 16:52:11 host sshd[22244]: Disconnected from 103.82.145.99 port 55213 [preauth]
Jan  3 16:54:39 host sshd[22533]: Invalid user user1 from 103.13.40.2 port 58746
Jan  3 16:54:39 host sshd[22533]: input_userauth_request: invalid user user1 [preauth]
Jan  3 16:54:39 host sshd[22533]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 16:54:39 host sshd[22533]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2
Jan  3 16:54:41 host sshd[22533]: Failed password for invalid user user1 from 103.13.40.2 port 58746 ssh2
Jan  3 16:54:41 host sshd[22533]: Connection closed by 103.13.40.2 port 58746 [preauth]
Jan  3 16:54:47 host sshd[22548]: Invalid user peter from 161.35.59.177 port 41054
Jan  3 16:54:47 host sshd[22548]: input_userauth_request: invalid user peter [preauth]
Jan  3 16:54:47 host sshd[22548]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 16:54:47 host sshd[22548]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.59.177
Jan  3 16:54:50 host sshd[22548]: Failed password for invalid user peter from 161.35.59.177 port 41054 ssh2
Jan  3 16:54:50 host sshd[22548]: Received disconnect from 161.35.59.177 port 41054:11: Bye Bye [preauth]
Jan  3 16:54:50 host sshd[22548]: Disconnected from 161.35.59.177 port 41054 [preauth]
Jan  3 16:54:58 host sshd[22558]: Invalid user git from 132.226.255.104 port 54368
Jan  3 16:54:58 host sshd[22558]: input_userauth_request: invalid user git [preauth]
Jan  3 16:54:58 host sshd[22558]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 16:54:58 host sshd[22558]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.226.255.104
Jan  3 16:55:00 host sshd[22558]: Failed password for invalid user git from 132.226.255.104 port 54368 ssh2
Jan  3 16:55:00 host sshd[22558]: Received disconnect from 132.226.255.104 port 54368:11: Bye Bye [preauth]
Jan  3 16:55:00 host sshd[22558]: Disconnected from 132.226.255.104 port 54368 [preauth]
Jan  3 16:55:44 host sshd[22783]: Invalid user android from 137.184.104.77 port 57558
Jan  3 16:55:44 host sshd[22783]: input_userauth_request: invalid user android [preauth]
Jan  3 16:55:44 host sshd[22783]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 16:55:44 host sshd[22783]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.104.77
Jan  3 16:55:46 host sshd[22783]: Failed password for invalid user android from 137.184.104.77 port 57558 ssh2
Jan  3 16:55:46 host sshd[22783]: Received disconnect from 137.184.104.77 port 57558:11: Bye Bye [preauth]
Jan  3 16:55:46 host sshd[22783]: Disconnected from 137.184.104.77 port 57558 [preauth]
Jan  3 16:55:54 host sshd[22806]: Invalid user service from 194.169.175.102 port 55320
Jan  3 16:55:54 host sshd[22806]: input_userauth_request: invalid user service [preauth]
Jan  3 16:55:54 host sshd[22806]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 16:55:54 host sshd[22806]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.169.175.102
Jan  3 16:55:56 host sshd[22806]: Failed password for invalid user service from 194.169.175.102 port 55320 ssh2
Jan  3 16:55:56 host sshd[22806]: Received disconnect from 194.169.175.102 port 55320:11: Client disconnecting normally [preauth]
Jan  3 16:55:56 host sshd[22806]: Disconnected from 194.169.175.102 port 55320 [preauth]
Jan  3 16:56:21 host sshd[22849]: Invalid user usuario from 188.165.34.94 port 56186
Jan  3 16:56:21 host sshd[22849]: input_userauth_request: invalid user usuario [preauth]
Jan  3 16:56:21 host sshd[22849]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 16:56:21 host sshd[22849]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.165.34.94
Jan  3 16:56:23 host sshd[22849]: Failed password for invalid user usuario from 188.165.34.94 port 56186 ssh2
Jan  3 16:56:24 host sshd[22849]: Received disconnect from 188.165.34.94 port 56186:11: Bye Bye [preauth]
Jan  3 16:56:24 host sshd[22849]: Disconnected from 188.165.34.94 port 56186 [preauth]
Jan  3 16:57:07 host sshd[22961]: Invalid user ubuntu from 137.184.104.77 port 49860
Jan  3 16:57:07 host sshd[22961]: input_userauth_request: invalid user ubuntu [preauth]
Jan  3 16:57:07 host sshd[22961]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 16:57:07 host sshd[22961]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.104.77
Jan  3 16:57:08 host sshd[22961]: Failed password for invalid user ubuntu from 137.184.104.77 port 49860 ssh2
Jan  3 16:57:09 host sshd[22961]: Received disconnect from 137.184.104.77 port 49860:11: Bye Bye [preauth]
Jan  3 16:57:09 host sshd[22961]: Disconnected from 137.184.104.77 port 49860 [preauth]
Jan  3 16:57:14 host sshd[22969]: Invalid user git from 161.35.59.177 port 45052
Jan  3 16:57:14 host sshd[22969]: input_userauth_request: invalid user git [preauth]
Jan  3 16:57:14 host sshd[22969]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 16:57:14 host sshd[22969]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.59.177
Jan  3 16:57:14 host sshd[22971]: Invalid user git from 207.154.244.110 port 35614
Jan  3 16:57:14 host sshd[22971]: input_userauth_request: invalid user git [preauth]
Jan  3 16:57:14 host sshd[22971]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 16:57:14 host sshd[22971]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.244.110
Jan  3 16:57:15 host sshd[22969]: Failed password for invalid user git from 161.35.59.177 port 45052 ssh2
Jan  3 16:57:16 host sshd[22971]: Failed password for invalid user git from 207.154.244.110 port 35614 ssh2
Jan  3 16:57:16 host sshd[22969]: Received disconnect from 161.35.59.177 port 45052:11: Bye Bye [preauth]
Jan  3 16:57:16 host sshd[22969]: Disconnected from 161.35.59.177 port 45052 [preauth]
Jan  3 16:57:16 host sshd[22971]: Received disconnect from 207.154.244.110 port 35614:11: Bye Bye [preauth]
Jan  3 16:57:16 host sshd[22971]: Disconnected from 207.154.244.110 port 35614 [preauth]
Jan  3 16:58:13 host sshd[23092]: Invalid user basesystem from 137.184.104.77 port 59092
Jan  3 16:58:13 host sshd[23092]: input_userauth_request: invalid user basesystem [preauth]
Jan  3 16:58:13 host sshd[23092]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 16:58:13 host sshd[23092]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.104.77
Jan  3 16:58:14 host sshd[23092]: Failed password for invalid user basesystem from 137.184.104.77 port 59092 ssh2
Jan  3 16:58:14 host sshd[23103]: User root from 161.35.59.177 not allowed because not listed in AllowUsers
Jan  3 16:58:14 host sshd[23103]: input_userauth_request: invalid user root [preauth]
Jan  3 16:58:14 host unix_chkpwd[23133]: password check failed for user (root)
Jan  3 16:58:14 host sshd[23103]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.59.177  user=root
Jan  3 16:58:14 host sshd[23103]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 16:58:16 host sshd[23136]: Invalid user richard from 103.82.145.99 port 54697
Jan  3 16:58:16 host sshd[23136]: input_userauth_request: invalid user richard [preauth]
Jan  3 16:58:16 host sshd[23136]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 16:58:16 host sshd[23136]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.82.145.99
Jan  3 16:58:16 host sshd[23103]: Failed password for invalid user root from 161.35.59.177 port 40256 ssh2
Jan  3 16:58:16 host sshd[23103]: Received disconnect from 161.35.59.177 port 40256:11: Bye Bye [preauth]
Jan  3 16:58:16 host sshd[23103]: Disconnected from 161.35.59.177 port 40256 [preauth]
Jan  3 16:58:18 host sshd[23136]: Failed password for invalid user richard from 103.82.145.99 port 54697 ssh2
Jan  3 16:58:18 host sshd[23136]: Received disconnect from 103.82.145.99 port 54697:11: Bye Bye [preauth]
Jan  3 16:58:18 host sshd[23136]: Disconnected from 103.82.145.99 port 54697 [preauth]
Jan  3 16:58:28 host sshd[23206]: Invalid user user001 from 207.154.244.110 port 34952
Jan  3 16:58:28 host sshd[23206]: input_userauth_request: invalid user user001 [preauth]
Jan  3 16:58:28 host sshd[23206]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 16:58:28 host sshd[23206]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.244.110
Jan  3 16:58:30 host sshd[23206]: Failed password for invalid user user001 from 207.154.244.110 port 34952 ssh2
Jan  3 16:58:43 host sshd[23253]: User root from 132.226.255.104 not allowed because not listed in AllowUsers
Jan  3 16:58:43 host sshd[23253]: input_userauth_request: invalid user root [preauth]
Jan  3 16:58:43 host unix_chkpwd[23257]: password check failed for user (root)
Jan  3 16:58:43 host sshd[23253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.226.255.104  user=root
Jan  3 16:58:43 host sshd[23253]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 16:58:44 host sshd[23253]: Failed password for invalid user root from 132.226.255.104 port 48954 ssh2
Jan  3 16:58:45 host sshd[23253]: Received disconnect from 132.226.255.104 port 48954:11: Bye Bye [preauth]
Jan  3 16:58:45 host sshd[23253]: Disconnected from 132.226.255.104 port 48954 [preauth]
Jan  3 16:58:58 host sshd[23304]: Invalid user user from 92.46.108.20 port 43784
Jan  3 16:58:58 host sshd[23304]: input_userauth_request: invalid user user [preauth]
Jan  3 16:58:59 host sshd[23304]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 16:58:59 host sshd[23304]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20
Jan  3 16:59:02 host sshd[23304]: Failed password for invalid user user from 92.46.108.20 port 43784 ssh2
Jan  3 16:59:02 host sshd[23304]: Connection closed by 92.46.108.20 port 43784 [preauth]
Jan  3 16:59:21 host sshd[23343]: Invalid user b from 188.165.34.94 port 35214
Jan  3 16:59:21 host sshd[23343]: input_userauth_request: invalid user b [preauth]
Jan  3 16:59:21 host sshd[23343]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 16:59:21 host sshd[23343]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.165.34.94
Jan  3 16:59:23 host sshd[23343]: Failed password for invalid user b from 188.165.34.94 port 35214 ssh2
Jan  3 16:59:23 host sshd[23343]: Received disconnect from 188.165.34.94 port 35214:11: Bye Bye [preauth]
Jan  3 16:59:23 host sshd[23343]: Disconnected from 188.165.34.94 port 35214 [preauth]
Jan  3 16:59:57 host sshd[23420]: Invalid user git from 103.82.145.99 port 37581
Jan  3 16:59:57 host sshd[23420]: input_userauth_request: invalid user git [preauth]
Jan  3 16:59:57 host sshd[23420]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 16:59:57 host sshd[23420]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.82.145.99
Jan  3 16:59:58 host sshd[23420]: Failed password for invalid user git from 103.82.145.99 port 37581 ssh2
Jan  3 16:59:58 host sshd[23420]: Received disconnect from 103.82.145.99 port 37581:11: Bye Bye [preauth]
Jan  3 16:59:58 host sshd[23420]: Disconnected from 103.82.145.99 port 37581 [preauth]
Jan  3 17:00:29 host sshd[23532]: Invalid user anne from 188.165.34.94 port 58408
Jan  3 17:00:29 host sshd[23532]: input_userauth_request: invalid user anne [preauth]
Jan  3 17:00:29 host sshd[23532]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 17:00:29 host sshd[23532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.165.34.94
Jan  3 17:00:31 host sshd[23532]: Failed password for invalid user anne from 188.165.34.94 port 58408 ssh2
Jan  3 17:00:32 host sshd[23532]: Received disconnect from 188.165.34.94 port 58408:11: Bye Bye [preauth]
Jan  3 17:00:32 host sshd[23532]: Disconnected from 188.165.34.94 port 58408 [preauth]
Jan  3 17:18:47 host sshd[26065]: Invalid user pi from 65.189.2.250 port 42946
Jan  3 17:18:47 host sshd[26065]: input_userauth_request: invalid user pi [preauth]
Jan  3 17:18:47 host sshd[26065]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 17:18:47 host sshd[26065]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.189.2.250
Jan  3 17:18:47 host sshd[26066]: Invalid user pi from 65.189.2.250 port 42944
Jan  3 17:18:47 host sshd[26066]: input_userauth_request: invalid user pi [preauth]
Jan  3 17:18:48 host sshd[26066]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 17:18:48 host sshd[26066]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.189.2.250
Jan  3 17:18:49 host sshd[26065]: Failed password for invalid user pi from 65.189.2.250 port 42946 ssh2
Jan  3 17:18:49 host sshd[26065]: Connection closed by 65.189.2.250 port 42946 [preauth]
Jan  3 17:18:50 host sshd[26066]: Failed password for invalid user pi from 65.189.2.250 port 42944 ssh2
Jan  3 17:18:50 host sshd[26066]: Connection closed by 65.189.2.250 port 42944 [preauth]
Jan  3 17:20:43 host sshd[26286]: Invalid user user1 from 106.10.122.53 port 56712
Jan  3 17:20:43 host sshd[26286]: input_userauth_request: invalid user user1 [preauth]
Jan  3 17:20:43 host sshd[26286]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 17:20:43 host sshd[26286]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53
Jan  3 17:20:45 host sshd[26286]: Failed password for invalid user user1 from 106.10.122.53 port 56712 ssh2
Jan  3 17:20:45 host sshd[26286]: Connection closed by 106.10.122.53 port 56712 [preauth]
Jan  3 17:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  3 17:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 17:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 17:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  3 17:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 17:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 17:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  3 17:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 17:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 17:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  3 17:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 17:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 17:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  3 17:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 17:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 17:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  3 17:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 17:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 17:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  3 17:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 17:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 17:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  3 17:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 17:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 17:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  3 17:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 17:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 17:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  3 17:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 17:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 17:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  3 17:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 17:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 17:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  3 17:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 17:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 17:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  3 17:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 17:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 17:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=vfmassets user-2=wwwtestugo user-3=shalinijames user-4=pmcresources user-5=remysagr user-6=disposeat user-7=wwwkmaorg user-8=wwwkapin user-9=woodpeck user-10=gifterman user-11=palco123 user-12=phmetals user-13=kottayamcalldriv user-14=wwwnexidigital user-15=mrsclean user-16=bonifacegroup user-17=wwwevmhonda user-18=straightcurve user-19=wwwletsstalkfood user-20=dartsimp user-21=a2zgroup user-22=laundryboniface user-23=cochintaxi user-24=wwwkaretakers user-25=travelboniface user-26=wwwrmswll user-27=keralaholi user-28=wwwresourcehunte user-29=ugotscom user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  3 17:21:51 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  3 17:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 17:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 17:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  3 17:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 17:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 17:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-BnC3u0EICbxxDk79.~
Jan  3 17:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 17:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 17:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-BnC3u0EICbxxDk79.~'
Jan  3 17:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 17:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 17:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-BnC3u0EICbxxDk79.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  3 17:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 17:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 17:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  3 17:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 17:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 17:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  3 17:21:52 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 17:21:52 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 17:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  3 17:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 17:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 17:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  3 17:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 17:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 17:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  3 17:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 17:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 17:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  3 17:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 17:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 17:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  3 17:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 17:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 17:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  3 17:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  3 17:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  3 17:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  3 17:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  3 17:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  3 17:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  3 17:21:57 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  3 17:21:58 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  3 17:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  3 17:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 17:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 17:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  3 17:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 17:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 17:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  3 17:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 17:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 17:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  3 17:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 17:22:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 17:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  3 17:22:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 17:22:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 17:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  3 17:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  3 17:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  3 17:24:21 host sshd[27055]: Connection closed by 23.90.160.138 port 46076 [preauth]
Jan  3 17:56:30 host sshd[31525]: Connection closed by 94.102.61.20 port 45624 [preauth]
Jan  3 18:07:13 host sshd[555]: Invalid user vagrant from 41.197.31.178 port 46998
Jan  3 18:07:13 host sshd[555]: input_userauth_request: invalid user vagrant [preauth]
Jan  3 18:07:13 host sshd[555]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 18:07:13 host sshd[555]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178
Jan  3 18:07:15 host sshd[555]: Failed password for invalid user vagrant from 41.197.31.178 port 46998 ssh2
Jan  3 18:07:15 host sshd[555]: Connection closed by 41.197.31.178 port 46998 [preauth]
Jan  3 18:10:27 host sshd[1122]: Did not receive identification string from 203.190.148.180 port 34334
Jan  3 18:10:51 host sshd[1161]: Did not receive identification string from 172.105.128.11 port 44242
Jan  3 18:10:55 host sshd[1164]: Connection closed by 172.105.128.11 port 44252 [preauth]
Jan  3 18:10:58 host sshd[1169]: Connection closed by 172.105.128.11 port 44266 [preauth]
Jan  3 18:13:30 host sshd[1483]: User root from 203.190.148.180 not allowed because not listed in AllowUsers
Jan  3 18:13:30 host sshd[1483]: input_userauth_request: invalid user root [preauth]
Jan  3 18:13:30 host unix_chkpwd[1486]: password check failed for user (root)
Jan  3 18:13:30 host sshd[1483]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.190.148.180  user=root
Jan  3 18:13:30 host sshd[1483]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 18:13:31 host sshd[1483]: Failed password for invalid user root from 203.190.148.180 port 51989 ssh2
Jan  3 18:13:31 host sshd[1483]: Received disconnect from 203.190.148.180 port 51989:11: Bye Bye [preauth]
Jan  3 18:13:31 host sshd[1483]: Disconnected from 203.190.148.180 port 51989 [preauth]
Jan  3 18:15:20 host sshd[1836]: Invalid user kafka from 162.218.126.136 port 43022
Jan  3 18:15:20 host sshd[1836]: input_userauth_request: invalid user kafka [preauth]
Jan  3 18:15:25 host sshd[1836]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 18:15:25 host sshd[1836]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136
Jan  3 18:15:27 host sshd[1836]: Failed password for invalid user kafka from 162.218.126.136 port 43022 ssh2
Jan  3 18:15:28 host sshd[1836]: Connection closed by 162.218.126.136 port 43022 [preauth]
Jan  3 18:16:24 host sshd[1978]: Invalid user student from 103.13.40.2 port 33752
Jan  3 18:16:24 host sshd[1978]: input_userauth_request: invalid user student [preauth]
Jan  3 18:16:24 host sshd[1978]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 18:16:24 host sshd[1978]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2
Jan  3 18:16:25 host sshd[1978]: Failed password for invalid user student from 103.13.40.2 port 33752 ssh2
Jan  3 18:16:25 host sshd[1978]: Connection closed by 103.13.40.2 port 33752 [preauth]
Jan  3 18:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  3 18:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 18:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 18:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  3 18:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 18:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 18:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  3 18:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 18:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 18:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  3 18:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 18:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 18:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  3 18:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 18:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 18:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  3 18:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 18:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 18:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  3 18:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 18:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 18:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  3 18:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 18:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 18:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  3 18:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 18:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 18:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  3 18:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 18:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 18:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  3 18:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 18:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 18:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  3 18:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 18:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 18:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  3 18:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 18:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 18:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=cochintaxi user-2=wwwkaretakers user-3=dartsimp user-4=a2zgroup user-5=laundryboniface user-6=wwwpmcresource user-7=travelboniface user-8=wwwrmswll user-9=keralaholi user-10=wwwresourcehunte user-11=ugotscom user-12=disposeat user-13=remysagr user-14=wwwkmaorg user-15=woodpeck user-16=wwwkapin user-17=vfmassets user-18=wwwtestugo user-19=shalinijames user-20=pmcresources user-21=bonifacegroup user-22=wwwevmhonda user-23=straightcurve user-24=wwwletsstalkfood user-25=gifterman user-26=palco123 user-27=phmetals user-28=kottayamcalldriv user-29=wwwnexidigital user-30=mrsclean feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  3 18:21:52 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  3 18:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 18:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 18:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  3 18:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 18:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 18:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-n3A0d4BCNbXzAQ1b.~
Jan  3 18:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 18:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 18:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-n3A0d4BCNbXzAQ1b.~'
Jan  3 18:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 18:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 18:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-n3A0d4BCNbXzAQ1b.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  3 18:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 18:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 18:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  3 18:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 18:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 18:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  3 18:21:53 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 18:21:53 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 18:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  3 18:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 18:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 18:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  3 18:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 18:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 18:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  3 18:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 18:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 18:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  3 18:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 18:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 18:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  3 18:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 18:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 18:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  3 18:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  3 18:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  3 18:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  3 18:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  3 18:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  3 18:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  3 18:22:00 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  3 18:22:02 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  3 18:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  3 18:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 18:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 18:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  3 18:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 18:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 18:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  3 18:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 18:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 18:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  3 18:22:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 18:22:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 18:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  3 18:22:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 18:22:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 18:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  3 18:22:10 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  3 18:22:11 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  3 18:27:06 host sshd[3620]: Invalid user pi from 70.181.124.215 port 38461
Jan  3 18:27:06 host sshd[3620]: input_userauth_request: invalid user pi [preauth]
Jan  3 18:27:06 host sshd[3621]: Invalid user pi from 70.181.124.215 port 38460
Jan  3 18:27:06 host sshd[3621]: input_userauth_request: invalid user pi [preauth]
Jan  3 18:27:07 host sshd[3620]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 18:27:07 host sshd[3620]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.181.124.215
Jan  3 18:27:07 host sshd[3621]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 18:27:07 host sshd[3621]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.181.124.215
Jan  3 18:27:08 host sshd[3620]: Failed password for invalid user pi from 70.181.124.215 port 38461 ssh2
Jan  3 18:27:08 host sshd[3621]: Failed password for invalid user pi from 70.181.124.215 port 38460 ssh2
Jan  3 18:27:08 host sshd[3620]: Connection closed by 70.181.124.215 port 38461 [preauth]
Jan  3 18:27:08 host sshd[3621]: Connection closed by 70.181.124.215 port 38460 [preauth]
Jan  3 18:32:21 host sshd[4493]: Invalid user sandeep from 185.216.144.17 port 52562
Jan  3 18:32:21 host sshd[4493]: input_userauth_request: invalid user sandeep [preauth]
Jan  3 18:32:21 host sshd[4493]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 18:32:21 host sshd[4493]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.216.144.17
Jan  3 18:32:23 host sshd[4493]: Failed password for invalid user sandeep from 185.216.144.17 port 52562 ssh2
Jan  3 18:32:24 host sshd[4493]: Received disconnect from 185.216.144.17 port 52562:11: Bye Bye [preauth]
Jan  3 18:32:24 host sshd[4493]: Disconnected from 185.216.144.17 port 52562 [preauth]
Jan  3 18:33:13 host sshd[4629]: Invalid user update from 52.140.61.101 port 38106
Jan  3 18:33:13 host sshd[4629]: input_userauth_request: invalid user update [preauth]
Jan  3 18:33:13 host sshd[4629]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 18:33:13 host sshd[4629]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.140.61.101
Jan  3 18:33:15 host sshd[4629]: Failed password for invalid user update from 52.140.61.101 port 38106 ssh2
Jan  3 18:33:15 host sshd[4629]: Received disconnect from 52.140.61.101 port 38106:11: Bye Bye [preauth]
Jan  3 18:33:15 host sshd[4629]: Disconnected from 52.140.61.101 port 38106 [preauth]
Jan  3 18:34:28 host sshd[4815]: User root from 157.230.121.169 not allowed because not listed in AllowUsers
Jan  3 18:34:28 host sshd[4815]: input_userauth_request: invalid user root [preauth]
Jan  3 18:34:28 host unix_chkpwd[4823]: password check failed for user (root)
Jan  3 18:34:28 host sshd[4815]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.121.169  user=root
Jan  3 18:34:28 host sshd[4815]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 18:34:30 host sshd[4815]: Failed password for invalid user root from 157.230.121.169 port 52334 ssh2
Jan  3 18:34:30 host sshd[4815]: Received disconnect from 157.230.121.169 port 52334:11: Bye Bye [preauth]
Jan  3 18:34:30 host sshd[4815]: Disconnected from 157.230.121.169 port 52334 [preauth]
Jan  3 18:34:31 host sshd[4830]: Invalid user cloud from 62.94.193.215 port 57138
Jan  3 18:34:31 host sshd[4830]: input_userauth_request: invalid user cloud [preauth]
Jan  3 18:34:31 host sshd[4830]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 18:34:31 host sshd[4830]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.94.193.215
Jan  3 18:34:33 host sshd[4830]: Failed password for invalid user cloud from 62.94.193.215 port 57138 ssh2
Jan  3 18:34:33 host sshd[4830]: Received disconnect from 62.94.193.215 port 57138:11: Bye Bye [preauth]
Jan  3 18:34:33 host sshd[4830]: Disconnected from 62.94.193.215 port 57138 [preauth]
Jan  3 18:34:35 host sshd[4841]: User root from 190.64.137.174 not allowed because not listed in AllowUsers
Jan  3 18:34:35 host sshd[4841]: input_userauth_request: invalid user root [preauth]
Jan  3 18:34:35 host unix_chkpwd[4846]: password check failed for user (root)
Jan  3 18:34:35 host sshd[4841]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.64.137.174  user=root
Jan  3 18:34:35 host sshd[4841]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 18:34:37 host sshd[4841]: Failed password for invalid user root from 190.64.137.174 port 51114 ssh2
Jan  3 18:34:38 host sshd[4841]: Received disconnect from 190.64.137.174 port 51114:11: Bye Bye [preauth]
Jan  3 18:34:38 host sshd[4841]: Disconnected from 190.64.137.174 port 51114 [preauth]
Jan  3 18:35:23 host sshd[4987]: Invalid user gituser from 88.147.166.188 port 56122
Jan  3 18:35:23 host sshd[4987]: input_userauth_request: invalid user gituser [preauth]
Jan  3 18:35:23 host sshd[4987]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 18:35:23 host sshd[4987]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.147.166.188
Jan  3 18:35:25 host sshd[4987]: Failed password for invalid user gituser from 88.147.166.188 port 56122 ssh2
Jan  3 18:35:26 host sshd[4987]: Received disconnect from 88.147.166.188 port 56122:11: Bye Bye [preauth]
Jan  3 18:35:26 host sshd[4987]: Disconnected from 88.147.166.188 port 56122 [preauth]
Jan  3 18:35:27 host sshd[5014]: Invalid user lankacom from 78.157.51.3 port 50224
Jan  3 18:35:27 host sshd[5014]: input_userauth_request: invalid user lankacom [preauth]
Jan  3 18:35:27 host sshd[5014]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 18:35:27 host sshd[5014]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.157.51.3
Jan  3 18:35:29 host sshd[5014]: Failed password for invalid user lankacom from 78.157.51.3 port 50224 ssh2
Jan  3 18:35:29 host sshd[5014]: Received disconnect from 78.157.51.3 port 50224:11: Bye Bye [preauth]
Jan  3 18:35:29 host sshd[5014]: Disconnected from 78.157.51.3 port 50224 [preauth]
Jan  3 18:35:51 host sshd[5141]: User root from 161.35.119.216 not allowed because not listed in AllowUsers
Jan  3 18:35:51 host sshd[5141]: input_userauth_request: invalid user root [preauth]
Jan  3 18:35:51 host unix_chkpwd[5177]: password check failed for user (root)
Jan  3 18:35:51 host sshd[5141]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.119.216  user=root
Jan  3 18:35:51 host sshd[5141]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 18:35:53 host sshd[5141]: Failed password for invalid user root from 161.35.119.216 port 45588 ssh2
Jan  3 18:35:53 host sshd[5141]: Received disconnect from 161.35.119.216 port 45588:11: Bye Bye [preauth]
Jan  3 18:35:53 host sshd[5141]: Disconnected from 161.35.119.216 port 45588 [preauth]
Jan  3 18:36:04 host sshd[5206]: Invalid user jira from 87.103.15.162 port 40464
Jan  3 18:36:04 host sshd[5206]: input_userauth_request: invalid user jira [preauth]
Jan  3 18:36:04 host sshd[5206]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 18:36:04 host sshd[5206]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.103.15.162
Jan  3 18:36:06 host sshd[5210]: User root from 190.64.137.174 not allowed because not listed in AllowUsers
Jan  3 18:36:06 host sshd[5210]: input_userauth_request: invalid user root [preauth]
Jan  3 18:36:06 host unix_chkpwd[5214]: password check failed for user (root)
Jan  3 18:36:06 host sshd[5210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.64.137.174  user=root
Jan  3 18:36:06 host sshd[5210]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 18:36:06 host sshd[5206]: Failed password for invalid user jira from 87.103.15.162 port 40464 ssh2
Jan  3 18:36:06 host sshd[5206]: Received disconnect from 87.103.15.162 port 40464:11: Bye Bye [preauth]
Jan  3 18:36:06 host sshd[5206]: Disconnected from 87.103.15.162 port 40464 [preauth]
Jan  3 18:36:08 host sshd[5210]: Failed password for invalid user root from 190.64.137.174 port 39746 ssh2
Jan  3 18:36:13 host sshd[5261]: Invalid user gituser from 104.248.197.238 port 43284
Jan  3 18:36:13 host sshd[5261]: input_userauth_request: invalid user gituser [preauth]
Jan  3 18:36:13 host sshd[5261]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 18:36:13 host sshd[5261]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.197.238
Jan  3 18:36:15 host sshd[5261]: Failed password for invalid user gituser from 104.248.197.238 port 43284 ssh2
Jan  3 18:36:16 host sshd[5261]: Received disconnect from 104.248.197.238 port 43284:11: Bye Bye [preauth]
Jan  3 18:36:16 host sshd[5261]: Disconnected from 104.248.197.238 port 43284 [preauth]
Jan  3 18:36:22 host sshd[5288]: User root from 176.31.15.168 not allowed because not listed in AllowUsers
Jan  3 18:36:22 host sshd[5288]: input_userauth_request: invalid user root [preauth]
Jan  3 18:36:22 host unix_chkpwd[5295]: password check failed for user (root)
Jan  3 18:36:22 host sshd[5288]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.15.168  user=root
Jan  3 18:36:22 host sshd[5288]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 18:36:24 host sshd[5288]: Failed password for invalid user root from 176.31.15.168 port 35978 ssh2
Jan  3 18:36:24 host sshd[5288]: Received disconnect from 176.31.15.168 port 35978:11: Bye Bye [preauth]
Jan  3 18:36:24 host sshd[5288]: Disconnected from 176.31.15.168 port 35978 [preauth]
Jan  3 18:36:44 host sshd[5363]: Invalid user root01 from 165.22.220.65 port 48540
Jan  3 18:36:44 host sshd[5363]: input_userauth_request: invalid user root01 [preauth]
Jan  3 18:36:44 host sshd[5363]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 18:36:44 host sshd[5363]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.220.65
Jan  3 18:36:45 host sshd[5369]: Invalid user jira from 103.37.83.26 port 54381
Jan  3 18:36:45 host sshd[5369]: input_userauth_request: invalid user jira [preauth]
Jan  3 18:36:45 host sshd[5369]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 18:36:45 host sshd[5369]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.37.83.26
Jan  3 18:36:46 host sshd[5363]: Failed password for invalid user root01 from 165.22.220.65 port 48540 ssh2
Jan  3 18:36:46 host sshd[5363]: Received disconnect from 165.22.220.65 port 48540:11: Bye Bye [preauth]
Jan  3 18:36:46 host sshd[5363]: Disconnected from 165.22.220.65 port 48540 [preauth]
Jan  3 18:36:47 host sshd[5369]: Failed password for invalid user jira from 103.37.83.26 port 54381 ssh2
Jan  3 18:36:47 host sshd[5369]: Received disconnect from 103.37.83.26 port 54381:11: Bye Bye [preauth]
Jan  3 18:36:47 host sshd[5369]: Disconnected from 103.37.83.26 port 54381 [preauth]
Jan  3 18:36:48 host sshd[5372]: User root from 186.215.100.37 not allowed because not listed in AllowUsers
Jan  3 18:36:48 host sshd[5372]: input_userauth_request: invalid user root [preauth]
Jan  3 18:36:48 host unix_chkpwd[5381]: password check failed for user (root)
Jan  3 18:36:48 host sshd[5372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.215.100.37  user=root
Jan  3 18:36:48 host sshd[5372]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 18:36:49 host sshd[5372]: Failed password for invalid user root from 186.215.100.37 port 58379 ssh2
Jan  3 18:36:50 host sshd[5372]: Received disconnect from 186.215.100.37 port 58379:11: Bye Bye [preauth]
Jan  3 18:36:50 host sshd[5372]: Disconnected from 186.215.100.37 port 58379 [preauth]
Jan  3 18:37:30 host sshd[5539]: User root from 179.60.150.118 not allowed because not listed in AllowUsers
Jan  3 18:37:30 host sshd[5539]: input_userauth_request: invalid user root [preauth]
Jan  3 18:37:30 host unix_chkpwd[5542]: password check failed for user (root)
Jan  3 18:37:30 host sshd[5539]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.60.150.118  user=root
Jan  3 18:37:30 host sshd[5539]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 18:37:32 host sshd[5539]: Failed password for invalid user root from 179.60.150.118 port 56734 ssh2
Jan  3 18:37:32 host sshd[5539]: Received disconnect from 179.60.150.118 port 56734:11: Bye Bye [preauth]
Jan  3 18:37:32 host sshd[5539]: Disconnected from 179.60.150.118 port 56734 [preauth]
Jan  3 18:37:58 host sshd[5590]: Invalid user postgres from 43.159.52.87 port 40096
Jan  3 18:37:58 host sshd[5590]: input_userauth_request: invalid user postgres [preauth]
Jan  3 18:37:58 host sshd[5590]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 18:37:58 host sshd[5590]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.159.52.87
Jan  3 18:38:00 host sshd[5590]: Failed password for invalid user postgres from 43.159.52.87 port 40096 ssh2
Jan  3 18:38:00 host sshd[5590]: Received disconnect from 43.159.52.87 port 40096:11: Bye Bye [preauth]
Jan  3 18:38:00 host sshd[5590]: Disconnected from 43.159.52.87 port 40096 [preauth]
Jan  3 18:38:38 host sshd[5668]: User root from 185.216.144.17 not allowed because not listed in AllowUsers
Jan  3 18:38:38 host sshd[5668]: input_userauth_request: invalid user root [preauth]
Jan  3 18:38:38 host unix_chkpwd[5673]: password check failed for user (root)
Jan  3 18:38:38 host sshd[5668]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.216.144.17  user=root
Jan  3 18:38:38 host sshd[5668]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 18:38:40 host sshd[5668]: Failed password for invalid user root from 185.216.144.17 port 52826 ssh2
Jan  3 18:38:40 host sshd[5668]: Received disconnect from 185.216.144.17 port 52826:11: Bye Bye [preauth]
Jan  3 18:38:40 host sshd[5668]: Disconnected from 185.216.144.17 port 52826 [preauth]
Jan  3 18:39:00 host sshd[5733]: Invalid user robert from 20.121.113.183 port 1344
Jan  3 18:39:00 host sshd[5733]: input_userauth_request: invalid user robert [preauth]
Jan  3 18:39:00 host sshd[5733]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 18:39:00 host sshd[5733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.121.113.183
Jan  3 18:39:02 host sshd[5733]: Failed password for invalid user robert from 20.121.113.183 port 1344 ssh2
Jan  3 18:39:02 host sshd[5733]: Received disconnect from 20.121.113.183 port 1344:11: Bye Bye [preauth]
Jan  3 18:39:02 host sshd[5733]: Disconnected from 20.121.113.183 port 1344 [preauth]
Jan  3 18:39:08 host sshd[5764]: User root from 115.249.50.242 not allowed because not listed in AllowUsers
Jan  3 18:39:08 host sshd[5764]: input_userauth_request: invalid user root [preauth]
Jan  3 18:39:08 host unix_chkpwd[5766]: password check failed for user (root)
Jan  3 18:39:08 host sshd[5764]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.249.50.242  user=root
Jan  3 18:39:08 host sshd[5764]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 18:39:10 host sshd[5764]: Failed password for invalid user root from 115.249.50.242 port 42168 ssh2
Jan  3 18:39:10 host sshd[5764]: Received disconnect from 115.249.50.242 port 42168:11: Bye Bye [preauth]
Jan  3 18:39:10 host sshd[5764]: Disconnected from 115.249.50.242 port 42168 [preauth]
Jan  3 18:39:13 host sshd[5773]: Invalid user denis from 182.70.115.11 port 36436
Jan  3 18:39:13 host sshd[5773]: input_userauth_request: invalid user denis [preauth]
Jan  3 18:39:13 host sshd[5773]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 18:39:13 host sshd[5773]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.70.115.11
Jan  3 18:39:14 host sshd[5776]: User root from 52.140.61.101 not allowed because not listed in AllowUsers
Jan  3 18:39:14 host sshd[5776]: input_userauth_request: invalid user root [preauth]
Jan  3 18:39:14 host unix_chkpwd[5778]: password check failed for user (root)
Jan  3 18:39:14 host sshd[5776]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.140.61.101  user=root
Jan  3 18:39:14 host sshd[5776]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 18:39:15 host sshd[5773]: Failed password for invalid user denis from 182.70.115.11 port 36436 ssh2
Jan  3 18:39:15 host sshd[5773]: Received disconnect from 182.70.115.11 port 36436:11: Bye Bye [preauth]
Jan  3 18:39:15 host sshd[5773]: Disconnected from 182.70.115.11 port 36436 [preauth]
Jan  3 18:39:15 host sshd[5776]: Failed password for invalid user root from 52.140.61.101 port 51102 ssh2
Jan  3 18:39:15 host sshd[5776]: Received disconnect from 52.140.61.101 port 51102:11: Bye Bye [preauth]
Jan  3 18:39:15 host sshd[5776]: Disconnected from 52.140.61.101 port 51102 [preauth]
Jan  3 18:39:17 host sshd[5808]: Invalid user monitor from 165.22.220.65 port 56068
Jan  3 18:39:17 host sshd[5808]: input_userauth_request: invalid user monitor [preauth]
Jan  3 18:39:17 host sshd[5808]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 18:39:17 host sshd[5808]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.220.65
Jan  3 18:39:20 host sshd[5808]: Failed password for invalid user monitor from 165.22.220.65 port 56068 ssh2
Jan  3 18:39:20 host sshd[5808]: Received disconnect from 165.22.220.65 port 56068:11: Bye Bye [preauth]
Jan  3 18:39:20 host sshd[5808]: Disconnected from 165.22.220.65 port 56068 [preauth]
Jan  3 18:39:25 host sshd[5821]: User root from 87.103.15.162 not allowed because not listed in AllowUsers
Jan  3 18:39:25 host sshd[5821]: input_userauth_request: invalid user root [preauth]
Jan  3 18:39:25 host unix_chkpwd[5826]: password check failed for user (root)
Jan  3 18:39:25 host sshd[5821]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.103.15.162  user=root
Jan  3 18:39:25 host sshd[5821]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 18:39:25 host sshd[5824]: Invalid user oracle from 103.37.83.26 port 43994
Jan  3 18:39:25 host sshd[5824]: input_userauth_request: invalid user oracle [preauth]
Jan  3 18:39:25 host sshd[5824]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 18:39:25 host sshd[5824]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.37.83.26
Jan  3 18:39:26 host sshd[5821]: Failed password for invalid user root from 87.103.15.162 port 51446 ssh2
Jan  3 18:39:27 host sshd[5821]: Received disconnect from 87.103.15.162 port 51446:11: Bye Bye [preauth]
Jan  3 18:39:27 host sshd[5821]: Disconnected from 87.103.15.162 port 51446 [preauth]
Jan  3 18:39:27 host sshd[5824]: Failed password for invalid user oracle from 103.37.83.26 port 43994 ssh2
Jan  3 18:39:27 host sshd[5824]: Received disconnect from 103.37.83.26 port 43994:11: Bye Bye [preauth]
Jan  3 18:39:27 host sshd[5824]: Disconnected from 103.37.83.26 port 43994 [preauth]
Jan  3 18:39:41 host sshd[5892]: Invalid user sammy from 43.159.52.87 port 41172
Jan  3 18:39:41 host sshd[5892]: input_userauth_request: invalid user sammy [preauth]
Jan  3 18:39:41 host sshd[5892]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 18:39:41 host sshd[5892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.159.52.87
Jan  3 18:39:43 host sshd[5892]: Failed password for invalid user sammy from 43.159.52.87 port 41172 ssh2
Jan  3 18:39:43 host sshd[5892]: Received disconnect from 43.159.52.87 port 41172:11: Bye Bye [preauth]
Jan  3 18:39:43 host sshd[5892]: Disconnected from 43.159.52.87 port 41172 [preauth]
Jan  3 18:39:49 host sshd[5906]: User root from 157.230.121.169 not allowed because not listed in AllowUsers
Jan  3 18:39:49 host sshd[5906]: input_userauth_request: invalid user root [preauth]
Jan  3 18:39:49 host unix_chkpwd[5909]: password check failed for user (root)
Jan  3 18:39:49 host sshd[5906]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.121.169  user=root
Jan  3 18:39:49 host sshd[5906]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 18:39:50 host sshd[5906]: Failed password for invalid user root from 157.230.121.169 port 59794 ssh2
Jan  3 18:39:51 host sshd[5906]: Received disconnect from 157.230.121.169 port 59794:11: Bye Bye [preauth]
Jan  3 18:39:51 host sshd[5906]: Disconnected from 157.230.121.169 port 59794 [preauth]
Jan  3 18:39:56 host sshd[5945]: User root from 186.215.100.37 not allowed because not listed in AllowUsers
Jan  3 18:39:56 host sshd[5945]: input_userauth_request: invalid user root [preauth]
Jan  3 18:39:56 host unix_chkpwd[5948]: password check failed for user (root)
Jan  3 18:39:56 host sshd[5945]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.215.100.37  user=root
Jan  3 18:39:56 host sshd[5945]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 18:39:58 host sshd[5945]: Failed password for invalid user root from 186.215.100.37 port 57926 ssh2
Jan  3 18:40:28 host sshd[6086]: Invalid user steam from 176.31.15.168 port 54858
Jan  3 18:40:28 host sshd[6086]: input_userauth_request: invalid user steam [preauth]
Jan  3 18:40:28 host sshd[6086]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 18:40:28 host sshd[6086]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.15.168
Jan  3 18:40:30 host sshd[6086]: Failed password for invalid user steam from 176.31.15.168 port 54858 ssh2
Jan  3 18:40:30 host sshd[6086]: Received disconnect from 176.31.15.168 port 54858:11: Bye Bye [preauth]
Jan  3 18:40:30 host sshd[6086]: Disconnected from 176.31.15.168 port 54858 [preauth]
Jan  3 18:40:40 host sshd[6132]: Invalid user cloud from 161.35.119.216 port 34086
Jan  3 18:40:40 host sshd[6132]: input_userauth_request: invalid user cloud [preauth]
Jan  3 18:40:40 host sshd[6132]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 18:40:40 host sshd[6132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.119.216
Jan  3 18:40:42 host sshd[6137]: Invalid user admin from 165.22.220.65 port 56534
Jan  3 18:40:42 host sshd[6137]: input_userauth_request: invalid user admin [preauth]
Jan  3 18:40:42 host sshd[6137]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 18:40:42 host sshd[6137]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.220.65
Jan  3 18:40:42 host sshd[6132]: Failed password for invalid user cloud from 161.35.119.216 port 34086 ssh2
Jan  3 18:40:42 host sshd[6132]: Received disconnect from 161.35.119.216 port 34086:11: Bye Bye [preauth]
Jan  3 18:40:42 host sshd[6132]: Disconnected from 161.35.119.216 port 34086 [preauth]
Jan  3 18:40:44 host sshd[6137]: Failed password for invalid user admin from 165.22.220.65 port 56534 ssh2
Jan  3 18:40:44 host sshd[6137]: Received disconnect from 165.22.220.65 port 56534:11: Bye Bye [preauth]
Jan  3 18:40:44 host sshd[6137]: Disconnected from 165.22.220.65 port 56534 [preauth]
Jan  3 18:40:55 host sshd[6316]: User root from 104.248.197.238 not allowed because not listed in AllowUsers
Jan  3 18:40:55 host sshd[6316]: input_userauth_request: invalid user root [preauth]
Jan  3 18:40:55 host unix_chkpwd[6324]: password check failed for user (root)
Jan  3 18:40:55 host sshd[6316]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.197.238  user=root
Jan  3 18:40:55 host sshd[6316]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 18:40:57 host sshd[6316]: Failed password for invalid user root from 104.248.197.238 port 34740 ssh2
Jan  3 18:40:57 host sshd[6316]: Received disconnect from 104.248.197.238 port 34740:11: Bye Bye [preauth]
Jan  3 18:40:57 host sshd[6316]: Disconnected from 104.248.197.238 port 34740 [preauth]
Jan  3 18:41:00 host sshd[6360]: User root from 20.121.113.183 not allowed because not listed in AllowUsers
Jan  3 18:41:00 host sshd[6360]: input_userauth_request: invalid user root [preauth]
Jan  3 18:41:00 host unix_chkpwd[6363]: password check failed for user (root)
Jan  3 18:41:00 host sshd[6360]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.121.113.183  user=root
Jan  3 18:41:00 host sshd[6360]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 18:41:00 host sshd[6364]: User root from 106.10.122.53 not allowed because not listed in AllowUsers
Jan  3 18:41:00 host sshd[6364]: input_userauth_request: invalid user root [preauth]
Jan  3 18:41:01 host unix_chkpwd[6367]: password check failed for user (root)
Jan  3 18:41:01 host sshd[6364]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53  user=root
Jan  3 18:41:01 host sshd[6364]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 18:41:02 host sshd[6360]: Failed password for invalid user root from 20.121.113.183 port 1344 ssh2
Jan  3 18:41:02 host sshd[6360]: Received disconnect from 20.121.113.183 port 1344:11: Bye Bye [preauth]
Jan  3 18:41:02 host sshd[6360]: Disconnected from 20.121.113.183 port 1344 [preauth]
Jan  3 18:41:03 host sshd[6364]: Failed password for invalid user root from 106.10.122.53 port 46498 ssh2
Jan  3 18:41:03 host sshd[6364]: Connection closed by 106.10.122.53 port 46498 [preauth]
Jan  3 18:41:03 host sshd[6410]: Invalid user admin from 103.37.83.26 port 58328
Jan  3 18:41:03 host sshd[6410]: input_userauth_request: invalid user admin [preauth]
Jan  3 18:41:03 host sshd[6410]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 18:41:03 host sshd[6410]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.37.83.26
Jan  3 18:41:04 host sshd[6412]: User root from 43.159.52.87 not allowed because not listed in AllowUsers
Jan  3 18:41:04 host sshd[6412]: input_userauth_request: invalid user root [preauth]
Jan  3 18:41:04 host unix_chkpwd[6414]: password check failed for user (root)
Jan  3 18:41:04 host sshd[6412]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.159.52.87  user=root
Jan  3 18:41:04 host sshd[6412]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 18:41:05 host sshd[6410]: Failed password for invalid user admin from 103.37.83.26 port 58328 ssh2
Jan  3 18:41:05 host sshd[6410]: Received disconnect from 103.37.83.26 port 58328:11: Bye Bye [preauth]
Jan  3 18:41:05 host sshd[6410]: Disconnected from 103.37.83.26 port 58328 [preauth]
Jan  3 18:41:05 host sshd[6412]: Failed password for invalid user root from 43.159.52.87 port 41694 ssh2
Jan  3 18:41:06 host sshd[6412]: Received disconnect from 43.159.52.87 port 41694:11: Bye Bye [preauth]
Jan  3 18:41:06 host sshd[6412]: Disconnected from 43.159.52.87 port 41694 [preauth]
Jan  3 18:41:10 host sshd[6480]: User root from 179.60.150.118 not allowed because not listed in AllowUsers
Jan  3 18:41:10 host sshd[6480]: input_userauth_request: invalid user root [preauth]
Jan  3 18:41:10 host unix_chkpwd[6483]: password check failed for user (root)
Jan  3 18:41:10 host sshd[6480]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.60.150.118  user=root
Jan  3 18:41:10 host sshd[6480]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 18:41:12 host sshd[6480]: Failed password for invalid user root from 179.60.150.118 port 58978 ssh2
Jan  3 18:41:13 host sshd[6480]: Received disconnect from 179.60.150.118 port 58978:11: Bye Bye [preauth]
Jan  3 18:41:13 host sshd[6480]: Disconnected from 179.60.150.118 port 58978 [preauth]
Jan  3 18:41:17 host sshd[6520]: Connection closed by 88.147.166.188 port 48482 [preauth]
Jan  3 18:41:27 host sshd[6557]: User root from 62.94.193.215 not allowed because not listed in AllowUsers
Jan  3 18:41:27 host sshd[6557]: input_userauth_request: invalid user root [preauth]
Jan  3 18:41:27 host unix_chkpwd[6560]: password check failed for user (root)
Jan  3 18:41:27 host sshd[6557]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.94.193.215  user=root
Jan  3 18:41:27 host sshd[6557]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 18:41:29 host sshd[6557]: Failed password for invalid user root from 62.94.193.215 port 57336 ssh2
Jan  3 18:41:29 host sshd[6557]: Received disconnect from 62.94.193.215 port 57336:11: Bye Bye [preauth]
Jan  3 18:41:29 host sshd[6557]: Disconnected from 62.94.193.215 port 57336 [preauth]
Jan  3 18:42:14 host sshd[6659]: Invalid user david from 78.157.51.3 port 47974
Jan  3 18:42:14 host sshd[6659]: input_userauth_request: invalid user david [preauth]
Jan  3 18:42:14 host sshd[6659]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 18:42:14 host sshd[6659]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.157.51.3
Jan  3 18:42:16 host sshd[6659]: Failed password for invalid user david from 78.157.51.3 port 47974 ssh2
Jan  3 18:42:16 host sshd[6675]: User root from 182.70.115.11 not allowed because not listed in AllowUsers
Jan  3 18:42:16 host sshd[6675]: input_userauth_request: invalid user root [preauth]
Jan  3 18:42:16 host sshd[6659]: Received disconnect from 78.157.51.3 port 47974:11: Bye Bye [preauth]
Jan  3 18:42:16 host sshd[6659]: Disconnected from 78.157.51.3 port 47974 [preauth]
Jan  3 18:42:16 host unix_chkpwd[6677]: password check failed for user (root)
Jan  3 18:42:16 host sshd[6675]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.70.115.11  user=root
Jan  3 18:42:16 host sshd[6675]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 18:42:18 host sshd[6675]: Failed password for invalid user root from 182.70.115.11 port 45902 ssh2
Jan  3 18:42:18 host sshd[6675]: Received disconnect from 182.70.115.11 port 45902:11: Bye Bye [preauth]
Jan  3 18:42:18 host sshd[6675]: Disconnected from 182.70.115.11 port 45902 [preauth]
Jan  3 18:42:47 host sshd[6771]: User root from 88.147.166.188 not allowed because not listed in AllowUsers
Jan  3 18:42:47 host sshd[6771]: input_userauth_request: invalid user root [preauth]
Jan  3 18:42:47 host unix_chkpwd[6779]: password check failed for user (root)
Jan  3 18:42:47 host sshd[6771]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.147.166.188  user=root
Jan  3 18:42:47 host sshd[6771]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 18:42:49 host sshd[6771]: Failed password for invalid user root from 88.147.166.188 port 44220 ssh2
Jan  3 18:42:50 host sshd[6771]: Received disconnect from 88.147.166.188 port 44220:11: Bye Bye [preauth]
Jan  3 18:42:50 host sshd[6771]: Disconnected from 88.147.166.188 port 44220 [preauth]
Jan  3 18:43:13 host sshd[6852]: User root from 115.249.50.242 not allowed because not listed in AllowUsers
Jan  3 18:43:13 host sshd[6852]: input_userauth_request: invalid user root [preauth]
Jan  3 18:43:13 host unix_chkpwd[6854]: password check failed for user (root)
Jan  3 18:43:13 host sshd[6852]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.249.50.242  user=root
Jan  3 18:43:13 host sshd[6852]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 18:43:15 host sshd[6852]: Failed password for invalid user root from 115.249.50.242 port 48490 ssh2
Jan  3 18:43:15 host sshd[6852]: Received disconnect from 115.249.50.242 port 48490:11: Bye Bye [preauth]
Jan  3 18:43:15 host sshd[6852]: Disconnected from 115.249.50.242 port 48490 [preauth]
Jan  3 18:43:23 host sshd[6894]: Invalid user guillermo from 154.214.4.199 port 36170
Jan  3 18:43:23 host sshd[6894]: input_userauth_request: invalid user guillermo [preauth]
Jan  3 18:43:23 host sshd[6894]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 18:43:23 host sshd[6894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.214.4.199
Jan  3 18:43:25 host sshd[6894]: Failed password for invalid user guillermo from 154.214.4.199 port 36170 ssh2
Jan  3 18:43:25 host sshd[6894]: Received disconnect from 154.214.4.199 port 36170:11: Bye Bye [preauth]
Jan  3 18:43:25 host sshd[6894]: Disconnected from 154.214.4.199 port 36170 [preauth]
Jan  3 18:43:31 host sshd[6931]: User root from 78.157.51.3 not allowed because not listed in AllowUsers
Jan  3 18:43:31 host sshd[6931]: input_userauth_request: invalid user root [preauth]
Jan  3 18:43:31 host unix_chkpwd[6935]: password check failed for user (root)
Jan  3 18:43:31 host sshd[6931]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.157.51.3  user=root
Jan  3 18:43:31 host sshd[6931]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 18:43:33 host sshd[6931]: Failed password for invalid user root from 78.157.51.3 port 40420 ssh2
Jan  3 18:46:13 host sshd[7341]: User root from 154.214.4.199 not allowed because not listed in AllowUsers
Jan  3 18:46:13 host sshd[7341]: input_userauth_request: invalid user root [preauth]
Jan  3 18:46:13 host unix_chkpwd[7344]: password check failed for user (root)
Jan  3 18:46:13 host sshd[7341]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.214.4.199  user=root
Jan  3 18:46:13 host sshd[7341]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 18:46:15 host sshd[7341]: Failed password for invalid user root from 154.214.4.199 port 38092 ssh2
Jan  3 18:46:15 host sshd[7341]: Received disconnect from 154.214.4.199 port 38092:11: Bye Bye [preauth]
Jan  3 18:46:15 host sshd[7341]: Disconnected from 154.214.4.199 port 38092 [preauth]
Jan  3 19:10:32 host sshd[11009]: Did not receive identification string from 180.241.241.114 port 17470
Jan  3 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  3 19:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 19:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  3 19:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 19:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  3 19:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 19:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  3 19:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 19:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  3 19:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 19:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  3 19:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 19:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  3 19:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 19:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  3 19:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 19:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 19:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  3 19:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 19:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 19:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  3 19:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 19:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 19:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  3 19:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 19:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 19:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  3 19:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 19:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 19:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  3 19:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 19:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 19:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=cochintaxi user-2=wwwkaretakers user-3=laundryboniface user-4=dartsimp user-5=a2zgroup user-6=wwwpmcresource user-7=wwwrmswll user-8=wwwresourcehunte user-9=keralaholi user-10=ugotscom user-11=travelboniface user-12=wwwkapin user-13=woodpeck user-14=disposeat user-15=remysagr user-16=wwwkmaorg user-17=pmcresources user-18=vfmassets user-19=wwwtestugo user-20=shalinijames user-21=straightcurve user-22=wwwletsstalkfood user-23=bonifacegroup user-24=wwwevmhonda user-25=mrsclean user-26=wwwnexidigital user-27=gifterman user-28=palco123 user-29=phmetals user-30=kottayamcalldriv feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  3 19:21:52 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  3 19:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 19:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 19:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  3 19:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 19:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 19:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-SoZyugPVekbh2Ds3.~
Jan  3 19:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 19:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 19:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-SoZyugPVekbh2Ds3.~'
Jan  3 19:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 19:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 19:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-SoZyugPVekbh2Ds3.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  3 19:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 19:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 19:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  3 19:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 19:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 19:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  3 19:21:53 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 19:21:53 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 19:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  3 19:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 19:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 19:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  3 19:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 19:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 19:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  3 19:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 19:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 19:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  3 19:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 19:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 19:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  3 19:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 19:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 19:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  3 19:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  3 19:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  3 19:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  3 19:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  3 19:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  3 19:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  3 19:22:00 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  3 19:22:01 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  3 19:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  3 19:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 19:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 19:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  3 19:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 19:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 19:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  3 19:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 19:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 19:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  3 19:22:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 19:22:10 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 19:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  3 19:22:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 19:22:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 19:22:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  3 19:22:12 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  3 19:22:18 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  3 19:27:38 host sshd[13632]: Invalid user minikube from 159.89.87.72 port 60484
Jan  3 19:27:38 host sshd[13632]: input_userauth_request: invalid user minikube [preauth]
Jan  3 19:27:38 host sshd[13632]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 19:27:38 host sshd[13632]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.87.72
Jan  3 19:27:41 host sshd[13632]: Failed password for invalid user minikube from 159.89.87.72 port 60484 ssh2
Jan  3 19:27:41 host sshd[13632]: Received disconnect from 159.89.87.72 port 60484:11: Bye Bye [preauth]
Jan  3 19:27:41 host sshd[13632]: Disconnected from 159.89.87.72 port 60484 [preauth]
Jan  3 19:27:46 host sshd[13626]: Connection closed by 190.166.52.24 port 38829 [preauth]
Jan  3 19:29:24 host sshd[13852]: Invalid user admin from 188.166.14.99 port 59080
Jan  3 19:29:24 host sshd[13852]: input_userauth_request: invalid user admin [preauth]
Jan  3 19:29:24 host sshd[13852]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 19:29:24 host sshd[13852]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.14.99
Jan  3 19:29:26 host sshd[13852]: Failed password for invalid user admin from 188.166.14.99 port 59080 ssh2
Jan  3 19:29:27 host sshd[13852]: Received disconnect from 188.166.14.99 port 59080:11: Bye Bye [preauth]
Jan  3 19:29:27 host sshd[13852]: Disconnected from 188.166.14.99 port 59080 [preauth]
Jan  3 19:33:01 host sshd[14404]: Invalid user admin from 159.89.87.72 port 60468
Jan  3 19:33:01 host sshd[14404]: input_userauth_request: invalid user admin [preauth]
Jan  3 19:33:01 host sshd[14404]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 19:33:01 host sshd[14404]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.87.72
Jan  3 19:33:03 host sshd[14404]: Failed password for invalid user admin from 159.89.87.72 port 60468 ssh2
Jan  3 19:33:03 host sshd[14404]: Received disconnect from 159.89.87.72 port 60468:11: Bye Bye [preauth]
Jan  3 19:33:03 host sshd[14404]: Disconnected from 159.89.87.72 port 60468 [preauth]
Jan  3 19:33:13 host sshd[14428]: Invalid user redis from 188.166.14.99 port 48016
Jan  3 19:33:13 host sshd[14428]: input_userauth_request: invalid user redis [preauth]
Jan  3 19:33:13 host sshd[14428]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 19:33:13 host sshd[14428]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.14.99
Jan  3 19:33:15 host sshd[14428]: Failed password for invalid user redis from 188.166.14.99 port 48016 ssh2
Jan  3 19:33:15 host sshd[14428]: Received disconnect from 188.166.14.99 port 48016:11: Bye Bye [preauth]
Jan  3 19:33:15 host sshd[14428]: Disconnected from 188.166.14.99 port 48016 [preauth]
Jan  3 19:34:07 host sshd[14533]: Invalid user newuser from 159.89.87.72 port 60506
Jan  3 19:34:07 host sshd[14533]: input_userauth_request: invalid user newuser [preauth]
Jan  3 19:34:07 host sshd[14533]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 19:34:07 host sshd[14533]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.87.72
Jan  3 19:34:09 host sshd[14533]: Failed password for invalid user newuser from 159.89.87.72 port 60506 ssh2
Jan  3 19:34:09 host sshd[14533]: Received disconnect from 159.89.87.72 port 60506:11: Bye Bye [preauth]
Jan  3 19:34:09 host sshd[14533]: Disconnected from 159.89.87.72 port 60506 [preauth]
Jan  3 19:34:25 host sshd[14585]: Invalid user testuser from 188.166.14.99 port 33634
Jan  3 19:34:25 host sshd[14585]: input_userauth_request: invalid user testuser [preauth]
Jan  3 19:34:25 host sshd[14585]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 19:34:25 host sshd[14585]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.14.99
Jan  3 19:34:26 host sshd[14585]: Failed password for invalid user testuser from 188.166.14.99 port 33634 ssh2
Jan  3 19:34:26 host sshd[14585]: Received disconnect from 188.166.14.99 port 33634:11: Bye Bye [preauth]
Jan  3 19:34:26 host sshd[14585]: Disconnected from 188.166.14.99 port 33634 [preauth]
Jan  3 19:34:59 host sshd[14691]: Invalid user zhangtao from 92.46.108.20 port 36242
Jan  3 19:34:59 host sshd[14691]: input_userauth_request: invalid user zhangtao [preauth]
Jan  3 19:34:59 host sshd[14691]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 19:34:59 host sshd[14691]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20
Jan  3 19:35:02 host sshd[14691]: Failed password for invalid user zhangtao from 92.46.108.20 port 36242 ssh2
Jan  3 19:35:03 host sshd[14691]: Connection closed by 92.46.108.20 port 36242 [preauth]
Jan  3 19:37:02 host sshd[15044]: User mysql from 41.197.31.178 not allowed because not listed in AllowUsers
Jan  3 19:37:02 host sshd[15044]: input_userauth_request: invalid user mysql [preauth]
Jan  3 19:37:02 host unix_chkpwd[15057]: password check failed for user (mysql)
Jan  3 19:37:02 host sshd[15044]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178  user=mysql
Jan  3 19:37:02 host sshd[15044]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "mysql"
Jan  3 19:37:04 host sshd[15044]: Failed password for invalid user mysql from 41.197.31.178 port 58236 ssh2
Jan  3 19:37:05 host sshd[15044]: Connection closed by 41.197.31.178 port 58236 [preauth]
Jan  3 19:37:08 host sshd[15064]: Invalid user ts3 from 103.13.40.2 port 35636
Jan  3 19:37:08 host sshd[15064]: input_userauth_request: invalid user ts3 [preauth]
Jan  3 19:37:08 host sshd[15064]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 19:37:08 host sshd[15064]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2
Jan  3 19:37:10 host sshd[15064]: Failed password for invalid user ts3 from 103.13.40.2 port 35636 ssh2
Jan  3 19:37:10 host sshd[15064]: Connection closed by 103.13.40.2 port 35636 [preauth]
Jan  3 19:49:42 host sshd[17152]: Invalid user prasad from 162.218.126.136 port 33028
Jan  3 19:49:42 host sshd[17152]: input_userauth_request: invalid user prasad [preauth]
Jan  3 19:49:42 host sshd[17152]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 19:49:42 host sshd[17152]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136
Jan  3 19:49:44 host sshd[17152]: Failed password for invalid user prasad from 162.218.126.136 port 33028 ssh2
Jan  3 19:49:44 host sshd[17152]: Connection closed by 162.218.126.136 port 33028 [preauth]
Jan  3 20:01:07 host sshd[18927]: Invalid user postgres from 106.10.122.53 port 46282
Jan  3 20:01:07 host sshd[18927]: input_userauth_request: invalid user postgres [preauth]
Jan  3 20:01:07 host sshd[18927]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 20:01:07 host sshd[18927]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53
Jan  3 20:01:09 host sshd[18927]: Failed password for invalid user postgres from 106.10.122.53 port 46282 ssh2
Jan  3 20:01:09 host sshd[18927]: Connection closed by 106.10.122.53 port 46282 [preauth]
Jan  3 20:16:22 host sshd[21293]: Did not receive identification string from 83.69.204.229 port 60000
Jan  3 20:21:05 host sshd[21969]: Invalid user henry from 107.189.30.59 port 50440
Jan  3 20:21:05 host sshd[21969]: input_userauth_request: invalid user henry [preauth]
Jan  3 20:21:05 host sshd[21969]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 20:21:05 host sshd[21969]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59
Jan  3 20:21:08 host sshd[21969]: Failed password for invalid user henry from 107.189.30.59 port 50440 ssh2
Jan  3 20:21:09 host sshd[21969]: Connection closed by 107.189.30.59 port 50440 [preauth]
Jan  3 20:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  3 20:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 20:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 20:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  3 20:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 20:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 20:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  3 20:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 20:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 20:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  3 20:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 20:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 20:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  3 20:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 20:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 20:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  3 20:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 20:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 20:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  3 20:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 20:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 20:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  3 20:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 20:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 20:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  3 20:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 20:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 20:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  3 20:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 20:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 20:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  3 20:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 20:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 20:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  3 20:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 20:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 20:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  3 20:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 20:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 20:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=cochintaxi user-2=wwwkaretakers user-3=a2zgroup user-4=dartsimp user-5=laundryboniface user-6=wwwpmcresource user-7=travelboniface user-8=keralaholi user-9=wwwresourcehunte user-10=wwwrmswll user-11=ugotscom user-12=disposeat user-13=wwwkmaorg user-14=remysagr user-15=wwwkapin user-16=woodpeck user-17=vfmassets user-18=shalinijames user-19=wwwtestugo user-20=pmcresources user-21=bonifacegroup user-22=wwwevmhonda user-23=wwwletsstalkfood user-24=straightcurve user-25=palco123 user-26=gifterman user-27=phmetals user-28=kottayamcalldriv user-29=wwwnexidigital user-30=mrsclean feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  3 20:21:52 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  3 20:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 20:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 20:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  3 20:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 20:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 20:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-wSPDbCqPBApAGDcR.~
Jan  3 20:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 20:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 20:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-wSPDbCqPBApAGDcR.~'
Jan  3 20:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 20:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 20:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-wSPDbCqPBApAGDcR.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  3 20:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 20:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 20:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  3 20:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 20:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 20:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  3 20:21:52 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 20:21:52 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 20:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  3 20:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 20:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 20:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  3 20:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 20:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 20:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  3 20:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 20:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 20:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  3 20:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 20:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 20:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  3 20:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 20:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 20:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  3 20:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  3 20:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  3 20:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  3 20:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  3 20:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  3 20:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  3 20:21:57 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  3 20:21:59 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  3 20:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  3 20:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 20:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 20:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  3 20:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 20:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 20:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  3 20:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 20:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 20:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  3 20:22:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 20:22:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 20:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  3 20:22:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 20:22:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 20:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  3 20:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  3 20:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  3 20:42:07 host sshd[25101]: User root from 115.95.180.253 not allowed because not listed in AllowUsers
Jan  3 20:42:07 host sshd[25101]: input_userauth_request: invalid user root [preauth]
Jan  3 20:42:07 host unix_chkpwd[25104]: password check failed for user (root)
Jan  3 20:42:07 host sshd[25101]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.95.180.253  user=root
Jan  3 20:42:07 host sshd[25101]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 20:42:09 host sshd[25101]: Failed password for invalid user root from 115.95.180.253 port 46794 ssh2
Jan  3 20:42:09 host sshd[25101]: Received disconnect from 115.95.180.253 port 46794:11: Bye Bye [preauth]
Jan  3 20:42:09 host sshd[25101]: Disconnected from 115.95.180.253 port 46794 [preauth]
Jan  3 20:45:53 host sshd[25512]: User root from 115.95.180.253 not allowed because not listed in AllowUsers
Jan  3 20:45:53 host sshd[25512]: input_userauth_request: invalid user root [preauth]
Jan  3 20:45:53 host unix_chkpwd[25515]: password check failed for user (root)
Jan  3 20:45:53 host sshd[25512]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.95.180.253  user=root
Jan  3 20:45:53 host sshd[25512]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 20:45:55 host sshd[25512]: Failed password for invalid user root from 115.95.180.253 port 52588 ssh2
Jan  3 20:45:55 host sshd[25512]: Received disconnect from 115.95.180.253 port 52588:11: Bye Bye [preauth]
Jan  3 20:45:55 host sshd[25512]: Disconnected from 115.95.180.253 port 52588 [preauth]
Jan  3 20:56:40 host sshd[27184]: Invalid user user1 from 103.13.40.2 port 59312
Jan  3 20:56:40 host sshd[27184]: input_userauth_request: invalid user user1 [preauth]
Jan  3 20:56:40 host sshd[27184]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 20:56:40 host sshd[27184]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2
Jan  3 20:56:42 host sshd[27184]: Failed password for invalid user user1 from 103.13.40.2 port 59312 ssh2
Jan  3 20:56:42 host sshd[27184]: Connection closed by 103.13.40.2 port 59312 [preauth]
Jan  3 21:06:06 host sshd[28678]: Invalid user user1 from 41.197.31.178 port 45426
Jan  3 21:06:06 host sshd[28678]: input_userauth_request: invalid user user1 [preauth]
Jan  3 21:06:06 host sshd[28678]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 21:06:06 host sshd[28678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178
Jan  3 21:06:08 host sshd[28678]: Failed password for invalid user user1 from 41.197.31.178 port 45426 ssh2
Jan  3 21:06:09 host sshd[28678]: Connection closed by 41.197.31.178 port 45426 [preauth]
Jan  3 21:15:24 host sshd[29979]: Invalid user user from 162.218.126.136 port 45058
Jan  3 21:15:24 host sshd[29979]: input_userauth_request: invalid user user [preauth]
Jan  3 21:15:24 host sshd[29979]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 21:15:24 host sshd[29979]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136
Jan  3 21:15:26 host sshd[29979]: Failed password for invalid user user from 162.218.126.136 port 45058 ssh2
Jan  3 21:15:27 host sshd[29979]: Connection closed by 162.218.126.136 port 45058 [preauth]
Jan  3 21:20:43 host sshd[30710]: Invalid user cacti from 213.238.177.115 port 33596
Jan  3 21:20:43 host sshd[30710]: input_userauth_request: invalid user cacti [preauth]
Jan  3 21:20:43 host sshd[30710]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 21:20:43 host sshd[30710]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.238.177.115
Jan  3 21:20:45 host sshd[30710]: Failed password for invalid user cacti from 213.238.177.115 port 33596 ssh2
Jan  3 21:20:45 host sshd[30710]: Received disconnect from 213.238.177.115 port 33596:11: Bye Bye [preauth]
Jan  3 21:20:45 host sshd[30710]: Disconnected from 213.238.177.115 port 33596 [preauth]
Jan  3 21:21:10 host sshd[30837]: User root from 106.10.122.53 not allowed because not listed in AllowUsers
Jan  3 21:21:10 host sshd[30837]: input_userauth_request: invalid user root [preauth]
Jan  3 21:21:10 host unix_chkpwd[30840]: password check failed for user (root)
Jan  3 21:21:10 host sshd[30837]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53  user=root
Jan  3 21:21:10 host sshd[30837]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 21:21:12 host sshd[30837]: Failed password for invalid user root from 106.10.122.53 port 44688 ssh2
Jan  3 21:21:12 host sshd[30837]: Connection closed by 106.10.122.53 port 44688 [preauth]
Jan  3 21:21:15 host sshd[30849]: Invalid user admin from 128.199.211.118 port 48166
Jan  3 21:21:15 host sshd[30849]: input_userauth_request: invalid user admin [preauth]
Jan  3 21:21:15 host sshd[30849]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 21:21:15 host sshd[30849]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.211.118
Jan  3 21:21:16 host sshd[30849]: Failed password for invalid user admin from 128.199.211.118 port 48166 ssh2
Jan  3 21:21:16 host sshd[30849]: Received disconnect from 128.199.211.118 port 48166:11: Bye Bye [preauth]
Jan  3 21:21:16 host sshd[30849]: Disconnected from 128.199.211.118 port 48166 [preauth]
Jan  3 21:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  3 21:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 21:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 21:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  3 21:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 21:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 21:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  3 21:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 21:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 21:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  3 21:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 21:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 21:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  3 21:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 21:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 21:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  3 21:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 21:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 21:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  3 21:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 21:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 21:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  3 21:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 21:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 21:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  3 21:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 21:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 21:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  3 21:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 21:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 21:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  3 21:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 21:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 21:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  3 21:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 21:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 21:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  3 21:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 21:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 21:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=kottayamcalldriv user-2=phmetals user-3=gifterman user-4=palco123 user-5=wwwnexidigital user-6=mrsclean user-7=wwwevmhonda user-8=bonifacegroup user-9=wwwletsstalkfood user-10=straightcurve user-11=wwwtestugo user-12=shalinijames user-13=vfmassets user-14=pmcresources user-15=remysagr user-16=disposeat user-17=wwwkmaorg user-18=wwwkapin user-19=woodpeck user-20=travelboniface user-21=ugotscom user-22=wwwrmswll user-23=keralaholi user-24=wwwresourcehunte user-25=wwwpmcresource user-26=dartsimp user-27=a2zgroup user-28=laundryboniface user-29=wwwkaretakers user-30=cochintaxi feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  3 21:21:56 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  3 21:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 21:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 21:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  3 21:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 21:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 21:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Wuh98KJ8rOmb3onn.~
Jan  3 21:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 21:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 21:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Wuh98KJ8rOmb3onn.~'
Jan  3 21:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 21:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 21:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Wuh98KJ8rOmb3onn.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  3 21:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 21:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 21:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  3 21:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 21:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 21:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  3 21:21:57 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 21:21:57 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 21:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  3 21:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 21:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 21:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  3 21:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 21:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 21:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  3 21:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 21:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 21:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  3 21:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 21:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 21:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  3 21:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 21:21:59 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 21:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  3 21:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  3 21:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  3 21:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  3 21:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  3 21:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  3 21:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  3 21:22:02 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  3 21:22:03 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  3 21:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  3 21:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 21:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 21:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  3 21:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 21:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 21:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  3 21:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 21:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 21:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  3 21:22:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 21:22:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 21:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  3 21:22:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 21:22:10 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 21:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  3 21:22:11 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  3 21:22:12 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  3 21:23:17 host sshd[31375]: Invalid user ceph from 210.183.64.254 port 48584
Jan  3 21:23:17 host sshd[31375]: input_userauth_request: invalid user ceph [preauth]
Jan  3 21:23:17 host sshd[31375]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 21:23:17 host sshd[31375]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.183.64.254
Jan  3 21:23:19 host sshd[31375]: Failed password for invalid user ceph from 210.183.64.254 port 48584 ssh2
Jan  3 21:23:19 host sshd[31375]: Received disconnect from 210.183.64.254 port 48584:11: Bye Bye [preauth]
Jan  3 21:23:19 host sshd[31375]: Disconnected from 210.183.64.254 port 48584 [preauth]
Jan  3 21:24:23 host sshd[31492]: User root from 157.119.79.154 not allowed because not listed in AllowUsers
Jan  3 21:24:23 host sshd[31492]: input_userauth_request: invalid user root [preauth]
Jan  3 21:24:23 host unix_chkpwd[31497]: password check failed for user (root)
Jan  3 21:24:23 host sshd[31492]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.119.79.154  user=root
Jan  3 21:24:23 host sshd[31492]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 21:24:25 host sshd[31492]: Failed password for invalid user root from 157.119.79.154 port 58858 ssh2
Jan  3 21:24:25 host sshd[31492]: Received disconnect from 157.119.79.154 port 58858:11: Bye Bye [preauth]
Jan  3 21:24:25 host sshd[31492]: Disconnected from 157.119.79.154 port 58858 [preauth]
Jan  3 21:24:37 host sshd[31534]: Invalid user postgres from 210.183.64.254 port 38142
Jan  3 21:24:37 host sshd[31534]: input_userauth_request: invalid user postgres [preauth]
Jan  3 21:24:37 host sshd[31534]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 21:24:37 host sshd[31534]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.183.64.254
Jan  3 21:24:39 host sshd[31534]: Failed password for invalid user postgres from 210.183.64.254 port 38142 ssh2
Jan  3 21:24:39 host sshd[31534]: Received disconnect from 210.183.64.254 port 38142:11: Bye Bye [preauth]
Jan  3 21:24:39 host sshd[31534]: Disconnected from 210.183.64.254 port 38142 [preauth]
Jan  3 21:24:59 host sshd[31564]: Invalid user cacti from 128.199.211.118 port 46180
Jan  3 21:24:59 host sshd[31564]: input_userauth_request: invalid user cacti [preauth]
Jan  3 21:24:59 host sshd[31564]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 21:24:59 host sshd[31564]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.211.118
Jan  3 21:25:01 host sshd[31564]: Failed password for invalid user cacti from 128.199.211.118 port 46180 ssh2
Jan  3 21:25:01 host sshd[31564]: Received disconnect from 128.199.211.118 port 46180:11: Bye Bye [preauth]
Jan  3 21:25:01 host sshd[31564]: Disconnected from 128.199.211.118 port 46180 [preauth]
Jan  3 21:25:45 host sshd[31656]: User root from 210.183.64.254 not allowed because not listed in AllowUsers
Jan  3 21:25:45 host sshd[31656]: input_userauth_request: invalid user root [preauth]
Jan  3 21:25:45 host unix_chkpwd[31659]: password check failed for user (root)
Jan  3 21:25:45 host sshd[31656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.183.64.254  user=root
Jan  3 21:25:45 host sshd[31656]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 21:25:46 host sshd[31656]: Failed password for invalid user root from 210.183.64.254 port 12852 ssh2
Jan  3 21:25:46 host sshd[31656]: Received disconnect from 210.183.64.254 port 12852:11: Bye Bye [preauth]
Jan  3 21:25:46 host sshd[31656]: Disconnected from 210.183.64.254 port 12852 [preauth]
Jan  3 21:26:19 host sshd[31746]: User tomcat from 157.119.79.154 not allowed because not listed in AllowUsers
Jan  3 21:26:19 host sshd[31746]: input_userauth_request: invalid user tomcat [preauth]
Jan  3 21:26:19 host unix_chkpwd[31748]: password check failed for user (tomcat)
Jan  3 21:26:19 host sshd[31746]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.119.79.154  user=tomcat
Jan  3 21:26:19 host sshd[31746]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "tomcat"
Jan  3 21:26:20 host sshd[31750]: User root from 128.199.211.118 not allowed because not listed in AllowUsers
Jan  3 21:26:20 host sshd[31750]: input_userauth_request: invalid user root [preauth]
Jan  3 21:26:20 host unix_chkpwd[31752]: password check failed for user (root)
Jan  3 21:26:20 host sshd[31750]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.211.118  user=root
Jan  3 21:26:20 host sshd[31750]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 21:26:21 host sshd[31746]: Failed password for invalid user tomcat from 157.119.79.154 port 53522 ssh2
Jan  3 21:26:21 host sshd[31746]: Received disconnect from 157.119.79.154 port 53522:11: Bye Bye [preauth]
Jan  3 21:26:21 host sshd[31746]: Disconnected from 157.119.79.154 port 53522 [preauth]
Jan  3 21:26:22 host sshd[31750]: Failed password for invalid user root from 128.199.211.118 port 56738 ssh2
Jan  3 21:26:22 host sshd[31750]: Received disconnect from 128.199.211.118 port 56738:11: Bye Bye [preauth]
Jan  3 21:26:22 host sshd[31750]: Disconnected from 128.199.211.118 port 56738 [preauth]
Jan  3 21:27:00 host sshd[31880]: Invalid user asdf from 213.238.177.115 port 54244
Jan  3 21:27:00 host sshd[31880]: input_userauth_request: invalid user asdf [preauth]
Jan  3 21:27:00 host sshd[31880]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 21:27:00 host sshd[31880]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.238.177.115
Jan  3 21:27:03 host sshd[31880]: Failed password for invalid user asdf from 213.238.177.115 port 54244 ssh2
Jan  3 21:27:03 host sshd[31880]: Received disconnect from 213.238.177.115 port 54244:11: Bye Bye [preauth]
Jan  3 21:27:03 host sshd[31880]: Disconnected from 213.238.177.115 port 54244 [preauth]
Jan  3 21:28:16 host sshd[32016]: User root from 213.238.177.115 not allowed because not listed in AllowUsers
Jan  3 21:28:16 host sshd[32016]: input_userauth_request: invalid user root [preauth]
Jan  3 21:28:17 host unix_chkpwd[32020]: password check failed for user (root)
Jan  3 21:28:17 host sshd[32016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.238.177.115  user=root
Jan  3 21:28:17 host sshd[32016]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 21:28:19 host sshd[32016]: Failed password for invalid user root from 213.238.177.115 port 52288 ssh2
Jan  3 21:44:10 host sshd[2037]: User root from 177.229.134.50 not allowed because not listed in AllowUsers
Jan  3 21:44:10 host sshd[2037]: input_userauth_request: invalid user root [preauth]
Jan  3 21:44:10 host unix_chkpwd[2043]: password check failed for user (root)
Jan  3 21:44:10 host sshd[2037]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.229.134.50  user=root
Jan  3 21:44:10 host sshd[2037]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 21:44:13 host sshd[2037]: Failed password for invalid user root from 177.229.134.50 port 56599 ssh2
Jan  3 21:44:13 host sshd[2037]: Received disconnect from 177.229.134.50 port 56599:11: Bye Bye [preauth]
Jan  3 21:44:13 host sshd[2037]: Disconnected from 177.229.134.50 port 56599 [preauth]
Jan  3 21:46:47 host sshd[2446]: Invalid user temp from 177.229.134.50 port 2633
Jan  3 21:46:47 host sshd[2446]: input_userauth_request: invalid user temp [preauth]
Jan  3 21:46:47 host sshd[2446]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 21:46:47 host sshd[2446]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.229.134.50
Jan  3 21:46:49 host sshd[2446]: Failed password for invalid user temp from 177.229.134.50 port 2633 ssh2
Jan  3 21:46:49 host sshd[2446]: Received disconnect from 177.229.134.50 port 2633:11: Bye Bye [preauth]
Jan  3 21:46:49 host sshd[2446]: Disconnected from 177.229.134.50 port 2633 [preauth]
Jan  3 22:10:36 host sshd[6680]: User root from 92.46.108.20 not allowed because not listed in AllowUsers
Jan  3 22:10:36 host sshd[6680]: input_userauth_request: invalid user root [preauth]
Jan  3 22:10:37 host unix_chkpwd[6684]: password check failed for user (root)
Jan  3 22:10:37 host sshd[6680]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20  user=root
Jan  3 22:10:37 host sshd[6680]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 22:10:39 host sshd[6680]: Failed password for invalid user root from 92.46.108.20 port 42572 ssh2
Jan  3 22:10:39 host sshd[6680]: Connection closed by 92.46.108.20 port 42572 [preauth]
Jan  3 22:15:40 host sshd[7422]: Invalid user oracle from 103.13.40.2 port 34402
Jan  3 22:15:40 host sshd[7422]: input_userauth_request: invalid user oracle [preauth]
Jan  3 22:15:40 host sshd[7422]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 22:15:40 host sshd[7422]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2
Jan  3 22:15:42 host sshd[7422]: Failed password for invalid user oracle from 103.13.40.2 port 34402 ssh2
Jan  3 22:15:42 host sshd[7422]: Connection closed by 103.13.40.2 port 34402 [preauth]
Jan  3 22:20:37 host sshd[8154]: Invalid user jiadayu from 162.218.126.136 port 52272
Jan  3 22:20:37 host sshd[8154]: input_userauth_request: invalid user jiadayu [preauth]
Jan  3 22:20:37 host sshd[8154]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 22:20:37 host sshd[8154]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136
Jan  3 22:20:39 host sshd[8154]: Failed password for invalid user jiadayu from 162.218.126.136 port 52272 ssh2
Jan  3 22:20:40 host sshd[8154]: Connection closed by 162.218.126.136 port 52272 [preauth]
Jan  3 22:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  3 22:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 22:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 22:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  3 22:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 22:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 22:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  3 22:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 22:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 22:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  3 22:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 22:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 22:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  3 22:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 22:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 22:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  3 22:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 22:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 22:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  3 22:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 22:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 22:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  3 22:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 22:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 22:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  3 22:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 22:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 22:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  3 22:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 22:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 22:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  3 22:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 22:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 22:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  3 22:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 22:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 22:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  3 22:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 22:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 22:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=dartsimp user-2=a2zgroup user-3=laundryboniface user-4=cochintaxi user-5=wwwkaretakers user-6=travelboniface user-7=ugotscom user-8=wwwrmswll user-9=keralaholi user-10=wwwresourcehunte user-11=wwwpmcresource user-12=wwwtestugo user-13=shalinijames user-14=vfmassets user-15=pmcresources user-16=disposeat user-17=remysagr user-18=wwwkmaorg user-19=woodpeck user-20=wwwkapin user-21=kottayamcalldriv user-22=phmetals user-23=gifterman user-24=palco123 user-25=mrsclean user-26=wwwnexidigital user-27=wwwevmhonda user-28=bonifacegroup user-29=wwwletsstalkfood user-30=straightcurve feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  3 22:21:51 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  3 22:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 22:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 22:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  3 22:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 22:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 22:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-XyddPPd6447DapWV.~
Jan  3 22:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 22:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 22:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-XyddPPd6447DapWV.~'
Jan  3 22:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 22:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 22:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-XyddPPd6447DapWV.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  3 22:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 22:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 22:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  3 22:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 22:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 22:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  3 22:21:52 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 22:21:52 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 22:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  3 22:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 22:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 22:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  3 22:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 22:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 22:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  3 22:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 22:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 22:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  3 22:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 22:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 22:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  3 22:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 22:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 22:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  3 22:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  3 22:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  3 22:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  3 22:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  3 22:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  3 22:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  3 22:21:57 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  3 22:21:59 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  3 22:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  3 22:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 22:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 22:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  3 22:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 22:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 22:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  3 22:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 22:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 22:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  3 22:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 22:22:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 22:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  3 22:22:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 22:22:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 22:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  3 22:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  3 22:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  3 22:34:40 host sshd[11138]: Invalid user user from 41.197.31.178 port 58642
Jan  3 22:34:40 host sshd[11138]: input_userauth_request: invalid user user [preauth]
Jan  3 22:34:40 host sshd[11138]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 22:34:40 host sshd[11138]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178
Jan  3 22:34:42 host sshd[11138]: Failed password for invalid user user from 41.197.31.178 port 58642 ssh2
Jan  3 22:34:43 host sshd[11138]: Connection closed by 41.197.31.178 port 58642 [preauth]
Jan  3 22:41:07 host sshd[12038]: User centos from 106.10.122.53 not allowed because not listed in AllowUsers
Jan  3 22:41:07 host sshd[12038]: input_userauth_request: invalid user centos [preauth]
Jan  3 22:41:07 host unix_chkpwd[12041]: password check failed for user (centos)
Jan  3 22:41:07 host sshd[12038]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53  user=centos
Jan  3 22:41:10 host sshd[12038]: Failed password for invalid user centos from 106.10.122.53 port 36548 ssh2
Jan  3 22:41:10 host sshd[12038]: Connection closed by 106.10.122.53 port 36548 [preauth]
Jan  3 22:50:19 host sshd[13360]: Invalid user test123 from 116.203.235.145 port 34066
Jan  3 22:50:19 host sshd[13360]: input_userauth_request: invalid user test123 [preauth]
Jan  3 22:50:19 host sshd[13360]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 22:50:19 host sshd[13360]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.203.235.145
Jan  3 22:50:21 host sshd[13360]: Failed password for invalid user test123 from 116.203.235.145 port 34066 ssh2
Jan  3 22:50:21 host sshd[13360]: Received disconnect from 116.203.235.145 port 34066:11: Bye Bye [preauth]
Jan  3 22:50:21 host sshd[13360]: Disconnected from 116.203.235.145 port 34066 [preauth]
Jan  3 22:53:38 host sshd[13779]: Invalid user pi from 82.64.186.234 port 37516
Jan  3 22:53:38 host sshd[13779]: input_userauth_request: invalid user pi [preauth]
Jan  3 22:53:38 host sshd[13781]: Invalid user pi from 82.64.186.234 port 37530
Jan  3 22:53:38 host sshd[13781]: input_userauth_request: invalid user pi [preauth]
Jan  3 22:53:39 host sshd[13779]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 22:53:39 host sshd[13779]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.64.186.234
Jan  3 22:53:39 host sshd[13781]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 22:53:39 host sshd[13781]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.64.186.234
Jan  3 22:53:41 host sshd[13779]: Failed password for invalid user pi from 82.64.186.234 port 37516 ssh2
Jan  3 22:53:41 host sshd[13781]: Failed password for invalid user pi from 82.64.186.234 port 37530 ssh2
Jan  3 22:53:41 host sshd[13779]: Connection closed by 82.64.186.234 port 37516 [preauth]
Jan  3 22:53:41 host sshd[13781]: Connection closed by 82.64.186.234 port 37530 [preauth]
Jan  3 22:55:55 host sshd[14130]: User root from 116.203.235.145 not allowed because not listed in AllowUsers
Jan  3 22:55:55 host sshd[14130]: input_userauth_request: invalid user root [preauth]
Jan  3 22:55:55 host unix_chkpwd[14135]: password check failed for user (root)
Jan  3 22:55:55 host sshd[14130]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.203.235.145  user=root
Jan  3 22:55:55 host sshd[14130]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 22:55:58 host sshd[14130]: Failed password for invalid user root from 116.203.235.145 port 48320 ssh2
Jan  3 22:55:58 host sshd[14130]: Received disconnect from 116.203.235.145 port 48320:11: Bye Bye [preauth]
Jan  3 22:55:58 host sshd[14130]: Disconnected from 116.203.235.145 port 48320 [preauth]
Jan  3 23:01:17 host sshd[15052]: User root from 209.141.55.27 not allowed because not listed in AllowUsers
Jan  3 23:01:17 host sshd[15052]: input_userauth_request: invalid user root [preauth]
Jan  3 23:01:17 host unix_chkpwd[15056]: password check failed for user (root)
Jan  3 23:01:17 host sshd[15052]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.55.27  user=root
Jan  3 23:01:17 host sshd[15052]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 23:01:19 host sshd[15052]: Failed password for invalid user root from 209.141.55.27 port 37636 ssh2
Jan  3 23:01:19 host sshd[15052]: Received disconnect from 209.141.55.27 port 37636:11: Normal Shutdown, Thank you for playing [preauth]
Jan  3 23:01:19 host sshd[15052]: Disconnected from 209.141.55.27 port 37636 [preauth]
Jan  3 23:19:34 host sshd[17624]: Invalid user kodi from 188.235.137.135 port 47258
Jan  3 23:19:34 host sshd[17624]: input_userauth_request: invalid user kodi [preauth]
Jan  3 23:19:34 host sshd[17624]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 23:19:34 host sshd[17624]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.235.137.135
Jan  3 23:19:36 host sshd[17624]: Failed password for invalid user kodi from 188.235.137.135 port 47258 ssh2
Jan  3 23:19:36 host sshd[17624]: Received disconnect from 188.235.137.135 port 47258:11: Bye Bye [preauth]
Jan  3 23:19:36 host sshd[17624]: Disconnected from 188.235.137.135 port 47258 [preauth]
Jan  3 23:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  3 23:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 23:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 23:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  3 23:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 23:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 23:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  3 23:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 23:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 23:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  3 23:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 23:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 23:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  3 23:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 23:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 23:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  3 23:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 23:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 23:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  3 23:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 23:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 23:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  3 23:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 23:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 23:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  3 23:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 23:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 23:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  3 23:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 23:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 23:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  3 23:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 23:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 23:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  3 23:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 23:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 23:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  3 23:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 23:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 23:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=cochintaxi user-2=wwwkaretakers user-3=laundryboniface user-4=dartsimp user-5=a2zgroup user-6=wwwpmcresource user-7=ugotscom user-8=wwwrmswll user-9=keralaholi user-10=wwwresourcehunte user-11=travelboniface user-12=woodpeck user-13=wwwkapin user-14=disposeat user-15=remysagr user-16=wwwkmaorg user-17=pmcresources user-18=wwwtestugo user-19=shalinijames user-20=vfmassets user-21=straightcurve user-22=wwwletsstalkfood user-23=wwwevmhonda user-24=bonifacegroup user-25=mrsclean user-26=wwwnexidigital user-27=kottayamcalldriv user-28=phmetals user-29=gifterman user-30=palco123 feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  3 23:21:52 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  3 23:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 23:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 23:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  3 23:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 23:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 23:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-b89wBUJ2PHDxFwnB.~
Jan  3 23:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 23:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 23:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-b89wBUJ2PHDxFwnB.~'
Jan  3 23:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 23:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 23:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-b89wBUJ2PHDxFwnB.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  3 23:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 23:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 23:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  3 23:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 23:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 23:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  3 23:21:52 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 23:21:52 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 23:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  3 23:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 23:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 23:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  3 23:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 23:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 23:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  3 23:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 23:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 23:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  3 23:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 23:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 23:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  3 23:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  3 23:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  3 23:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  3 23:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  3 23:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  3 23:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  3 23:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  3 23:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  3 23:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  3 23:21:57 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  3 23:21:59 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  3 23:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  3 23:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 23:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 23:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  3 23:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 23:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 23:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  3 23:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  3 23:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  3 23:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  3 23:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 23:22:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 23:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  3 23:22:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  3 23:22:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  3 23:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  3 23:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  3 23:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  3 23:23:58 host sshd[18450]: Invalid user student01 from 162.218.126.136 port 57102
Jan  3 23:23:58 host sshd[18450]: input_userauth_request: invalid user student01 [preauth]
Jan  3 23:23:59 host sshd[18450]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 23:23:59 host sshd[18450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136
Jan  3 23:24:01 host sshd[18450]: Failed password for invalid user student01 from 162.218.126.136 port 57102 ssh2
Jan  3 23:24:01 host sshd[18450]: Connection closed by 162.218.126.136 port 57102 [preauth]
Jan  3 23:24:25 host sshd[18496]: User root from 188.235.137.135 not allowed because not listed in AllowUsers
Jan  3 23:24:25 host sshd[18496]: input_userauth_request: invalid user root [preauth]
Jan  3 23:24:25 host unix_chkpwd[18499]: password check failed for user (root)
Jan  3 23:24:25 host sshd[18496]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.235.137.135  user=root
Jan  3 23:24:25 host sshd[18496]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 23:24:27 host sshd[18496]: Failed password for invalid user root from 188.235.137.135 port 48090 ssh2
Jan  3 23:24:28 host sshd[18496]: Received disconnect from 188.235.137.135 port 48090:11: Bye Bye [preauth]
Jan  3 23:24:28 host sshd[18496]: Disconnected from 188.235.137.135 port 48090 [preauth]
Jan  3 23:34:32 host sshd[19938]: Invalid user team2 from 103.13.40.2 port 52564
Jan  3 23:34:32 host sshd[19938]: input_userauth_request: invalid user team2 [preauth]
Jan  3 23:34:32 host sshd[19938]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 23:34:32 host sshd[19938]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2
Jan  3 23:34:35 host sshd[19938]: Failed password for invalid user team2 from 103.13.40.2 port 52564 ssh2
Jan  3 23:34:35 host sshd[19938]: Connection closed by 103.13.40.2 port 52564 [preauth]
Jan  3 23:55:51 host sshd[22866]: Invalid user atualiza from 180.244.135.93 port 3142
Jan  3 23:55:51 host sshd[22866]: input_userauth_request: invalid user atualiza [preauth]
Jan  3 23:55:51 host sshd[22866]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 23:55:51 host sshd[22866]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.244.135.93
Jan  3 23:55:53 host sshd[22866]: Failed password for invalid user atualiza from 180.244.135.93 port 3142 ssh2
Jan  3 23:55:54 host sshd[22866]: Received disconnect from 180.244.135.93 port 3142:11: Bye Bye [preauth]
Jan  3 23:55:54 host sshd[22866]: Disconnected from 180.244.135.93 port 3142 [preauth]
Jan  3 23:56:12 host sshd[22930]: User mysql from 181.143.142.125 not allowed because not listed in AllowUsers
Jan  3 23:56:12 host sshd[22930]: input_userauth_request: invalid user mysql [preauth]
Jan  3 23:56:12 host unix_chkpwd[22934]: password check failed for user (mysql)
Jan  3 23:56:12 host sshd[22930]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.143.142.125  user=mysql
Jan  3 23:56:12 host sshd[22930]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "mysql"
Jan  3 23:56:14 host sshd[22930]: Failed password for invalid user mysql from 181.143.142.125 port 56995 ssh2
Jan  3 23:56:14 host sshd[22930]: Received disconnect from 181.143.142.125 port 56995:11: Bye Bye [preauth]
Jan  3 23:56:14 host sshd[22930]: Disconnected from 181.143.142.125 port 56995 [preauth]
Jan  3 23:56:31 host sshd[22996]: Invalid user admin from 137.184.35.68 port 37740
Jan  3 23:56:31 host sshd[22996]: input_userauth_request: invalid user admin [preauth]
Jan  3 23:56:31 host sshd[22996]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 23:56:31 host sshd[22996]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.35.68
Jan  3 23:56:33 host sshd[22996]: Failed password for invalid user admin from 137.184.35.68 port 37740 ssh2
Jan  3 23:56:34 host sshd[22996]: Received disconnect from 137.184.35.68 port 37740:11: Bye Bye [preauth]
Jan  3 23:56:34 host sshd[22996]: Disconnected from 137.184.35.68 port 37740 [preauth]
Jan  3 23:56:36 host sshd[23011]: Invalid user deploy from 185.221.239.3 port 38062
Jan  3 23:56:36 host sshd[23011]: input_userauth_request: invalid user deploy [preauth]
Jan  3 23:56:36 host sshd[23011]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 23:56:36 host sshd[23011]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.221.239.3
Jan  3 23:56:39 host sshd[23011]: Failed password for invalid user deploy from 185.221.239.3 port 38062 ssh2
Jan  3 23:56:39 host sshd[23011]: Received disconnect from 185.221.239.3 port 38062:11: Bye Bye [preauth]
Jan  3 23:56:39 host sshd[23011]: Disconnected from 185.221.239.3 port 38062 [preauth]
Jan  3 23:57:20 host sshd[23087]: User root from 200.108.143.6 not allowed because not listed in AllowUsers
Jan  3 23:57:20 host sshd[23087]: input_userauth_request: invalid user root [preauth]
Jan  3 23:57:20 host unix_chkpwd[23091]: password check failed for user (root)
Jan  3 23:57:20 host sshd[23087]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.108.143.6  user=root
Jan  3 23:57:20 host sshd[23087]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 23:57:23 host sshd[23087]: Failed password for invalid user root from 200.108.143.6 port 46776 ssh2
Jan  3 23:57:23 host sshd[23087]: Received disconnect from 200.108.143.6 port 46776:11: Bye Bye [preauth]
Jan  3 23:57:23 host sshd[23087]: Disconnected from 200.108.143.6 port 46776 [preauth]
Jan  3 23:57:41 host sshd[23146]: Invalid user deploy from 110.49.17.160 port 38456
Jan  3 23:57:41 host sshd[23146]: input_userauth_request: invalid user deploy [preauth]
Jan  3 23:57:41 host sshd[23146]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 23:57:41 host sshd[23146]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.49.17.160
Jan  3 23:57:42 host sshd[23146]: Failed password for invalid user deploy from 110.49.17.160 port 38456 ssh2
Jan  3 23:57:42 host sshd[23146]: Received disconnect from 110.49.17.160 port 38456:11: Bye Bye [preauth]
Jan  3 23:57:42 host sshd[23146]: Disconnected from 110.49.17.160 port 38456 [preauth]
Jan  3 23:57:51 host sshd[23171]: Invalid user daniela from 103.183.74.59 port 58688
Jan  3 23:57:51 host sshd[23171]: input_userauth_request: invalid user daniela [preauth]
Jan  3 23:57:51 host sshd[23171]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 23:57:51 host sshd[23171]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.183.74.59
Jan  3 23:57:53 host sshd[23171]: Failed password for invalid user daniela from 103.183.74.59 port 58688 ssh2
Jan  3 23:57:53 host sshd[23171]: Received disconnect from 103.183.74.59 port 58688:11: Bye Bye [preauth]
Jan  3 23:57:53 host sshd[23171]: Disconnected from 103.183.74.59 port 58688 [preauth]
Jan  3 23:58:30 host sshd[23266]: User root from 128.199.105.162 not allowed because not listed in AllowUsers
Jan  3 23:58:30 host sshd[23266]: input_userauth_request: invalid user root [preauth]
Jan  3 23:58:30 host unix_chkpwd[23268]: password check failed for user (root)
Jan  3 23:58:30 host sshd[23266]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.105.162  user=root
Jan  3 23:58:30 host sshd[23266]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  3 23:58:32 host sshd[23266]: Failed password for invalid user root from 128.199.105.162 port 51944 ssh2
Jan  3 23:58:32 host sshd[23266]: Received disconnect from 128.199.105.162 port 51944:11: Bye Bye [preauth]
Jan  3 23:58:32 host sshd[23266]: Disconnected from 128.199.105.162 port 51944 [preauth]
Jan  3 23:59:04 host sshd[23420]: User mysql from 45.55.38.62 not allowed because not listed in AllowUsers
Jan  3 23:59:04 host sshd[23420]: input_userauth_request: invalid user mysql [preauth]
Jan  3 23:59:04 host unix_chkpwd[23424]: password check failed for user (mysql)
Jan  3 23:59:04 host sshd[23420]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.38.62  user=mysql
Jan  3 23:59:04 host sshd[23420]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "mysql"
Jan  3 23:59:06 host sshd[23420]: Failed password for invalid user mysql from 45.55.38.62 port 44792 ssh2
Jan  3 23:59:06 host sshd[23420]: Received disconnect from 45.55.38.62 port 44792:11: Bye Bye [preauth]
Jan  3 23:59:06 host sshd[23420]: Disconnected from 45.55.38.62 port 44792 [preauth]
Jan  3 23:59:59 host sshd[23508]: Invalid user website from 161.132.219.115 port 43072
Jan  3 23:59:59 host sshd[23508]: input_userauth_request: invalid user website [preauth]
Jan  3 23:59:59 host sshd[23508]: pam_unix(sshd:auth): check pass; user unknown
Jan  3 23:59:59 host sshd[23508]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.132.219.115
Jan  4 00:00:01 host sshd[23508]: Failed password for invalid user website from 161.132.219.115 port 43072 ssh2
Jan  4 00:00:01 host sshd[23508]: Received disconnect from 161.132.219.115 port 43072:11: Bye Bye [preauth]
Jan  4 00:00:01 host sshd[23508]: Disconnected from 161.132.219.115 port 43072 [preauth]
Jan  4 00:00:31 host sshd[23645]: Invalid user cyrus from 200.108.143.6 port 44360
Jan  4 00:00:31 host sshd[23645]: input_userauth_request: invalid user cyrus [preauth]
Jan  4 00:00:31 host sshd[23645]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 00:00:31 host sshd[23645]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.108.143.6
Jan  4 00:00:33 host sshd[23645]: Failed password for invalid user cyrus from 200.108.143.6 port 44360 ssh2
Jan  4 00:00:34 host sshd[23645]: Received disconnect from 200.108.143.6 port 44360:11: Bye Bye [preauth]
Jan  4 00:00:34 host sshd[23645]: Disconnected from 200.108.143.6 port 44360 [preauth]
Jan  4 00:00:54 host sshd[23677]: Invalid user user from 106.10.122.53 port 42826
Jan  4 00:00:54 host sshd[23677]: input_userauth_request: invalid user user [preauth]
Jan  4 00:00:54 host sshd[23677]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 00:00:54 host sshd[23677]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53
Jan  4 00:00:56 host sshd[23677]: Failed password for invalid user user from 106.10.122.53 port 42826 ssh2
Jan  4 00:00:56 host sshd[23677]: Connection closed by 106.10.122.53 port 42826 [preauth]
Jan  4 00:01:28 host sshd[23777]: Invalid user website from 180.244.135.93 port 11628
Jan  4 00:01:28 host sshd[23777]: input_userauth_request: invalid user website [preauth]
Jan  4 00:01:28 host sshd[23777]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 00:01:28 host sshd[23777]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.244.135.93
Jan  4 00:01:30 host sshd[23777]: Failed password for invalid user website from 180.244.135.93 port 11628 ssh2
Jan  4 00:01:30 host sshd[23777]: Received disconnect from 180.244.135.93 port 11628:11: Bye Bye [preauth]
Jan  4 00:01:30 host sshd[23777]: Disconnected from 180.244.135.93 port 11628 [preauth]
Jan  4 00:01:32 host sshd[23784]: Invalid user ubuntu from 128.199.105.162 port 50828
Jan  4 00:01:32 host sshd[23784]: input_userauth_request: invalid user ubuntu [preauth]
Jan  4 00:01:32 host sshd[23784]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 00:01:32 host sshd[23784]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.105.162
Jan  4 00:01:32 host sshd[23782]: Invalid user rr from 185.221.239.3 port 53934
Jan  4 00:01:32 host sshd[23782]: input_userauth_request: invalid user rr [preauth]
Jan  4 00:01:32 host sshd[23782]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 00:01:32 host sshd[23782]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.221.239.3
Jan  4 00:01:34 host sshd[23784]: Failed password for invalid user ubuntu from 128.199.105.162 port 50828 ssh2
Jan  4 00:01:34 host sshd[23784]: Received disconnect from 128.199.105.162 port 50828:11: Bye Bye [preauth]
Jan  4 00:01:34 host sshd[23784]: Disconnected from 128.199.105.162 port 50828 [preauth]
Jan  4 00:01:34 host sshd[23782]: Failed password for invalid user rr from 185.221.239.3 port 53934 ssh2
Jan  4 00:01:34 host sshd[23782]: Received disconnect from 185.221.239.3 port 53934:11: Bye Bye [preauth]
Jan  4 00:01:34 host sshd[23782]: Disconnected from 185.221.239.3 port 53934 [preauth]
Jan  4 00:02:08 host sshd[23839]: Invalid user sig from 200.108.143.6 port 58604
Jan  4 00:02:08 host sshd[23839]: input_userauth_request: invalid user sig [preauth]
Jan  4 00:02:08 host sshd[23839]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 00:02:08 host sshd[23839]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.108.143.6
Jan  4 00:02:10 host sshd[23839]: Failed password for invalid user sig from 200.108.143.6 port 58604 ssh2
Jan  4 00:02:11 host sshd[23839]: Received disconnect from 200.108.143.6 port 58604:11: Bye Bye [preauth]
Jan  4 00:02:11 host sshd[23839]: Disconnected from 200.108.143.6 port 58604 [preauth]
Jan  4 00:02:24 host sshd[23874]: User root from 110.49.17.160 not allowed because not listed in AllowUsers
Jan  4 00:02:24 host sshd[23874]: input_userauth_request: invalid user root [preauth]
Jan  4 00:02:24 host unix_chkpwd[23877]: password check failed for user (root)
Jan  4 00:02:24 host sshd[23874]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.49.17.160  user=root
Jan  4 00:02:24 host sshd[23874]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 00:02:26 host sshd[23874]: Failed password for invalid user root from 110.49.17.160 port 50244 ssh2
Jan  4 00:02:26 host sshd[23874]: Received disconnect from 110.49.17.160 port 50244:11: Bye Bye [preauth]
Jan  4 00:02:26 host sshd[23874]: Disconnected from 110.49.17.160 port 50244 [preauth]
Jan  4 00:02:29 host sshd[23902]: Invalid user kafka from 67.205.187.133 port 50554
Jan  4 00:02:29 host sshd[23902]: input_userauth_request: invalid user kafka [preauth]
Jan  4 00:02:29 host sshd[23902]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 00:02:29 host sshd[23902]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.205.187.133
Jan  4 00:02:32 host sshd[23902]: Failed password for invalid user kafka from 67.205.187.133 port 50554 ssh2
Jan  4 00:02:32 host sshd[23902]: Received disconnect from 67.205.187.133 port 50554:11: Bye Bye [preauth]
Jan  4 00:02:32 host sshd[23902]: Disconnected from 67.205.187.133 port 50554 [preauth]
Jan  4 00:02:33 host sshd[23910]: User root from 161.132.219.115 not allowed because not listed in AllowUsers
Jan  4 00:02:33 host sshd[23910]: input_userauth_request: invalid user root [preauth]
Jan  4 00:02:33 host unix_chkpwd[23914]: password check failed for user (root)
Jan  4 00:02:33 host sshd[23910]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.132.219.115  user=root
Jan  4 00:02:33 host sshd[23910]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 00:02:35 host sshd[23910]: Failed password for invalid user root from 161.132.219.115 port 55440 ssh2
Jan  4 00:02:35 host sshd[23910]: Received disconnect from 161.132.219.115 port 55440:11: Bye Bye [preauth]
Jan  4 00:02:35 host sshd[23910]: Disconnected from 161.132.219.115 port 55440 [preauth]
Jan  4 00:02:42 host sshd[23924]: Invalid user ubuntu from 185.221.239.3 port 45860
Jan  4 00:02:42 host sshd[23924]: input_userauth_request: invalid user ubuntu [preauth]
Jan  4 00:02:42 host sshd[23924]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 00:02:42 host sshd[23924]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.221.239.3
Jan  4 00:02:44 host sshd[23924]: Failed password for invalid user ubuntu from 185.221.239.3 port 45860 ssh2
Jan  4 00:02:44 host sshd[23924]: Received disconnect from 185.221.239.3 port 45860:11: Bye Bye [preauth]
Jan  4 00:02:44 host sshd[23924]: Disconnected from 185.221.239.3 port 45860 [preauth]
Jan  4 00:02:48 host sshd[23937]: User root from 128.199.105.162 not allowed because not listed in AllowUsers
Jan  4 00:02:48 host sshd[23937]: input_userauth_request: invalid user root [preauth]
Jan  4 00:02:48 host unix_chkpwd[23940]: password check failed for user (root)
Jan  4 00:02:48 host sshd[23937]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.105.162  user=root
Jan  4 00:02:48 host sshd[23937]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 00:02:50 host sshd[23937]: Failed password for invalid user root from 128.199.105.162 port 46254 ssh2
Jan  4 00:02:50 host sshd[23937]: Received disconnect from 128.199.105.162 port 46254:11: Bye Bye [preauth]
Jan  4 00:02:50 host sshd[23937]: Disconnected from 128.199.105.162 port 46254 [preauth]
Jan  4 00:03:05 host sshd[24004]: Invalid user amax from 41.197.31.178 port 37744
Jan  4 00:03:05 host sshd[24004]: input_userauth_request: invalid user amax [preauth]
Jan  4 00:03:05 host sshd[24004]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 00:03:05 host sshd[24004]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178
Jan  4 00:03:07 host sshd[24004]: Failed password for invalid user amax from 41.197.31.178 port 37744 ssh2
Jan  4 00:03:07 host sshd[24004]: Connection closed by 41.197.31.178 port 37744 [preauth]
Jan  4 00:03:08 host sshd[24011]: Invalid user miao from 153.127.69.219 port 42530
Jan  4 00:03:08 host sshd[24011]: input_userauth_request: invalid user miao [preauth]
Jan  4 00:03:08 host sshd[24011]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 00:03:08 host sshd[24011]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.127.69.219
Jan  4 00:03:11 host sshd[24011]: Failed password for invalid user miao from 153.127.69.219 port 42530 ssh2
Jan  4 00:03:11 host sshd[24011]: Received disconnect from 153.127.69.219 port 42530:11: Bye Bye [preauth]
Jan  4 00:03:11 host sshd[24011]: Disconnected from 153.127.69.219 port 42530 [preauth]
Jan  4 00:03:35 host sshd[24073]: User root from 180.244.135.93 not allowed because not listed in AllowUsers
Jan  4 00:03:35 host sshd[24073]: input_userauth_request: invalid user root [preauth]
Jan  4 00:03:35 host unix_chkpwd[24075]: password check failed for user (root)
Jan  4 00:03:35 host sshd[24073]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.244.135.93  user=root
Jan  4 00:03:35 host sshd[24073]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 00:03:37 host sshd[24073]: Failed password for invalid user root from 180.244.135.93 port 5875 ssh2
Jan  4 00:03:37 host sshd[24073]: Received disconnect from 180.244.135.93 port 5875:11: Bye Bye [preauth]
Jan  4 00:03:37 host sshd[24073]: Disconnected from 180.244.135.93 port 5875 [preauth]
Jan  4 00:03:43 host sshd[24112]: User root from 200.108.143.6 not allowed because not listed in AllowUsers
Jan  4 00:03:43 host sshd[24112]: input_userauth_request: invalid user root [preauth]
Jan  4 00:03:43 host unix_chkpwd[24117]: password check failed for user (root)
Jan  4 00:03:43 host sshd[24112]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.108.143.6  user=root
Jan  4 00:03:43 host sshd[24112]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 00:03:45 host sshd[24112]: Failed password for invalid user root from 200.108.143.6 port 36970 ssh2
Jan  4 00:03:51 host sshd[24161]: User root from 110.49.17.160 not allowed because not listed in AllowUsers
Jan  4 00:03:51 host sshd[24161]: input_userauth_request: invalid user root [preauth]
Jan  4 00:03:51 host unix_chkpwd[24163]: password check failed for user (root)
Jan  4 00:03:51 host sshd[24161]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.49.17.160  user=root
Jan  4 00:03:51 host sshd[24161]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 00:03:53 host sshd[24161]: Failed password for invalid user root from 110.49.17.160 port 42842 ssh2
Jan  4 00:03:53 host sshd[24161]: Received disconnect from 110.49.17.160 port 42842:11: Bye Bye [preauth]
Jan  4 00:03:53 host sshd[24161]: Disconnected from 110.49.17.160 port 42842 [preauth]
Jan  4 00:03:54 host sshd[24166]: Invalid user website from 185.221.239.3 port 37784
Jan  4 00:03:54 host sshd[24166]: input_userauth_request: invalid user website [preauth]
Jan  4 00:03:54 host sshd[24166]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 00:03:54 host sshd[24166]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.221.239.3
Jan  4 00:03:54 host sshd[24168]: User root from 161.132.219.115 not allowed because not listed in AllowUsers
Jan  4 00:03:54 host sshd[24168]: input_userauth_request: invalid user root [preauth]
Jan  4 00:03:54 host unix_chkpwd[24202]: password check failed for user (root)
Jan  4 00:03:54 host sshd[24168]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.132.219.115  user=root
Jan  4 00:03:54 host sshd[24168]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 00:03:56 host sshd[24166]: Failed password for invalid user website from 185.221.239.3 port 37784 ssh2
Jan  4 00:03:56 host sshd[24166]: Received disconnect from 185.221.239.3 port 37784:11: Bye Bye [preauth]
Jan  4 00:03:56 host sshd[24166]: Disconnected from 185.221.239.3 port 37784 [preauth]
Jan  4 00:03:56 host sshd[24168]: Failed password for invalid user root from 161.132.219.115 port 41146 ssh2
Jan  4 00:03:57 host sshd[24168]: Received disconnect from 161.132.219.115 port 41146:11: Bye Bye [preauth]
Jan  4 00:03:57 host sshd[24168]: Disconnected from 161.132.219.115 port 41146 [preauth]
Jan  4 00:04:56 host sshd[24497]: Invalid user admin from 187.189.8.18 port 21986
Jan  4 00:04:56 host sshd[24497]: input_userauth_request: invalid user admin [preauth]
Jan  4 00:04:56 host sshd[24497]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 00:04:56 host sshd[24497]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.189.8.18
Jan  4 00:04:59 host sshd[24497]: Failed password for invalid user admin from 187.189.8.18 port 21986 ssh2
Jan  4 00:04:59 host sshd[24497]: Received disconnect from 187.189.8.18 port 21986:11: Bye Bye [preauth]
Jan  4 00:04:59 host sshd[24497]: Disconnected from 187.189.8.18 port 21986 [preauth]
Jan  4 00:05:55 host sshd[24635]: Invalid user iptv from 196.179.231.103 port 39332
Jan  4 00:05:55 host sshd[24635]: input_userauth_request: invalid user iptv [preauth]
Jan  4 00:05:55 host sshd[24635]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 00:05:55 host sshd[24635]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.179.231.103
Jan  4 00:05:57 host sshd[24635]: Failed password for invalid user iptv from 196.179.231.103 port 39332 ssh2
Jan  4 00:05:57 host sshd[24635]: Received disconnect from 196.179.231.103 port 39332:11: Bye Bye [preauth]
Jan  4 00:05:57 host sshd[24635]: Disconnected from 196.179.231.103 port 39332 [preauth]
Jan  4 00:07:06 host sshd[24756]: User root from 67.205.187.133 not allowed because not listed in AllowUsers
Jan  4 00:07:06 host sshd[24756]: input_userauth_request: invalid user root [preauth]
Jan  4 00:07:06 host unix_chkpwd[24759]: password check failed for user (root)
Jan  4 00:07:06 host sshd[24756]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.205.187.133  user=root
Jan  4 00:07:06 host sshd[24756]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 00:07:08 host sshd[24756]: Failed password for invalid user root from 67.205.187.133 port 46518 ssh2
Jan  4 00:07:09 host sshd[24756]: Received disconnect from 67.205.187.133 port 46518:11: Bye Bye [preauth]
Jan  4 00:07:09 host sshd[24756]: Disconnected from 67.205.187.133 port 46518 [preauth]
Jan  4 00:07:14 host sshd[24773]: Invalid user kafka from 69.49.235.162 port 34518
Jan  4 00:07:14 host sshd[24773]: input_userauth_request: invalid user kafka [preauth]
Jan  4 00:07:14 host sshd[24773]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 00:07:14 host sshd[24773]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.49.235.162
Jan  4 00:07:15 host sshd[24803]: User root from 181.143.142.125 not allowed because not listed in AllowUsers
Jan  4 00:07:15 host sshd[24803]: input_userauth_request: invalid user root [preauth]
Jan  4 00:07:16 host unix_chkpwd[24811]: password check failed for user (root)
Jan  4 00:07:16 host sshd[24803]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.143.142.125  user=root
Jan  4 00:07:16 host sshd[24803]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 00:07:17 host sshd[24773]: Failed password for invalid user kafka from 69.49.235.162 port 34518 ssh2
Jan  4 00:07:17 host sshd[24803]: Failed password for invalid user root from 181.143.142.125 port 33441 ssh2
Jan  4 00:07:17 host sshd[24773]: Received disconnect from 69.49.235.162 port 34518:11: Bye Bye [preauth]
Jan  4 00:07:17 host sshd[24773]: Disconnected from 69.49.235.162 port 34518 [preauth]
Jan  4 00:07:17 host sshd[24803]: Received disconnect from 181.143.142.125 port 33441:11: Bye Bye [preauth]
Jan  4 00:07:17 host sshd[24803]: Disconnected from 181.143.142.125 port 33441 [preauth]
Jan  4 00:07:33 host sshd[24854]: Invalid user jan from 153.127.69.219 port 34302
Jan  4 00:07:33 host sshd[24854]: input_userauth_request: invalid user jan [preauth]
Jan  4 00:07:33 host sshd[24854]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 00:07:33 host sshd[24854]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.127.69.219
Jan  4 00:07:35 host sshd[24854]: Failed password for invalid user jan from 153.127.69.219 port 34302 ssh2
Jan  4 00:07:35 host sshd[24854]: Received disconnect from 153.127.69.219 port 34302:11: Bye Bye [preauth]
Jan  4 00:07:35 host sshd[24854]: Disconnected from 153.127.69.219 port 34302 [preauth]
Jan  4 00:08:38 host sshd[24968]: Invalid user ubuntu from 196.179.231.103 port 45134
Jan  4 00:08:38 host sshd[24968]: input_userauth_request: invalid user ubuntu [preauth]
Jan  4 00:08:38 host sshd[24968]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 00:08:38 host sshd[24968]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.179.231.103
Jan  4 00:08:40 host sshd[24968]: Failed password for invalid user ubuntu from 196.179.231.103 port 45134 ssh2
Jan  4 00:08:40 host sshd[24968]: Received disconnect from 196.179.231.103 port 45134:11: Bye Bye [preauth]
Jan  4 00:08:40 host sshd[24968]: Disconnected from 196.179.231.103 port 45134 [preauth]
Jan  4 00:09:01 host sshd[24992]: Invalid user gb from 153.127.69.219 port 34496
Jan  4 00:09:01 host sshd[24992]: input_userauth_request: invalid user gb [preauth]
Jan  4 00:09:01 host sshd[24992]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 00:09:01 host sshd[24992]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.127.69.219
Jan  4 00:09:03 host sshd[24992]: Failed password for invalid user gb from 153.127.69.219 port 34496 ssh2
Jan  4 00:09:03 host sshd[24992]: Received disconnect from 153.127.69.219 port 34496:11: Bye Bye [preauth]
Jan  4 00:09:03 host sshd[24992]: Disconnected from 153.127.69.219 port 34496 [preauth]
Jan  4 00:09:23 host sshd[25178]: User root from 69.49.235.162 not allowed because not listed in AllowUsers
Jan  4 00:09:23 host sshd[25178]: input_userauth_request: invalid user root [preauth]
Jan  4 00:09:23 host unix_chkpwd[25181]: password check failed for user (root)
Jan  4 00:09:23 host sshd[25178]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.49.235.162  user=root
Jan  4 00:09:23 host sshd[25178]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 00:09:25 host sshd[25178]: Failed password for invalid user root from 69.49.235.162 port 34380 ssh2
Jan  4 00:09:25 host sshd[25178]: Received disconnect from 69.49.235.162 port 34380:11: Bye Bye [preauth]
Jan  4 00:09:25 host sshd[25178]: Disconnected from 69.49.235.162 port 34380 [preauth]
Jan  4 00:09:48 host sshd[25278]: Invalid user rr from 181.143.142.125 port 23553
Jan  4 00:09:48 host sshd[25278]: input_userauth_request: invalid user rr [preauth]
Jan  4 00:09:48 host sshd[25278]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 00:09:48 host sshd[25278]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.143.142.125
Jan  4 00:09:49 host sshd[25278]: Failed password for invalid user rr from 181.143.142.125 port 23553 ssh2
Jan  4 00:09:49 host sshd[25283]: Invalid user lulu from 196.179.231.103 port 41174
Jan  4 00:09:49 host sshd[25283]: input_userauth_request: invalid user lulu [preauth]
Jan  4 00:09:49 host sshd[25283]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 00:09:49 host sshd[25283]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.179.231.103
Jan  4 00:09:50 host sshd[25278]: Received disconnect from 181.143.142.125 port 23553:11: Bye Bye [preauth]
Jan  4 00:09:50 host sshd[25278]: Disconnected from 181.143.142.125 port 23553 [preauth]
Jan  4 00:09:52 host sshd[25283]: Failed password for invalid user lulu from 196.179.231.103 port 41174 ssh2
Jan  4 00:09:52 host sshd[25283]: Received disconnect from 196.179.231.103 port 41174:11: Bye Bye [preauth]
Jan  4 00:09:52 host sshd[25283]: Disconnected from 196.179.231.103 port 41174 [preauth]
Jan  4 00:10:08 host sshd[25396]: Invalid user prueba from 187.189.8.18 port 44847
Jan  4 00:10:08 host sshd[25396]: input_userauth_request: invalid user prueba [preauth]
Jan  4 00:10:08 host sshd[25396]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 00:10:08 host sshd[25396]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.189.8.18
Jan  4 00:10:10 host sshd[25396]: Failed password for invalid user prueba from 187.189.8.18 port 44847 ssh2
Jan  4 00:10:10 host sshd[25396]: Received disconnect from 187.189.8.18 port 44847:11: Bye Bye [preauth]
Jan  4 00:10:10 host sshd[25396]: Disconnected from 187.189.8.18 port 44847 [preauth]
Jan  4 00:11:51 host sshd[25577]: User root from 187.189.8.18 not allowed because not listed in AllowUsers
Jan  4 00:11:51 host sshd[25577]: input_userauth_request: invalid user root [preauth]
Jan  4 00:11:51 host unix_chkpwd[25581]: password check failed for user (root)
Jan  4 00:11:51 host sshd[25577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.189.8.18  user=root
Jan  4 00:11:51 host sshd[25577]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 00:11:53 host sshd[25577]: Failed password for invalid user root from 187.189.8.18 port 59001 ssh2
Jan  4 00:11:53 host sshd[25577]: Received disconnect from 187.189.8.18 port 59001:11: Bye Bye [preauth]
Jan  4 00:11:53 host sshd[25577]: Disconnected from 187.189.8.18 port 59001 [preauth]
Jan  4 00:12:00 host sshd[25629]: Did not receive identification string from 45.79.181.251 port 13344
Jan  4 00:12:03 host sshd[25630]: Connection closed by 45.79.181.251 port 13346 [preauth]
Jan  4 00:12:06 host sshd[25645]: Connection closed by 45.79.181.251 port 13348 [preauth]
Jan  4 00:14:14 host sshd[25933]: Did not receive identification string from 205.210.31.42 port 50663
Jan  4 00:21:12 host sshd[27733]: Connection closed by 167.94.138.46 port 49940 [preauth]
Jan  4 00:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  4 00:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 00:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 00:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  4 00:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 00:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 00:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  4 00:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 00:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 00:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  4 00:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 00:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 00:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  4 00:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 00:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 00:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  4 00:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 00:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 00:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  4 00:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 00:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 00:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  4 00:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 00:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 00:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  4 00:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 00:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 00:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  4 00:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 00:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 00:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  4 00:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 00:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 00:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  4 00:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 00:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 00:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  4 00:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 00:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 00:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=travelboniface user-3=keralaholi user-4=wwwresourcehunte user-5=wwwrmswll user-6=ugotscom user-7=cochintaxi user-8=wwwkaretakers user-9=a2zgroup user-10=dartsimp user-11=laundryboniface user-12=bonifacegroup user-13=wwwevmhonda user-14=wwwletsstalkfood user-15=straightcurve user-16=palco123 user-17=gifterman user-18=kottayamcalldriv user-19=phmetals user-20=mrsclean user-21=wwwnexidigital user-22=disposeat user-23=remysagr user-24=wwwkmaorg user-25=woodpeck user-26=wwwkapin user-27=vfmassets user-28=shalinijames user-29=wwwtestugo user-30=pmcresources feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  4 00:21:52 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  4 00:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 00:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 00:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  4 00:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 00:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 00:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-m0i9u7cQCCZX922o.~
Jan  4 00:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 00:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 00:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-m0i9u7cQCCZX922o.~'
Jan  4 00:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 00:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 00:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-m0i9u7cQCCZX922o.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  4 00:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 00:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 00:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  4 00:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 00:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 00:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  4 00:21:52 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 00:21:52 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 00:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  4 00:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 00:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 00:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  4 00:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 00:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 00:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  4 00:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 00:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 00:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  4 00:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 00:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 00:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  4 00:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 00:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 00:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  4 00:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  4 00:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  4 00:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  4 00:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  4 00:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  4 00:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  4 00:21:57 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  4 00:21:59 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  4 00:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  4 00:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 00:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 00:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  4 00:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 00:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 00:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  4 00:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 00:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 00:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  4 00:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 00:22:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 00:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  4 00:22:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 00:22:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 00:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  4 00:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  4 00:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  4 00:27:03 host sshd[28833]: User root from 162.218.126.136 not allowed because not listed in AllowUsers
Jan  4 00:27:04 host sshd[28833]: input_userauth_request: invalid user root [preauth]
Jan  4 00:27:04 host unix_chkpwd[28837]: password check failed for user (root)
Jan  4 00:27:04 host sshd[28833]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136  user=root
Jan  4 00:27:04 host sshd[28833]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 00:27:07 host sshd[28833]: Failed password for invalid user root from 162.218.126.136 port 57262 ssh2
Jan  4 00:27:07 host sshd[28833]: Connection closed by 162.218.126.136 port 57262 [preauth]
Jan  4 00:45:26 host sshd[31412]: User root from 92.46.108.20 not allowed because not listed in AllowUsers
Jan  4 00:45:26 host sshd[31412]: input_userauth_request: invalid user root [preauth]
Jan  4 00:45:27 host unix_chkpwd[31438]: password check failed for user (root)
Jan  4 00:45:27 host sshd[31412]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20  user=root
Jan  4 00:45:27 host sshd[31412]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 00:45:29 host sshd[31412]: Failed password for invalid user root from 92.46.108.20 port 34242 ssh2
Jan  4 00:45:29 host sshd[31412]: Connection closed by 92.46.108.20 port 34242 [preauth]
Jan  4 00:53:40 host sshd[32601]: Invalid user user1 from 103.13.40.2 port 57768
Jan  4 00:53:40 host sshd[32601]: input_userauth_request: invalid user user1 [preauth]
Jan  4 00:53:40 host sshd[32601]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 00:53:40 host sshd[32601]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2
Jan  4 00:53:41 host sshd[32601]: Failed password for invalid user user1 from 103.13.40.2 port 57768 ssh2
Jan  4 00:53:41 host sshd[32601]: Connection closed by 103.13.40.2 port 57768 [preauth]
Jan  4 00:59:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  4 00:59:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 00:59:04 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 01:03:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  4 01:03:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 01:03:04 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 01:03:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck Mime list_redirects --output=json
Jan  4 01:03:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 01:03:04 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 01:03:56 host sshd[1701]: Invalid user jboss from 195.134.179.150 port 53666
Jan  4 01:03:56 host sshd[1701]: input_userauth_request: invalid user jboss [preauth]
Jan  4 01:03:56 host sshd[1701]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 01:03:56 host sshd[1701]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.134.179.150
Jan  4 01:03:58 host sshd[1701]: Failed password for invalid user jboss from 195.134.179.150 port 53666 ssh2
Jan  4 01:03:58 host sshd[1701]: Received disconnect from 195.134.179.150 port 53666:11: Bye Bye [preauth]
Jan  4 01:03:58 host sshd[1701]: Disconnected from 195.134.179.150 port 53666 [preauth]
Jan  4 01:04:41 host sshd[2022]: Bad protocol version identification '\003' from 92.255.85.183 port 64316
Jan  4 01:11:30 host sshd[3120]: Invalid user bruce from 195.134.179.150 port 53914
Jan  4 01:11:30 host sshd[3120]: input_userauth_request: invalid user bruce [preauth]
Jan  4 01:11:30 host sshd[3120]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 01:11:30 host sshd[3120]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.134.179.150
Jan  4 01:11:32 host sshd[3120]: Failed password for invalid user bruce from 195.134.179.150 port 53914 ssh2
Jan  4 01:11:35 host sshd[3120]: Received disconnect from 195.134.179.150 port 53914:11: Bye Bye [preauth]
Jan  4 01:11:35 host sshd[3120]: Disconnected from 195.134.179.150 port 53914 [preauth]
Jan  4 01:15:53 host sshd[3950]: User root from 195.134.179.150 not allowed because not listed in AllowUsers
Jan  4 01:15:53 host sshd[3950]: input_userauth_request: invalid user root [preauth]
Jan  4 01:15:53 host unix_chkpwd[3964]: password check failed for user (root)
Jan  4 01:15:53 host sshd[3950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.134.179.150  user=root
Jan  4 01:15:53 host sshd[3950]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 01:15:55 host sshd[3950]: Failed password for invalid user root from 195.134.179.150 port 53916 ssh2
Jan  4 01:19:29 host sshd[4622]: Invalid user carl from 107.189.30.59 port 36900
Jan  4 01:19:29 host sshd[4622]: input_userauth_request: invalid user carl [preauth]
Jan  4 01:19:29 host sshd[4622]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 01:19:29 host sshd[4622]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59
Jan  4 01:19:31 host sshd[4622]: Failed password for invalid user carl from 107.189.30.59 port 36900 ssh2
Jan  4 01:19:32 host sshd[4622]: Connection closed by 107.189.30.59 port 36900 [preauth]
Jan  4 01:20:46 host sshd[4778]: Invalid user user from 106.10.122.53 port 55932
Jan  4 01:20:46 host sshd[4778]: input_userauth_request: invalid user user [preauth]
Jan  4 01:20:47 host sshd[4778]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 01:20:47 host sshd[4778]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53
Jan  4 01:20:48 host sshd[4778]: Failed password for invalid user user from 106.10.122.53 port 55932 ssh2
Jan  4 01:20:48 host sshd[4778]: Connection closed by 106.10.122.53 port 55932 [preauth]
Jan  4 01:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  4 01:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 01:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 01:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  4 01:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 01:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 01:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  4 01:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 01:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 01:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  4 01:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 01:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 01:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  4 01:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 01:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 01:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  4 01:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 01:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 01:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  4 01:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 01:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 01:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  4 01:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 01:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 01:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  4 01:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 01:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 01:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  4 01:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 01:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 01:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  4 01:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 01:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 01:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  4 01:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 01:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 01:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  4 01:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 01:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 01:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwtestugo user-2=shalinijames user-3=vfmassets user-4=pmcresources user-5=wwwkmaorg user-6=disposeat user-7=remysagr user-8=woodpeck user-9=wwwkapin user-10=phmetals user-11=kottayamcalldriv user-12=gifterman user-13=palco123 user-14=mrsclean user-15=wwwnexidigital user-16=wwwevmhonda user-17=bonifacegroup user-18=wwwletsstalkfood user-19=straightcurve user-20=dartsimp user-21=a2zgroup user-22=laundryboniface user-23=wwwkaretakers user-24=cochintaxi user-25=travelboniface user-26=ugotscom user-27=wwwrmswll user-28=keralaholi user-29=wwwresourcehunte user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  4 01:21:52 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  4 01:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 01:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 01:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  4 01:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 01:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 01:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-cqehjLS7QUeud6V8.~
Jan  4 01:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 01:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 01:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-cqehjLS7QUeud6V8.~'
Jan  4 01:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 01:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 01:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-cqehjLS7QUeud6V8.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  4 01:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 01:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 01:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  4 01:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 01:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 01:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  4 01:21:52 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 01:21:52 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 01:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  4 01:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 01:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 01:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  4 01:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 01:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 01:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  4 01:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 01:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 01:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  4 01:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 01:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 01:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  4 01:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 01:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 01:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  4 01:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  4 01:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  4 01:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  4 01:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  4 01:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  4 01:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  4 01:21:57 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  4 01:21:59 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  4 01:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  4 01:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 01:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 01:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  4 01:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 01:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 01:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  4 01:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 01:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 01:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  4 01:22:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 01:22:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 01:22:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  4 01:22:13 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 01:22:14 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 01:22:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  4 01:22:15 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  4 01:22:16 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  4 01:29:37 host sshd[6198]: User root from 162.218.126.136 not allowed because not listed in AllowUsers
Jan  4 01:29:37 host sshd[6198]: input_userauth_request: invalid user root [preauth]
Jan  4 01:29:38 host unix_chkpwd[6201]: password check failed for user (root)
Jan  4 01:29:38 host sshd[6198]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136  user=root
Jan  4 01:29:38 host sshd[6198]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 01:29:40 host sshd[6198]: Failed password for invalid user root from 162.218.126.136 port 53154 ssh2
Jan  4 01:29:40 host sshd[6198]: Connection closed by 162.218.126.136 port 53154 [preauth]
Jan  4 01:30:55 host sshd[6346]: Did not receive identification string from 154.89.5.114 port 45336
Jan  4 01:31:09 host sshd[6347]: Connection closed by 154.89.5.114 port 45392 [preauth]
Jan  4 01:31:37 host sshd[6444]: Invalid user user from 41.197.31.178 port 37458
Jan  4 01:31:37 host sshd[6444]: input_userauth_request: invalid user user [preauth]
Jan  4 01:31:37 host sshd[6444]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 01:31:37 host sshd[6444]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178
Jan  4 01:31:39 host sshd[6444]: Failed password for invalid user user from 41.197.31.178 port 37458 ssh2
Jan  4 01:31:39 host sshd[6444]: Connection closed by 41.197.31.178 port 37458 [preauth]
Jan  4 01:46:46 host sshd[8880]: Did not receive identification string from 104.152.52.137 port 56804
Jan  4 01:50:14 host sshd[9386]: Connection closed by 107.170.240.9 port 50432 [preauth]
Jan  4 02:02:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  4 02:02:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:02:01 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:02:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  4 02:02:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:02:01 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:02:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  4 02:02:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:02:01 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:02:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  4 02:02:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:02:01 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:02:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  4 02:02:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:02:01 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:02:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  4 02:02:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:02:01 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:02:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  4 02:02:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:02:01 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:13:01 host sshd[12810]: Invalid user storm from 103.13.40.2 port 41882
Jan  4 02:13:01 host sshd[12810]: input_userauth_request: invalid user storm [preauth]
Jan  4 02:13:01 host sshd[12810]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 02:13:01 host sshd[12810]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2
Jan  4 02:13:03 host sshd[12810]: Failed password for invalid user storm from 103.13.40.2 port 41882 ssh2
Jan  4 02:13:03 host sshd[12810]: Connection closed by 103.13.40.2 port 41882 [preauth]
Jan  4 02:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  4 02:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  4 02:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  4 02:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  4 02:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  4 02:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  4 02:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  4 02:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  4 02:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  4 02:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  4 02:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  4 02:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  4 02:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  4 02:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkaretakers user-2=cochintaxi user-3=a2zgroup user-4=dartsimp user-5=laundryboniface user-6=wwwpmcresource user-7=travelboniface user-8=ugotscom user-9=keralaholi user-10=wwwresourcehunte user-11=wwwrmswll user-12=wwwkmaorg user-13=disposeat user-14=remysagr user-15=woodpeck user-16=wwwkapin user-17=shalinijames user-18=wwwtestugo user-19=vfmassets user-20=pmcresources user-21=wwwevmhonda user-22=bonifacegroup user-23=straightcurve user-24=wwwletsstalkfood user-25=phmetals user-26=kottayamcalldriv user-27=palco123 user-28=gifterman user-29=mrsclean user-30=wwwnexidigital feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  4 02:21:51 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  4 02:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  4 02:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-B4xFAgezXIcqpK4w.~
Jan  4 02:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-B4xFAgezXIcqpK4w.~'
Jan  4 02:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-B4xFAgezXIcqpK4w.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  4 02:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  4 02:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  4 02:21:52 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 02:21:52 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 02:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  4 02:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  4 02:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  4 02:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  4 02:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  4 02:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  4 02:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  4 02:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  4 02:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  4 02:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  4 02:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  4 02:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  4 02:21:56 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  4 02:21:58 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  4 02:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  4 02:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  4 02:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  4 02:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  4 02:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 02:22:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 02:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  4 02:22:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 02:22:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 02:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  4 02:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  4 02:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  4 02:29:33 host sshd[15319]: Did not receive identification string from 217.20.43.126 port 34823
Jan  4 02:29:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  4 02:29:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:29:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:29:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  4 02:29:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:29:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:29:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  4 02:29:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:29:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:29:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  4 02:29:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:29:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:29:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  4 02:29:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:29:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:29:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=remysagr user-2=disposeat user-3=wwwkmaorg user-4=wwwkapin user-5=woodpeck user-6=vfmassets user-7=shalinijames user-8=wwwtestugo user-9=pmcresources user-10=bonifacegroup user-11=wwwevmhonda user-12=straightcurve user-13=wwwletsstalkfood user-14=palco123 user-15=gifterman user-16=phmetals user-17=kottayamcalldriv user-18=wwwnexidigital user-19=mrsclean user-20=cochintaxi user-21=wwwkaretakers user-22=a2zgroup user-23=dartsimp user-24=laundryboniface user-25=wwwpmcresource user-26=travelboniface user-27=wwwresourcehunte user-28=keralaholi user-29=wwwrmswll user-30=ugotscom feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  4 02:29:49 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  4 02:29:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:29:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:29:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwevmhonda --output=json
Jan  4 02:29:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:29:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:29:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color instance info --format=json --check-updates=true
Jan  4 02:29:50 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  4 02:29:54 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  4 02:29:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false
Jan  4 02:29:54 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  4 02:29:55 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  4 02:29:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false
Jan  4 02:29:55 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  4 02:29:58 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  4 02:29:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  4 02:29:58 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  4 02:29:58 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  4 02:29:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwevmhonda LangPHP php_get_vhost_versions --output=json
Jan  4 02:29:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:29:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:29:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 package_manager_get_package_info package-0=ea-php72 --output=json
Jan  4 02:29:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:29:59 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:29:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color instance login-url --skip-plugins=false --format=json
Jan  4 02:29:59 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  4 02:30:00 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  4 02:30:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwletsstalkfood --output=json
Jan  4 02:30:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:30:00 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:30:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color instance info --format=json --check-updates=true
Jan  4 02:30:00 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  4 02:30:06 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  4 02:30:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false
Jan  4 02:30:06 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  4 02:30:07 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  4 02:30:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false
Jan  4 02:30:07 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  4 02:30:13 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  4 02:30:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  4 02:30:13 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  4 02:30:13 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  4 02:30:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood LangPHP php_get_vhost_versions --output=json
Jan  4 02:30:13 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:30:13 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:30:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color instance login-url --skip-plugins=false --format=json
Jan  4 02:30:13 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  4 02:30:13 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  4 02:30:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood DomainInfo single_domain_data domain=letsstalkfood.com return_https_redirect_status=1 --output=json
Jan  4 02:30:14 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:30:14 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:30:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 fetch_vhost_ssl_components --output=json
Jan  4 02:30:14 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:30:14 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:30:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 fetch_ssl_vhosts --output=json
Jan  4 02:30:14 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:30:14 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:30:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood Mime list_redirects --output=json
Jan  4 02:30:14 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:30:14 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:30:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  4 02:30:14 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  4 02:30:16 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  4 02:30:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false
Jan  4 02:30:16 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  4 02:30:17 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  4 02:30:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  4 02:30:18 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  4 02:30:23 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  4 02:30:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false
Jan  4 02:30:23 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  4 02:30:28 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  4 02:30:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/public_html/wp-config.php
Jan  4 02:30:28 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  4 02:30:28 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  4 02:30:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  4 02:30:28 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  4 02:30:29 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  4 02:30:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/public_html/.maintenance
Jan  4 02:30:29 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  4 02:30:29 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  4 02:30:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color db-prefix get
Jan  4 02:30:29 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  4 02:30:29 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  4 02:30:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood DirectoryPrivacy is_directory_protected dir=/home/wwwletsstalkfood/public_html --output=json
Jan  4 02:30:29 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:30:29 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:30:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  4 02:30:30 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  4 02:30:30 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  4 02:30:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color wpt-cron event reschedule wp_version_check '+2 day'
Jan  4 02:30:30 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  4 02:30:31 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  4 02:30:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day'
Jan  4 02:30:31 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  4 02:30:31 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  4 02:30:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  4 02:30:31 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  4 02:30:32 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  4 02:30:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  4 02:30:32 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  4 02:30:32 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  4 02:30:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color admin-username is-secure
Jan  4 02:30:32 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  4 02:30:32 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  4 02:30:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  4 02:30:33 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  4 02:30:33 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  4 02:30:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/public_html/wp-config.php
Jan  4 02:30:33 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  4 02:30:33 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  4 02:30:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/stat -c %a /home/wwwletsstalkfood/public_html/wp-config.php
Jan  4 02:30:33 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  4 02:30:33 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  4 02:30:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color pingbacks is_disabled
Jan  4 02:30:33 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  4 02:30:33 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  4 02:30:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  4 02:30:34 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  4 02:30:34 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  4 02:30:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color security-keys are_keys_correct
Jan  4 02:30:34 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  4 02:30:34 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  4 02:30:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=mrsclean --output=json
Jan  4 02:30:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:30:35 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:30:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/backup && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/mrsclean/public_html/backup --no-color instance info --format=json --check-updates=true
Jan  4 02:30:35 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  4 02:30:35 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  4 02:30:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean DomainInfo single_domain_data domain=mrsclean.co.in return_https_redirect_status=1 --output=json
Jan  4 02:30:35 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:30:35 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:30:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean Mime list_redirects --output=json
Jan  4 02:30:35 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:30:35 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:30:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/public_html/backup/wp-includes/version.php
Jan  4 02:30:35 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  4 02:30:35 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  4 02:30:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/cat /home/mrsclean/public_html/backup/wp-includes/version.php
Jan  4 02:30:35 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  4 02:30:35 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  4 02:30:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  4 02:30:35 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  4 02:30:35 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  4 02:30:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean LangPHP php_get_vhost_versions --output=json
Jan  4 02:30:35 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:30:35 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:30:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  4 02:30:35 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 02:30:35 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 02:30:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/blog && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/mrsclean/public_html/blog --no-color instance info --format=json --check-updates=true
Jan  4 02:30:36 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  4 02:30:36 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  4 02:30:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/public_html/blog/wp-includes/version.php
Jan  4 02:30:36 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  4 02:30:36 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  4 02:30:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/cat /home/mrsclean/public_html/blog/wp-includes/version.php
Jan  4 02:30:36 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  4 02:30:36 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  4 02:30:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  4 02:30:36 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  4 02:30:36 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  4 02:30:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=shalinijames --output=json
Jan  4 02:30:36 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:30:36 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:30:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color instance info --format=json --check-updates=true
Jan  4 02:30:36 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  4 02:30:44 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  4 02:30:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option get auto_update_plugins --format=json
Jan  4 02:30:44 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  4 02:30:44 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  4 02:30:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option get auto_update_themes --format=json
Jan  4 02:30:44 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  4 02:30:44 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  4 02:30:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  4 02:30:44 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  4 02:30:44 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  4 02:30:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames LangPHP php_get_vhost_versions --output=json
Jan  4 02:30:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:30:45 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:30:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color instance login-url --skip-plugins=false --format=json
Jan  4 02:30:45 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  4 02:30:45 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  4 02:30:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames DomainInfo single_domain_data domain=shalinijames.com return_https_redirect_status=1 --output=json
Jan  4 02:30:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:30:45 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:30:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames Mime list_redirects --output=json
Jan  4 02:30:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:30:45 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:30:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  4 02:30:45 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  4 02:30:47 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  4 02:30:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option get auto_update_plugins --format=json
Jan  4 02:30:47 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  4 02:30:48 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  4 02:30:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  4 02:30:48 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  4 02:30:52 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  4 02:30:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option get auto_update_themes --format=json
Jan  4 02:30:52 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  4 02:30:53 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  4 02:30:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/public_html/wp-config.php
Jan  4 02:30:53 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  4 02:30:53 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  4 02:30:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  4 02:30:53 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  4 02:30:53 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  4 02:30:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/public_html/.maintenance
Jan  4 02:30:53 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  4 02:30:53 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  4 02:30:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color db-prefix get
Jan  4 02:30:53 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  4 02:30:53 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  4 02:30:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames DirectoryPrivacy is_directory_protected dir=/home/shalinijames/public_html --output=json
Jan  4 02:30:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:30:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:30:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  4 02:30:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  4 02:30:54 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  4 02:30:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color wpt-cron event reschedule wp_version_check '+2 day'
Jan  4 02:30:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  4 02:30:55 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  4 02:30:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day'
Jan  4 02:30:55 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  4 02:30:55 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  4 02:30:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  4 02:30:55 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  4 02:30:55 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  4 02:30:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  4 02:30:55 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  4 02:30:56 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  4 02:30:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color admin-username is-secure
Jan  4 02:30:56 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  4 02:30:56 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  4 02:30:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  4 02:30:56 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  4 02:30:57 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  4 02:30:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/public_html/wp-config.php
Jan  4 02:30:57 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  4 02:30:57 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  4 02:30:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/stat -c %a /home/shalinijames/public_html/wp-config.php
Jan  4 02:30:57 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  4 02:30:57 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  4 02:30:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color pingbacks is_disabled
Jan  4 02:30:57 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  4 02:30:57 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  4 02:30:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  4 02:30:57 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  4 02:30:58 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  4 02:30:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color security-keys are_keys_correct
Jan  4 02:30:58 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  4 02:30:58 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  4 02:30:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwtestugo --output=json
Jan  4 02:30:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:30:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:30:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color instance info --format=json --check-updates=true
Jan  4 02:30:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option get auto_update_plugins --format=json
Jan  4 02:31:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option get auto_update_themes --format=json
Jan  4 02:31:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  4 02:31:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo LangPHP php_get_vhost_versions --output=json
Jan  4 02:31:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:31:05 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:31:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color instance login-url --skip-plugins=false --format=json
Jan  4 02:31:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DomainInfo single_domain_data domain=testugo.in return_https_redirect_status=1 --output=json
Jan  4 02:31:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:31:07 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:31:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo Mime list_redirects --output=json
Jan  4 02:31:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:31:07 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:31:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  4 02:31:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option get auto_update_plugins --format=json
Jan  4 02:31:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  4 02:31:08 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:11 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option get auto_update_themes --format=json
Jan  4 02:31:11 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt1/wp-config.php
Jan  4 02:31:12 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  4 02:31:12 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt1/.maintenance
Jan  4 02:31:12 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color db-prefix get
Jan  4 02:31:12 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:13 host sshd[16319]: User root from 162.218.126.136 not allowed because not listed in AllowUsers
Jan  4 02:31:13 host sshd[16319]: input_userauth_request: invalid user root [preauth]
Jan  4 02:31:13 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/tt1 --output=json
Jan  4 02:31:13 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:31:13 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:31:13 host unix_chkpwd[16351]: password check failed for user (root)
Jan  4 02:31:13 host sshd[16319]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136  user=root
Jan  4 02:31:13 host sshd[16319]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 02:31:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  4 02:31:13 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:13 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color wpt-cron event reschedule wp_version_check '+2 day'
Jan  4 02:31:14 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:14 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day'
Jan  4 02:31:14 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:14 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  4 02:31:14 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:15 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  4 02:31:15 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:15 host sshd[16319]: Failed password for invalid user root from 162.218.126.136 port 44840 ssh2
Jan  4 02:31:15 host sshd[16319]: Connection closed by 162.218.126.136 port 44840 [preauth]
Jan  4 02:31:15 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color admin-username is-secure
Jan  4 02:31:15 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:16 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  4 02:31:16 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:16 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt1/wp-config.php
Jan  4 02:31:16 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:16 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/stat -c %a /home/wwwtestugo/public_html/tt1/wp-config.php
Jan  4 02:31:16 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:16 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color pingbacks is_disabled
Jan  4 02:31:16 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:16 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  4 02:31:16 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:17 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color security-keys are_keys_correct
Jan  4 02:31:17 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:17 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color instance info --format=json --check-updates=true
Jan  4 02:31:17 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:22 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option get auto_update_plugins --format=json
Jan  4 02:31:22 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:22 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option get auto_update_themes --format=json
Jan  4 02:31:22 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:22 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  4 02:31:23 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:23 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color instance login-url --skip-plugins=false --format=json
Jan  4 02:31:23 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:23 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  4 02:31:23 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:24 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option get auto_update_plugins --format=json
Jan  4 02:31:24 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:24 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  4 02:31:24 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:28 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option get auto_update_themes --format=json
Jan  4 02:31:28 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:28 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt/wp-config.php
Jan  4 02:31:28 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:28 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  4 02:31:28 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:29 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt/.maintenance
Jan  4 02:31:29 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:29 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color db-prefix get
Jan  4 02:31:29 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:29 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/tt --output=json
Jan  4 02:31:29 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:31:29 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:31:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  4 02:31:29 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:30 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color wpt-cron event reschedule wp_version_check '+2 day'
Jan  4 02:31:30 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:30 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day'
Jan  4 02:31:30 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:31 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  4 02:31:31 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:31 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  4 02:31:31 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:31 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color admin-username is-secure
Jan  4 02:31:32 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:32 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  4 02:31:32 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:32 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt/wp-config.php
Jan  4 02:31:32 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:32 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/stat -c %a /home/wwwtestugo/public_html/tt/wp-config.php
Jan  4 02:31:32 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:32 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color pingbacks is_disabled
Jan  4 02:31:32 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:33 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  4 02:31:33 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:33 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color security-keys are_keys_correct
Jan  4 02:31:33 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:34 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color instance info --format=json --check-updates=true
Jan  4 02:31:34 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:39 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:39 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option get auto_update_plugins --format=json
Jan  4 02:31:39 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:39 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:39 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option get auto_update_themes --format=json
Jan  4 02:31:39 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:40 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  4 02:31:40 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:40 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color instance login-url --skip-plugins=false --format=json
Jan  4 02:31:40 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:41 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  4 02:31:41 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:42 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option get auto_update_plugins --format=json
Jan  4 02:31:42 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:42 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  4 02:31:42 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:46 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option get auto_update_themes --format=json
Jan  4 02:31:46 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:46 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/HYPE/wp-config.php
Jan  4 02:31:46 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:46 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  4 02:31:46 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:47 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/HYPE/.maintenance
Jan  4 02:31:47 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:47 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color db-prefix get
Jan  4 02:31:47 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:47 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/HYPE --output=json
Jan  4 02:31:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:31:47 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:31:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  4 02:31:47 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:48 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color wpt-cron event reschedule wp_version_check '+2 day'
Jan  4 02:31:48 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:48 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day'
Jan  4 02:31:48 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:49 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  4 02:31:49 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:49 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  4 02:31:49 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:50 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color admin-username is-secure
Jan  4 02:31:50 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:50 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  4 02:31:50 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:50 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/HYPE/wp-config.php
Jan  4 02:31:50 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:50 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/stat -c %a /home/wwwtestugo/public_html/HYPE/wp-config.php
Jan  4 02:31:50 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:50 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color pingbacks is_disabled
Jan  4 02:31:51 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:51 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  4 02:31:51 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:51 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color security-keys are_keys_correct
Jan  4 02:31:51 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:31:52 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:31:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=ugotscom --output=json
Jan  4 02:31:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:31:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:31:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/boniface/blog && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/boniface/blog --no-color instance info --format=json --check-updates=true
Jan  4 02:31:52 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 02:31:52 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 02:31:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DomainInfo single_domain_data domain=ugotechnologies.com return_https_redirect_status=1 --output=json
Jan  4 02:31:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:31:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:31:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom Mime list_redirects --output=json
Jan  4 02:31:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:31:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:31:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/boniface/blog/wp-includes/version.php
Jan  4 02:31:53 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 02:31:53 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 02:31:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/public_html/boniface/blog/wp-includes/version.php
Jan  4 02:31:53 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 02:31:53 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 02:31:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  4 02:31:53 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 02:31:53 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 02:31:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom LangPHP php_get_vhost_versions --output=json
Jan  4 02:31:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:31:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:31:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color instance info --format=json --check-updates=true
Jan  4 02:31:53 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 02:32:00 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 02:32:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option get auto_update_plugins --format=json
Jan  4 02:32:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 02:32:00 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 02:32:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option get auto_update_themes --format=json
Jan  4 02:32:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 02:32:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 02:32:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  4 02:32:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 02:32:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 02:32:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color instance login-url --skip-plugins=false --format=json
Jan  4 02:32:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 02:32:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 02:32:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  4 02:32:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 02:32:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 02:32:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option get auto_update_plugins --format=json
Jan  4 02:32:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 02:32:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 02:32:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  4 02:32:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 02:32:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 02:32:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option get auto_update_themes --format=json
Jan  4 02:32:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 02:32:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 02:32:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/UGOCRM/ugo_blg/wp-config.php
Jan  4 02:32:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 02:32:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 02:32:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  4 02:32:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 02:32:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 02:32:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/UGOCRM/ugo_blg/.maintenance
Jan  4 02:32:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 02:32:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 02:32:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color db-prefix get
Jan  4 02:32:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 02:32:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 02:32:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DirectoryPrivacy is_directory_protected dir=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --output=json
Jan  4 02:32:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:32:09 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:32:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  4 02:32:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 02:32:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 02:32:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color wpt-cron event reschedule wp_version_check '+2 day'
Jan  4 02:32:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 02:32:10 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 02:32:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day'
Jan  4 02:32:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 02:32:10 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 02:32:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  4 02:32:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 02:32:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 02:32:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  4 02:32:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 02:32:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 02:32:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color admin-username is-secure
Jan  4 02:32:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 02:32:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 02:32:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  4 02:32:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 02:32:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 02:32:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/UGOCRM/ugo_blg/wp-config.php
Jan  4 02:32:12 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 02:32:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 02:32:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/stat -c %a /home/ugotscom/public_html/old/UGOCRM/ugo_blg/wp-config.php
Jan  4 02:32:12 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 02:32:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 02:32:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color pingbacks is_disabled
Jan  4 02:32:12 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 02:32:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 02:32:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  4 02:32:12 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 02:32:13 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 02:32:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color security-keys are_keys_correct
Jan  4 02:32:13 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 02:32:13 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 02:32:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color instance info --format=json --check-updates=true
Jan  4 02:32:13 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 02:32:16 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 02:32:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option get auto_update_plugins --format=json
Jan  4 02:32:16 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 02:32:17 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 02:32:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option get auto_update_themes --format=json
Jan  4 02:32:17 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 02:32:17 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 02:32:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  4 02:32:17 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 02:32:17 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 02:32:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color instance login-url --skip-plugins=false --format=json
Jan  4 02:32:17 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 02:32:18 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 02:32:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  4 02:32:18 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 02:32:19 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 02:32:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option get auto_update_plugins --format=json
Jan  4 02:32:19 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 02:32:19 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 02:32:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  4 02:32:19 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 02:32:21 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 02:32:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option get auto_update_themes --format=json
Jan  4 02:32:21 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 02:32:21 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 02:32:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/site/wp-config.php
Jan  4 02:32:21 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 02:32:21 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 02:32:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  4 02:32:21 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 02:32:22 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 02:32:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/site/.maintenance
Jan  4 02:32:22 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 02:32:22 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 02:32:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color db-prefix get
Jan  4 02:32:22 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 02:32:22 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 02:32:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DirectoryPrivacy is_directory_protected dir=/home/ugotscom/public_html/old/site --output=json
Jan  4 02:32:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:32:22 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:32:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  4 02:32:22 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 02:32:22 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 02:32:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color wpt-cron event reschedule wp_version_check '+2 day'
Jan  4 02:32:23 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 02:32:23 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 02:32:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day'
Jan  4 02:32:23 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 02:32:23 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 02:32:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  4 02:32:23 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 02:32:24 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 02:32:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  4 02:32:24 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 02:32:24 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 02:32:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color admin-username is-secure
Jan  4 02:32:24 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 02:32:24 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 02:32:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  4 02:32:24 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 02:32:25 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 02:32:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/site/wp-config.php
Jan  4 02:32:25 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 02:32:25 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 02:32:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/stat -c %a /home/ugotscom/public_html/old/site/wp-config.php
Jan  4 02:32:25 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 02:32:25 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 02:32:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color pingbacks is_disabled
Jan  4 02:32:25 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 02:32:25 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 02:32:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  4 02:32:25 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 02:32:26 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 02:32:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color security-keys are_keys_correct
Jan  4 02:32:26 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 02:32:26 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 02:32:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=woodpeck --output=json
Jan  4 02:32:26 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:32:26 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:32:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html/wp && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/woodpeck/public_html/wp --no-color instance info --format=json --check-updates=true
Jan  4 02:32:26 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0)
Jan  4 02:32:26 host sudo: pam_unix(sudo:session): session closed for user woodpeck
Jan  4 02:32:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck DomainInfo single_domain_data domain=woodpeckerindia.com return_https_redirect_status=1 --output=json
Jan  4 02:32:26 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:32:26 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:32:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck Mime list_redirects --output=json
Jan  4 02:32:26 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:32:27 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:32:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/test -e /home/woodpeck/public_html/wp/wp-includes/version.php
Jan  4 02:32:27 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0)
Jan  4 02:32:27 host sudo: pam_unix(sudo:session): session closed for user woodpeck
Jan  4 02:32:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  4 02:32:27 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0)
Jan  4 02:32:27 host sudo: pam_unix(sudo:session): session closed for user woodpeck
Jan  4 02:32:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck LangPHP php_get_vhost_versions --output=json
Jan  4 02:32:27 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:32:27 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:32:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=palco123 --output=json
Jan  4 02:32:27 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:32:27 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:32:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color instance info --format=json --check-updates=true
Jan  4 02:32:27 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  4 02:32:35 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  4 02:32:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false
Jan  4 02:32:35 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  4 02:32:35 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  4 02:32:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false
Jan  4 02:32:35 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  4 02:32:41 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  4 02:32:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  4 02:32:41 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  4 02:32:41 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  4 02:32:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 LangPHP php_get_vhost_versions --output=json
Jan  4 02:32:41 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:32:41 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:32:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color instance login-url --skip-plugins=false --format=json
Jan  4 02:32:41 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  4 02:32:42 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  4 02:32:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 DomainInfo single_domain_data domain=panlys.com return_https_redirect_status=1 --output=json
Jan  4 02:32:42 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:32:42 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:32:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 Mime list_redirects --output=json
Jan  4 02:32:42 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:32:42 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:32:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  4 02:32:42 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  4 02:32:43 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  4 02:32:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false
Jan  4 02:32:43 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  4 02:32:44 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  4 02:32:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  4 02:32:44 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  4 02:32:49 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  4 02:32:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false
Jan  4 02:32:49 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  4 02:32:55 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  4 02:32:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/public_html/wp-config.php
Jan  4 02:32:55 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  4 02:32:55 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  4 02:32:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  4 02:32:55 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  4 02:32:55 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  4 02:32:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/public_html/.maintenance
Jan  4 02:32:55 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  4 02:32:55 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  4 02:32:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color db-prefix get
Jan  4 02:32:56 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  4 02:32:56 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  4 02:32:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 DirectoryPrivacy is_directory_protected dir=/home/palco123/public_html --output=json
Jan  4 02:32:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:32:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:32:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  4 02:32:56 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  4 02:32:57 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  4 02:32:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color option get auto_update_core_major
Jan  4 02:32:57 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  4 02:32:57 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  4 02:32:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color wpt-cron event reschedule wp_version_check '+2 day'
Jan  4 02:32:58 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  4 02:32:58 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  4 02:32:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day'
Jan  4 02:32:58 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  4 02:32:58 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  4 02:32:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color admin-username is-secure
Jan  4 02:32:58 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  4 02:32:59 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  4 02:32:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  4 02:32:59 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  4 02:32:59 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  4 02:32:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/public_html/wp-config.php
Jan  4 02:32:59 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  4 02:32:59 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  4 02:33:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/stat -c %a /home/palco123/public_html/wp-config.php
Jan  4 02:33:00 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  4 02:33:00 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  4 02:33:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color pingbacks is_disabled
Jan  4 02:33:00 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  4 02:33:00 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  4 02:33:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  4 02:33:00 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  4 02:33:01 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  4 02:33:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color security-keys are_keys_correct
Jan  4 02:33:01 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  4 02:33:01 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  4 02:33:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwresourcehunte --output=json
Jan  4 02:33:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:33:01 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:33:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color instance info --format=json --check-updates=true
Jan  4 02:33:01 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  4 02:33:08 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  4 02:33:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option get auto_update_plugins --format=json
Jan  4 02:33:08 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  4 02:33:08 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  4 02:33:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option get auto_update_themes --format=json
Jan  4 02:33:08 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  4 02:33:09 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  4 02:33:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  4 02:33:09 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  4 02:33:09 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  4 02:33:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte LangPHP php_get_vhost_versions --output=json
Jan  4 02:33:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:33:09 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:33:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color instance login-url --skip-plugins=false --format=json
Jan  4 02:33:09 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  4 02:33:09 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  4 02:33:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte DomainInfo single_domain_data domain=resourcehunters.com return_https_redirect_status=1 --output=json
Jan  4 02:33:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:33:09 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:33:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte Mime list_redirects --output=json
Jan  4 02:33:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:33:10 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:33:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  4 02:33:10 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  4 02:33:10 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  4 02:33:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option get auto_update_plugins --format=json
Jan  4 02:33:10 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  4 02:33:10 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  4 02:33:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  4 02:33:10 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  4 02:34:10 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  4 02:34:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=remysagr WpToolkitNotification send_admin_suspicious_instance_notification 'suspicious_instance_text=The following WordPress installations are quarantined:<br/>' 'suspicious_instance_details_info=Website "Resource Hunters" (http://resourcehunters.com): WP Toolkit was not able to finish running an operation on this site in 60 seconds, so the operation was terminated. This could mean that your WordPress installation might be infected with malware. Check the wp-config.php file of the installation for potential malware code or run an anti-virus scan. If you cannot find any traces of malware, try running the operation again later.' --output=json
Jan  4 02:34:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:34:11 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:34:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-themes=theme1,twentyfifteen,twentyfourteen,twentythirteen,twentytwelve
Jan  4 02:34:11 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  4 02:35:11 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  4 02:35:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=remysagr WpToolkitNotification send_admin_auto_updates_notification available_updates_text= available_updates_list= installed_updates_text= installed_updates_list= 'failure_updates_text=Updates were not installed for the following items:<br/><br/>' 'failure_updates_list=1. Website "EVM Honda Cochin" (http://www.evmhonda.com): Failed to reset cache for the instance #1: Fatal error: Uncaught Error: Call to undefined function cardealer_is_wpml_active() in /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-options.php:1041#012Stack trace:#012#0 /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-init.php(22): require_once()#012#1 /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/cardealer-helper-library.php(183):
Jan  4 02:35:11 host sudo: wp-toolkit : (command continued) require_once('"'"'/home/wwwevmhon...'"'"')#012#2 /home/wwwevmhonda/public_html/wp-includes/class-wp-hook.php(287): cdhl_include_admin_files('"'"''"'"')#012#3 /home/wwwevmhonda/public_html/wp-includes/class-wp-hook.php(311): WP_Hook->apply_filters(NULL, Array)#012#4 /home/wwwevmhonda/public_html/wp-includes/plugin.php(478): WP_Hook->do_action(Array)#012#5 /home/wwwevmhonda/public_html/wp-settings.php(546): do_action('"'"'init'"'"')#012#6 /usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/vendor/wp-cli/wp-cli/php/WP_CLI/Runner.php(1356): require('"'"'/home/wwwevmhon...'"'"')#012#7 /usr/local/cpanel/3rdparty/wp-toolkit/plib/ve in /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-options.php on line 1041#012Error: There has been a critical error on your website.Learn more about debugging in WordPress. There has been a critical error on your website.#012<br/><br/>2. Website
Jan  4 02:35:11 host sudo: wp-toolkit : (command continued) "/home/mrsclean/public_html/backup" (http://mrsclean.co.in/backup): Failed to reset cache for the instance #5: Error: Error establishing a database connection. This either means that the username and password information in your `wp-config.php` file is incorrect or we can’t contact the database server at `localhost`. This could mean your host’s database server is down.#012<br/><br/>3. Website "/home/mrsclean/public_html/blog" (http://mrsclean.co.in/blog): Failed to reset cache for the instance #6: Error: Error establishing a database connection. This either means that the username and password information in your `wp-config.php` file is incorrect or we can’t contact the database server at `localhost`. This could mean your host’s database server is down.#012<br/><br/>4. Website "/home/ugotscom/public_html/boniface/blog" (http://ugotechnologies.com/boniface/blog): Failed to reset cache for the instance #13:
Jan  4 02:35:11 host sudo: wp-toolkit : (command continued) Error: Error establishing a database connection.#012<br/><br/>5. Website "/home/woodpeck/public_html/wp" (http://woodpeckerindia.com/wp): Failed to reset cache for the instance #16: /bin/sh: line 0: cd: /home/woodpeck/public_html/wp: No such file or directory#012<br/><br/>6. Website "Resource Hunters" (http://resourcehunters.com): Failed to reset cache for the instance #18: WP Toolkit was not able to finish running an operation on this site in 60 seconds, so the operation was terminated. This could mean that your WordPress installation might be infected with malware. Check the wp-config.php file of the installation for potential malware code or run an anti-virus scan. If you cannot find any traces of malware, try running the operation again later.<br/><br/>' --output=json
Jan  4 02:35:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:35:11 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:35:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color cli cache clear
Jan  4 02:35:11 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  4 02:35:11 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  4 02:35:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color cli cache clear
Jan  4 02:35:11 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  4 02:35:11 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  4 02:35:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/backup && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/mrsclean/public_html/backup --no-color cli cache clear
Jan  4 02:35:11 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  4 02:35:11 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  4 02:35:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/blog && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/mrsclean/public_html/blog --no-color cli cache clear
Jan  4 02:35:11 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  4 02:35:12 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  4 02:35:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color cli cache clear
Jan  4 02:35:12 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  4 02:35:12 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  4 02:35:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color cli cache clear
Jan  4 02:35:12 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:35:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:35:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color cli cache clear
Jan  4 02:35:12 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:35:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:35:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color cli cache clear
Jan  4 02:35:12 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:35:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:35:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/boniface/blog && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/boniface/blog --no-color cli cache clear
Jan  4 02:35:12 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 02:35:13 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 02:35:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color cli cache clear
Jan  4 02:35:13 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 02:35:13 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 02:35:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color cli cache clear
Jan  4 02:35:13 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 02:35:13 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 02:35:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html/wp && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/woodpeck/public_html/wp --no-color cli cache clear
Jan  4 02:35:13 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0)
Jan  4 02:35:13 host sudo: pam_unix(sudo:session): session closed for user woodpeck
Jan  4 02:35:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color cli cache clear
Jan  4 02:35:13 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  4 02:35:13 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  4 02:35:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color cli cache clear
Jan  4 02:35:13 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  4 02:35:13 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  4 02:35:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet
Jan  4 02:35:13 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  4 02:35:14 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  4 02:35:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet
Jan  4 02:35:14 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  4 02:35:14 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  4 02:35:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet
Jan  4 02:35:14 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  4 02:35:15 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  4 02:35:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet
Jan  4 02:35:15 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:35:16 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:35:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet
Jan  4 02:35:16 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:35:16 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:35:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet
Jan  4 02:35:16 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 02:35:17 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 02:35:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet
Jan  4 02:35:17 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 02:35:17 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 02:35:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet
Jan  4 02:35:17 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 02:35:17 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 02:35:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet
Jan  4 02:35:17 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  4 02:35:18 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  4 02:35:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet
Jan  4 02:35:18 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  4 02:35:18 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  4 02:35:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c httpd -v
Jan  4 02:35:18 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:35:18 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:35:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwevmhonda/evmhonda.com/wp-toolkit.conf
Jan  4 02:35:18 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:35:18 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:35:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwevmhonda/evmhonda.com/wp-toolkit.conf
Jan  4 02:35:18 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:35:18 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:35:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwevmhonda/evmhonda.com/wp-toolkit.conf
Jan  4 02:35:18 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:35:18 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:35:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwevmhonda/evmhonda.com/wp-toolkit.conf
Jan  4 02:35:18 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:35:18 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:35:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf
Jan  4 02:35:18 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:35:18 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:35:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf
Jan  4 02:35:18 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:35:18 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:35:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf
Jan  4 02:35:18 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:35:18 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:35:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf
Jan  4 02:35:18 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:35:18 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:35:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/shalinijames/shalinijames.com/wp-toolkit.conf
Jan  4 02:35:19 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:35:19 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:35:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/shalinijames/shalinijames.com/wp-toolkit.conf
Jan  4 02:35:19 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:35:19 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:35:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/shalinijames/shalinijames.com/wp-toolkit.conf
Jan  4 02:35:19 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:35:19 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:35:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/shalinijames/shalinijames.com/wp-toolkit.conf
Jan  4 02:35:19 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:35:19 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:35:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  4 02:35:19 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:35:19 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:35:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  4 02:35:19 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:35:19 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:35:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  4 02:35:19 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:35:19 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:35:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  4 02:35:19 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:35:19 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:35:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  4 02:35:19 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:35:19 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:35:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  4 02:35:19 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:35:19 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:35:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  4 02:35:19 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:35:19 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:35:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  4 02:35:19 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:35:19 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:35:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  4 02:35:19 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:35:19 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:35:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  4 02:35:19 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:35:19 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:35:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  4 02:35:19 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:35:19 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:35:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  4 02:35:19 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:35:19 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:35:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf
Jan  4 02:35:19 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:35:19 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:35:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf
Jan  4 02:35:19 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:35:19 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:35:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf
Jan  4 02:35:19 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:35:19 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:35:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf
Jan  4 02:35:19 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:35:19 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:35:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf
Jan  4 02:35:19 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:35:19 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:35:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf
Jan  4 02:35:19 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:35:19 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:35:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf
Jan  4 02:35:20 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:35:20 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:35:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf
Jan  4 02:35:20 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:35:20 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:35:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/palco123/panlys.com/wp-toolkit.conf
Jan  4 02:35:20 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:35:20 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:35:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/palco123/panlys.com/wp-toolkit.conf
Jan  4 02:35:20 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:35:20 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:35:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/palco123/panlys.com/wp-toolkit.conf
Jan  4 02:35:20 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:35:20 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:35:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/palco123/panlys.com/wp-toolkit.conf
Jan  4 02:35:20 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:35:20 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:35:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf
Jan  4 02:35:20 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:35:20 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:35:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf
Jan  4 02:35:20 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:35:20 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:35:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf
Jan  4 02:35:20 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:35:20 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:35:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf
Jan  4 02:35:20 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 02:35:20 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 02:40:31 host sshd[19142]: Invalid user guest from 106.10.122.53 port 58776
Jan  4 02:40:31 host sshd[19142]: input_userauth_request: invalid user guest [preauth]
Jan  4 02:40:32 host sshd[19142]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 02:40:32 host sshd[19142]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53
Jan  4 02:40:34 host sshd[19142]: Failed password for invalid user guest from 106.10.122.53 port 58776 ssh2
Jan  4 02:40:34 host sshd[19142]: Connection closed by 106.10.122.53 port 58776 [preauth]
Jan  4 02:42:33 host sshd[19527]: User root from 143.198.202.66 not allowed because not listed in AllowUsers
Jan  4 02:42:33 host sshd[19527]: input_userauth_request: invalid user root [preauth]
Jan  4 02:42:33 host unix_chkpwd[19529]: password check failed for user (root)
Jan  4 02:42:33 host sshd[19527]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.202.66  user=root
Jan  4 02:42:33 host sshd[19527]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 02:42:35 host sshd[19527]: Failed password for invalid user root from 143.198.202.66 port 54120 ssh2
Jan  4 02:42:35 host sshd[19527]: Received disconnect from 143.198.202.66 port 54120:11: Bye Bye [preauth]
Jan  4 02:42:35 host sshd[19527]: Disconnected from 143.198.202.66 port 54120 [preauth]
Jan  4 02:43:30 host sshd[19646]: Invalid user test from 34.89.123.20 port 54146
Jan  4 02:43:30 host sshd[19646]: input_userauth_request: invalid user test [preauth]
Jan  4 02:43:30 host sshd[19646]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 02:43:30 host sshd[19646]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.89.123.20
Jan  4 02:43:32 host sshd[19646]: Failed password for invalid user test from 34.89.123.20 port 54146 ssh2
Jan  4 02:43:32 host sshd[19646]: Received disconnect from 34.89.123.20 port 54146:11: Bye Bye [preauth]
Jan  4 02:43:32 host sshd[19646]: Disconnected from 34.89.123.20 port 54146 [preauth]
Jan  4 02:47:04 host sshd[20152]: User root from 45.55.129.49 not allowed because not listed in AllowUsers
Jan  4 02:47:04 host sshd[20152]: input_userauth_request: invalid user root [preauth]
Jan  4 02:47:04 host unix_chkpwd[20155]: password check failed for user (root)
Jan  4 02:47:04 host sshd[20152]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.129.49  user=root
Jan  4 02:47:04 host sshd[20152]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 02:47:06 host sshd[20152]: Failed password for invalid user root from 45.55.129.49 port 57844 ssh2
Jan  4 02:47:06 host sshd[20152]: Received disconnect from 45.55.129.49 port 57844:11: Bye Bye [preauth]
Jan  4 02:47:06 host sshd[20152]: Disconnected from 45.55.129.49 port 57844 [preauth]
Jan  4 02:48:05 host sshd[20273]: Invalid user postgres from 143.198.202.66 port 46308
Jan  4 02:48:05 host sshd[20273]: input_userauth_request: invalid user postgres [preauth]
Jan  4 02:48:05 host sshd[20273]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 02:48:05 host sshd[20273]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.202.66
Jan  4 02:48:08 host sshd[20273]: Failed password for invalid user postgres from 143.198.202.66 port 46308 ssh2
Jan  4 02:48:08 host sshd[20273]: Received disconnect from 143.198.202.66 port 46308:11: Bye Bye [preauth]
Jan  4 02:48:08 host sshd[20273]: Disconnected from 143.198.202.66 port 46308 [preauth]
Jan  4 02:48:29 host sshd[20351]: User root from 187.111.28.131 not allowed because not listed in AllowUsers
Jan  4 02:48:29 host sshd[20351]: input_userauth_request: invalid user root [preauth]
Jan  4 02:48:29 host unix_chkpwd[20355]: password check failed for user (root)
Jan  4 02:48:29 host sshd[20351]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.111.28.131  user=root
Jan  4 02:48:29 host sshd[20351]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 02:48:31 host sshd[20351]: Failed password for invalid user root from 187.111.28.131 port 55588 ssh2
Jan  4 02:48:31 host sshd[20351]: Received disconnect from 187.111.28.131 port 55588:11: Bye Bye [preauth]
Jan  4 02:48:31 host sshd[20351]: Disconnected from 187.111.28.131 port 55588 [preauth]
Jan  4 02:49:23 host sshd[20431]: User root from 34.89.123.20 not allowed because not listed in AllowUsers
Jan  4 02:49:23 host sshd[20431]: input_userauth_request: invalid user root [preauth]
Jan  4 02:49:23 host unix_chkpwd[20434]: password check failed for user (root)
Jan  4 02:49:23 host sshd[20431]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.89.123.20  user=root
Jan  4 02:49:23 host sshd[20431]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 02:49:25 host sshd[20431]: Failed password for invalid user root from 34.89.123.20 port 52516 ssh2
Jan  4 02:49:25 host sshd[20431]: Received disconnect from 34.89.123.20 port 52516:11: Bye Bye [preauth]
Jan  4 02:49:25 host sshd[20431]: Disconnected from 34.89.123.20 port 52516 [preauth]
Jan  4 02:49:26 host sshd[20438]: Invalid user fff from 45.55.129.49 port 60548
Jan  4 02:49:26 host sshd[20438]: input_userauth_request: invalid user fff [preauth]
Jan  4 02:49:26 host sshd[20438]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 02:49:26 host sshd[20438]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.129.49
Jan  4 02:49:28 host sshd[20438]: Failed password for invalid user fff from 45.55.129.49 port 60548 ssh2
Jan  4 02:49:28 host sshd[20438]: Received disconnect from 45.55.129.49 port 60548:11: Bye Bye [preauth]
Jan  4 02:49:28 host sshd[20438]: Disconnected from 45.55.129.49 port 60548 [preauth]
Jan  4 02:50:17 host sshd[20635]: User root from 187.111.28.131 not allowed because not listed in AllowUsers
Jan  4 02:50:17 host sshd[20635]: input_userauth_request: invalid user root [preauth]
Jan  4 02:50:17 host unix_chkpwd[20639]: password check failed for user (root)
Jan  4 02:50:17 host sshd[20635]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.111.28.131  user=root
Jan  4 02:50:17 host sshd[20635]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 02:50:19 host sshd[20635]: Failed password for invalid user root from 187.111.28.131 port 55604 ssh2
Jan  4 02:50:19 host sshd[20635]: Received disconnect from 187.111.28.131 port 55604:11: Bye Bye [preauth]
Jan  4 02:50:19 host sshd[20635]: Disconnected from 187.111.28.131 port 55604 [preauth]
Jan  4 02:55:17 host sshd[21374]: Invalid user  from 64.62.197.105 port 20851
Jan  4 02:55:17 host sshd[21374]: input_userauth_request: invalid user  [preauth]
Jan  4 02:55:20 host sshd[21374]: Connection closed by 64.62.197.105 port 20851 [preauth]
Jan  4 02:55:52 host sshd[21438]: Invalid user pi from 149.34.17.216 port 39958
Jan  4 02:55:52 host sshd[21438]: input_userauth_request: invalid user pi [preauth]
Jan  4 02:55:52 host sshd[21437]: Invalid user pi from 149.34.17.216 port 39956
Jan  4 02:55:52 host sshd[21437]: input_userauth_request: invalid user pi [preauth]
Jan  4 02:55:52 host sshd[21438]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 02:55:52 host sshd[21438]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.34.17.216
Jan  4 02:55:52 host sshd[21437]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 02:55:52 host sshd[21437]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.34.17.216
Jan  4 02:55:54 host sshd[21438]: Failed password for invalid user pi from 149.34.17.216 port 39958 ssh2
Jan  4 02:55:54 host sshd[21437]: Failed password for invalid user pi from 149.34.17.216 port 39956 ssh2
Jan  4 02:55:54 host sshd[21438]: Connection closed by 149.34.17.216 port 39958 [preauth]
Jan  4 02:55:54 host sshd[21437]: Connection closed by 149.34.17.216 port 39956 [preauth]
Jan  4 03:00:56 host sshd[22130]: User root from 41.197.31.178 not allowed because not listed in AllowUsers
Jan  4 03:00:56 host sshd[22130]: input_userauth_request: invalid user root [preauth]
Jan  4 03:00:57 host unix_chkpwd[22136]: password check failed for user (root)
Jan  4 03:00:57 host sshd[22130]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178  user=root
Jan  4 03:00:57 host sshd[22130]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 03:00:59 host sshd[22130]: Failed password for invalid user root from 41.197.31.178 port 48066 ssh2
Jan  4 03:00:59 host sshd[22130]: Connection closed by 41.197.31.178 port 48066 [preauth]
Jan  4 03:20:55 host sshd[25091]: Invalid user kafka from 92.46.108.20 port 42308
Jan  4 03:20:55 host sshd[25091]: input_userauth_request: invalid user kafka [preauth]
Jan  4 03:20:56 host sshd[25091]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 03:20:56 host sshd[25091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20
Jan  4 03:20:59 host sshd[25091]: Failed password for invalid user kafka from 92.46.108.20 port 42308 ssh2
Jan  4 03:20:59 host sshd[25091]: Connection closed by 92.46.108.20 port 42308 [preauth]
Jan  4 03:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  4 03:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 03:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 03:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  4 03:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 03:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 03:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  4 03:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 03:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 03:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  4 03:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 03:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 03:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  4 03:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 03:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 03:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  4 03:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 03:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 03:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  4 03:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 03:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 03:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  4 03:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 03:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 03:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  4 03:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 03:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 03:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  4 03:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 03:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 03:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  4 03:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 03:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 03:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  4 03:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 03:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 03:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  4 03:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 03:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 03:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=straightcurve user-2=wwwletsstalkfood user-3=wwwevmhonda user-4=bonifacegroup user-5=mrsclean user-6=wwwnexidigital user-7=phmetals user-8=kottayamcalldriv user-9=palco123 user-10=gifterman user-11=wwwkapin user-12=woodpeck user-13=remysagr user-14=disposeat user-15=wwwkmaorg user-16=pmcresources user-17=shalinijames user-18=wwwtestugo user-19=vfmassets user-20=wwwpmcresource user-21=ugotscom user-22=keralaholi user-23=wwwresourcehunte user-24=wwwrmswll user-25=travelboniface user-26=cochintaxi user-27=wwwkaretakers user-28=laundryboniface user-29=a2zgroup user-30=dartsimp feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  4 03:21:52 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  4 03:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 03:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 03:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  4 03:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 03:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 03:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-jj8JVx2tzNe7ZbUI.~
Jan  4 03:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 03:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 03:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-jj8JVx2tzNe7ZbUI.~'
Jan  4 03:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 03:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 03:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-jj8JVx2tzNe7ZbUI.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  4 03:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 03:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 03:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  4 03:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 03:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 03:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  4 03:21:52 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 03:21:52 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 03:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  4 03:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 03:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 03:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  4 03:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 03:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 03:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  4 03:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 03:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 03:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  4 03:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 03:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 03:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  4 03:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 03:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 03:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  4 03:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  4 03:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  4 03:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  4 03:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  4 03:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  4 03:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  4 03:21:57 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  4 03:21:58 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  4 03:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  4 03:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 03:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 03:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  4 03:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 03:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 03:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  4 03:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 03:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 03:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  4 03:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 03:22:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 03:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  4 03:22:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 03:22:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 03:32:50 host sshd[27651]: Invalid user wangdd from 103.13.40.2 port 42388
Jan  4 03:32:50 host sshd[27651]: input_userauth_request: invalid user wangdd [preauth]
Jan  4 03:32:50 host sshd[27651]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 03:32:50 host sshd[27651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2
Jan  4 03:32:52 host sshd[27651]: Failed password for invalid user wangdd from 103.13.40.2 port 42388 ssh2
Jan  4 03:32:52 host sshd[27651]: Connection closed by 103.13.40.2 port 42388 [preauth]
Jan  4 03:32:57 host sshd[27662]: Invalid user user1 from 162.218.126.136 port 57782
Jan  4 03:32:57 host sshd[27662]: input_userauth_request: invalid user user1 [preauth]
Jan  4 03:32:57 host sshd[27662]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 03:32:57 host sshd[27662]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136
Jan  4 03:33:00 host sshd[27662]: Failed password for invalid user user1 from 162.218.126.136 port 57782 ssh2
Jan  4 03:33:00 host sshd[27662]: Connection closed by 162.218.126.136 port 57782 [preauth]
Jan  4 04:00:23 host sshd[31934]: Invalid user luo from 106.10.122.53 port 55128
Jan  4 04:00:23 host sshd[31934]: input_userauth_request: invalid user luo [preauth]
Jan  4 04:00:23 host sshd[31934]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 04:00:23 host sshd[31934]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53
Jan  4 04:00:25 host sshd[31934]: Failed password for invalid user luo from 106.10.122.53 port 55128 ssh2
Jan  4 04:00:25 host sshd[31934]: Connection closed by 106.10.122.53 port 55128 [preauth]
Jan  4 04:02:04 host sshd[32185]: User root from 45.66.230.87 not allowed because not listed in AllowUsers
Jan  4 04:02:04 host sshd[32185]: input_userauth_request: invalid user root [preauth]
Jan  4 04:02:04 host unix_chkpwd[32189]: password check failed for user (root)
Jan  4 04:02:04 host sshd[32185]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.66.230.87  user=root
Jan  4 04:02:04 host sshd[32185]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 04:02:06 host sshd[32185]: Failed password for invalid user root from 45.66.230.87 port 42090 ssh2
Jan  4 04:02:06 host sshd[32185]: Received disconnect from 45.66.230.87 port 42090:11: Bye Bye [preauth]
Jan  4 04:02:06 host sshd[32185]: Disconnected from 45.66.230.87 port 42090 [preauth]
Jan  4 04:02:07 host sshd[32193]: Invalid user admin from 45.66.230.87 port 46668
Jan  4 04:02:07 host sshd[32193]: input_userauth_request: invalid user admin [preauth]
Jan  4 04:02:07 host sshd[32193]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 04:02:07 host sshd[32193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.66.230.87
Jan  4 04:02:09 host sshd[32193]: Failed password for invalid user admin from 45.66.230.87 port 46668 ssh2
Jan  4 04:02:09 host sshd[32193]: Received disconnect from 45.66.230.87 port 46668:11: Bye Bye [preauth]
Jan  4 04:02:09 host sshd[32193]: Disconnected from 45.66.230.87 port 46668 [preauth]
Jan  4 04:02:10 host sshd[32199]: Invalid user admin from 45.66.230.87 port 50228
Jan  4 04:02:10 host sshd[32199]: input_userauth_request: invalid user admin [preauth]
Jan  4 04:02:10 host sshd[32199]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 04:02:10 host sshd[32199]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.66.230.87
Jan  4 04:02:12 host sshd[32199]: Failed password for invalid user admin from 45.66.230.87 port 50228 ssh2
Jan  4 04:13:46 host sshd[1426]: Connection closed by 167.248.133.44 port 35976 [preauth]
Jan  4 04:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  4 04:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 04:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 04:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  4 04:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 04:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 04:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  4 04:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 04:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 04:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  4 04:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 04:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 04:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  4 04:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 04:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 04:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  4 04:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 04:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 04:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  4 04:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 04:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 04:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  4 04:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 04:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 04:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  4 04:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 04:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 04:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  4 04:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 04:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 04:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  4 04:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 04:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 04:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  4 04:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 04:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 04:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  4 04:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 04:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 04:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=cochintaxi user-2=wwwkaretakers user-3=dartsimp user-4=a2zgroup user-5=laundryboniface user-6=wwwpmcresource user-7=travelboniface user-8=ugotscom user-9=wwwrmswll user-10=keralaholi user-11=wwwresourcehunte user-12=disposeat user-13=wwwkmaorg user-14=remysagr user-15=wwwkapin user-16=woodpeck user-17=wwwtestugo user-18=shalinijames user-19=vfmassets user-20=pmcresources user-21=wwwevmhonda user-22=bonifacegroup user-23=wwwletsstalkfood user-24=straightcurve user-25=kottayamcalldriv user-26=phmetals user-27=gifterman user-28=palco123 user-29=wwwnexidigital user-30=mrsclean feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  4 04:21:52 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  4 04:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 04:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 04:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  4 04:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 04:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 04:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-f1JQpCx3KXddsEAl.~
Jan  4 04:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 04:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 04:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-f1JQpCx3KXddsEAl.~'
Jan  4 04:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 04:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 04:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-f1JQpCx3KXddsEAl.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  4 04:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 04:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 04:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  4 04:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 04:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 04:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  4 04:21:53 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 04:21:53 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 04:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  4 04:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 04:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 04:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  4 04:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 04:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 04:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  4 04:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 04:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 04:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  4 04:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 04:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 04:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  4 04:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 04:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 04:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  4 04:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  4 04:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  4 04:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  4 04:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  4 04:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  4 04:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  4 04:21:58 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  4 04:22:00 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  4 04:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  4 04:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 04:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 04:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  4 04:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 04:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 04:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  4 04:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 04:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 04:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  4 04:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 04:22:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 04:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  4 04:22:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 04:22:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 04:30:36 host sshd[4517]: Invalid user huawei from 41.197.31.178 port 46132
Jan  4 04:30:36 host sshd[4517]: input_userauth_request: invalid user huawei [preauth]
Jan  4 04:30:36 host sshd[4517]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 04:30:36 host sshd[4517]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178
Jan  4 04:30:38 host sshd[4517]: Failed password for invalid user huawei from 41.197.31.178 port 46132 ssh2
Jan  4 04:30:38 host sshd[4517]: Connection closed by 41.197.31.178 port 46132 [preauth]
Jan  4 04:31:55 host sshd[4675]: Invalid user forge from 45.6.99.228 port 58180
Jan  4 04:31:55 host sshd[4675]: input_userauth_request: invalid user forge [preauth]
Jan  4 04:31:55 host sshd[4675]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 04:31:55 host sshd[4675]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.6.99.228
Jan  4 04:31:57 host sshd[4675]: Failed password for invalid user forge from 45.6.99.228 port 58180 ssh2
Jan  4 04:31:57 host sshd[4675]: Received disconnect from 45.6.99.228 port 58180:11: Bye Bye [preauth]
Jan  4 04:31:57 host sshd[4675]: Disconnected from 45.6.99.228 port 58180 [preauth]
Jan  4 04:34:39 host sshd[5090]: Invalid user openproject from 139.59.126.129 port 60824
Jan  4 04:34:39 host sshd[5090]: input_userauth_request: invalid user openproject [preauth]
Jan  4 04:34:39 host sshd[5090]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 04:34:39 host sshd[5090]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.126.129
Jan  4 04:34:41 host sshd[5090]: Failed password for invalid user openproject from 139.59.126.129 port 60824 ssh2
Jan  4 04:34:41 host sshd[5090]: Received disconnect from 139.59.126.129 port 60824:11: Bye Bye [preauth]
Jan  4 04:34:41 host sshd[5090]: Disconnected from 139.59.126.129 port 60824 [preauth]
Jan  4 04:35:01 host sshd[5114]: Invalid user user from 162.218.126.136 port 56516
Jan  4 04:35:01 host sshd[5114]: input_userauth_request: invalid user user [preauth]
Jan  4 04:35:01 host sshd[5114]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 04:35:01 host sshd[5114]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136
Jan  4 04:35:03 host sshd[5114]: Failed password for invalid user user from 162.218.126.136 port 56516 ssh2
Jan  4 04:35:03 host sshd[5114]: Connection closed by 162.218.126.136 port 56516 [preauth]
Jan  4 04:35:10 host sshd[5159]: User root from 45.6.99.228 not allowed because not listed in AllowUsers
Jan  4 04:35:10 host sshd[5159]: input_userauth_request: invalid user root [preauth]
Jan  4 04:35:10 host unix_chkpwd[5163]: password check failed for user (root)
Jan  4 04:35:10 host sshd[5159]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.6.99.228  user=root
Jan  4 04:35:10 host sshd[5159]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 04:35:12 host sshd[5159]: Failed password for invalid user root from 45.6.99.228 port 33850 ssh2
Jan  4 04:35:13 host sshd[5159]: Received disconnect from 45.6.99.228 port 33850:11: Bye Bye [preauth]
Jan  4 04:35:13 host sshd[5159]: Disconnected from 45.6.99.228 port 33850 [preauth]
Jan  4 04:35:25 host sshd[5217]: Invalid user bigdata from 161.35.221.103 port 43550
Jan  4 04:35:25 host sshd[5217]: input_userauth_request: invalid user bigdata [preauth]
Jan  4 04:35:25 host sshd[5217]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 04:35:25 host sshd[5217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.221.103
Jan  4 04:35:26 host sshd[5217]: Failed password for invalid user bigdata from 161.35.221.103 port 43550 ssh2
Jan  4 04:35:27 host sshd[5217]: Received disconnect from 161.35.221.103 port 43550:11: Bye Bye [preauth]
Jan  4 04:35:27 host sshd[5217]: Disconnected from 161.35.221.103 port 43550 [preauth]
Jan  4 04:36:13 host sshd[5314]: Invalid user ftp1 from 219.117.237.123 port 40224
Jan  4 04:36:13 host sshd[5314]: input_userauth_request: invalid user ftp1 [preauth]
Jan  4 04:36:13 host sshd[5314]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 04:36:13 host sshd[5314]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.117.237.123
Jan  4 04:36:15 host sshd[5314]: Failed password for invalid user ftp1 from 219.117.237.123 port 40224 ssh2
Jan  4 04:36:15 host sshd[5314]: Received disconnect from 219.117.237.123 port 40224:11: Bye Bye [preauth]
Jan  4 04:36:15 host sshd[5314]: Disconnected from 219.117.237.123 port 40224 [preauth]
Jan  4 04:37:16 host sshd[5416]: User root from 167.99.114.108 not allowed because not listed in AllowUsers
Jan  4 04:37:16 host sshd[5416]: input_userauth_request: invalid user root [preauth]
Jan  4 04:37:16 host unix_chkpwd[5419]: password check failed for user (root)
Jan  4 04:37:16 host sshd[5416]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.114.108  user=root
Jan  4 04:37:16 host sshd[5416]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 04:37:19 host sshd[5416]: Failed password for invalid user root from 167.99.114.108 port 58840 ssh2
Jan  4 04:37:19 host sshd[5416]: Received disconnect from 167.99.114.108 port 58840:11: Bye Bye [preauth]
Jan  4 04:37:19 host sshd[5416]: Disconnected from 167.99.114.108 port 58840 [preauth]
Jan  4 04:37:59 host sshd[5544]: Invalid user bodega from 161.35.221.103 port 52410
Jan  4 04:37:59 host sshd[5544]: input_userauth_request: invalid user bodega [preauth]
Jan  4 04:37:59 host sshd[5544]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 04:37:59 host sshd[5544]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.221.103
Jan  4 04:38:02 host sshd[5544]: Failed password for invalid user bodega from 161.35.221.103 port 52410 ssh2
Jan  4 04:38:02 host sshd[5544]: Received disconnect from 161.35.221.103 port 52410:11: Bye Bye [preauth]
Jan  4 04:38:02 host sshd[5544]: Disconnected from 161.35.221.103 port 52410 [preauth]
Jan  4 04:38:43 host sshd[5753]: Invalid user ftpadmin from 219.117.237.123 port 58064
Jan  4 04:38:43 host sshd[5753]: input_userauth_request: invalid user ftpadmin [preauth]
Jan  4 04:38:43 host sshd[5753]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 04:38:43 host sshd[5753]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.117.237.123
Jan  4 04:38:44 host sshd[5753]: Failed password for invalid user ftpadmin from 219.117.237.123 port 58064 ssh2
Jan  4 04:38:44 host sshd[5753]: Received disconnect from 219.117.237.123 port 58064:11: Bye Bye [preauth]
Jan  4 04:38:44 host sshd[5753]: Disconnected from 219.117.237.123 port 58064 [preauth]
Jan  4 04:39:11 host sshd[5802]: User root from 161.35.221.103 not allowed because not listed in AllowUsers
Jan  4 04:39:11 host sshd[5802]: input_userauth_request: invalid user root [preauth]
Jan  4 04:39:11 host unix_chkpwd[5806]: password check failed for user (root)
Jan  4 04:39:11 host sshd[5802]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.221.103  user=root
Jan  4 04:39:11 host sshd[5802]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 04:39:13 host sshd[5802]: Failed password for invalid user root from 161.35.221.103 port 51962 ssh2
Jan  4 04:39:13 host sshd[5802]: Received disconnect from 161.35.221.103 port 51962:11: Bye Bye [preauth]
Jan  4 04:39:13 host sshd[5802]: Disconnected from 161.35.221.103 port 51962 [preauth]
Jan  4 04:39:18 host sshd[5843]: Invalid user sdbadmin from 167.99.114.108 port 60210
Jan  4 04:39:18 host sshd[5843]: input_userauth_request: invalid user sdbadmin [preauth]
Jan  4 04:39:18 host sshd[5843]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 04:39:18 host sshd[5843]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.114.108
Jan  4 04:39:19 host sshd[5843]: Failed password for invalid user sdbadmin from 167.99.114.108 port 60210 ssh2
Jan  4 04:39:19 host sshd[5843]: Received disconnect from 167.99.114.108 port 60210:11: Bye Bye [preauth]
Jan  4 04:39:19 host sshd[5843]: Disconnected from 167.99.114.108 port 60210 [preauth]
Jan  4 04:39:21 host sshd[5855]: Invalid user ts3 from 139.59.126.129 port 50090
Jan  4 04:39:21 host sshd[5855]: input_userauth_request: invalid user ts3 [preauth]
Jan  4 04:39:21 host sshd[5855]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 04:39:21 host sshd[5855]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.126.129
Jan  4 04:39:23 host sshd[5855]: Failed password for invalid user ts3 from 139.59.126.129 port 50090 ssh2
Jan  4 04:39:23 host sshd[5855]: Received disconnect from 139.59.126.129 port 50090:11: Bye Bye [preauth]
Jan  4 04:39:23 host sshd[5855]: Disconnected from 139.59.126.129 port 50090 [preauth]
Jan  4 04:39:32 host sshd[5920]: Invalid user rochelle from 193.122.148.73 port 49716
Jan  4 04:39:32 host sshd[5920]: input_userauth_request: invalid user rochelle [preauth]
Jan  4 04:39:32 host sshd[5920]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 04:39:32 host sshd[5920]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.148.73
Jan  4 04:39:33 host sshd[5920]: Failed password for invalid user rochelle from 193.122.148.73 port 49716 ssh2
Jan  4 04:39:33 host sshd[5920]: Received disconnect from 193.122.148.73 port 49716:11: Bye Bye [preauth]
Jan  4 04:39:33 host sshd[5920]: Disconnected from 193.122.148.73 port 49716 [preauth]
Jan  4 04:40:09 host sshd[6007]: User root from 219.117.237.123 not allowed because not listed in AllowUsers
Jan  4 04:40:09 host sshd[6007]: input_userauth_request: invalid user root [preauth]
Jan  4 04:40:09 host unix_chkpwd[6010]: password check failed for user (root)
Jan  4 04:40:09 host sshd[6007]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.117.237.123  user=root
Jan  4 04:40:09 host sshd[6007]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 04:40:11 host sshd[6007]: Failed password for invalid user root from 219.117.237.123 port 44103 ssh2
Jan  4 04:40:11 host sshd[6007]: Received disconnect from 219.117.237.123 port 44103:11: Bye Bye [preauth]
Jan  4 04:40:11 host sshd[6007]: Disconnected from 219.117.237.123 port 44103 [preauth]
Jan  4 04:40:44 host sshd[6125]: Invalid user ubnt from 139.59.126.129 port 45682
Jan  4 04:40:44 host sshd[6125]: input_userauth_request: invalid user ubnt [preauth]
Jan  4 04:40:44 host sshd[6125]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 04:40:44 host sshd[6125]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.126.129
Jan  4 04:40:46 host sshd[6125]: Failed password for invalid user ubnt from 139.59.126.129 port 45682 ssh2
Jan  4 04:40:46 host sshd[6125]: Received disconnect from 139.59.126.129 port 45682:11: Bye Bye [preauth]
Jan  4 04:40:46 host sshd[6125]: Disconnected from 139.59.126.129 port 45682 [preauth]
Jan  4 04:42:21 host sshd[6394]: Invalid user ann from 193.122.148.73 port 49850
Jan  4 04:42:21 host sshd[6394]: input_userauth_request: invalid user ann [preauth]
Jan  4 04:42:21 host sshd[6394]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 04:42:21 host sshd[6394]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.148.73
Jan  4 04:42:23 host sshd[6394]: Failed password for invalid user ann from 193.122.148.73 port 49850 ssh2
Jan  4 04:42:23 host sshd[6394]: Received disconnect from 193.122.148.73 port 49850:11: Bye Bye [preauth]
Jan  4 04:42:23 host sshd[6394]: Disconnected from 193.122.148.73 port 49850 [preauth]
Jan  4 04:44:51 host sshd[6815]: User root from 193.122.148.73 not allowed because not listed in AllowUsers
Jan  4 04:44:51 host sshd[6815]: input_userauth_request: invalid user root [preauth]
Jan  4 04:44:51 host unix_chkpwd[6819]: password check failed for user (root)
Jan  4 04:44:51 host sshd[6815]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.148.73  user=root
Jan  4 04:44:51 host sshd[6815]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 04:44:53 host sshd[6815]: Failed password for invalid user root from 193.122.148.73 port 49964 ssh2
Jan  4 04:44:53 host sshd[6815]: Received disconnect from 193.122.148.73 port 49964:11: Bye Bye [preauth]
Jan  4 04:44:53 host sshd[6815]: Disconnected from 193.122.148.73 port 49964 [preauth]
Jan  4 04:49:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  4 04:49:33 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 04:49:33 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 04:49:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  4 04:49:33 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 04:49:33 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 04:49:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkmaorg ; COMMAND=/bin/cat /home/wwwkmaorg/.wp-toolkit-identifier
Jan  4 04:49:33 host sudo: pam_unix(sudo:session): session opened for user wwwkmaorg by (uid=0)
Jan  4 04:49:33 host sudo: pam_unix(sudo:session): session closed for user wwwkmaorg
Jan  4 04:49:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  4 04:49:33 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 04:49:33 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 04:49:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  4 04:49:33 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 04:49:33 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 04:49:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkmaorg ; COMMAND=/bin/cat /home/wwwkmaorg/.wp-toolkit-identifier
Jan  4 04:49:33 host sudo: pam_unix(sudo:session): session opened for user wwwkmaorg by (uid=0)
Jan  4 04:49:33 host sudo: pam_unix(sudo:session): session closed for user wwwkmaorg
Jan  4 04:49:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cpapi2 --user=wwwkmaorg Locale get_user_locale --output=json
Jan  4 04:49:33 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 04:49:33 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 04:49:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  4 04:49:33 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 04:49:33 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 04:49:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  4 04:49:33 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 04:49:33 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 04:49:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c httpd -v
Jan  4 04:49:33 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 04:49:33 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 04:49:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwkmaorg/crm.kma.org.in/wp-toolkit.conf
Jan  4 04:49:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 04:49:34 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 04:49:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwkmaorg/crm.kma.org.in/wp-toolkit.conf
Jan  4 04:49:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 04:49:34 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 04:49:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwkmaorg/crm.kma.org.in/wp-toolkit.conf
Jan  4 04:49:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 04:49:34 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 04:49:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwkmaorg/kma.org.in/wp-toolkit.conf
Jan  4 04:49:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 04:49:34 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 04:49:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwkmaorg/kma.org.in/wp-toolkit.conf
Jan  4 04:49:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 04:49:34 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 04:49:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwkmaorg/kma.org.in/wp-toolkit.conf
Jan  4 04:49:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 04:49:34 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 04:49:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c find -H /home/wwwkmaorg/public_html/crm -type d -name wp-includes -printf '%h\0'
Jan  4 04:49:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 04:49:34 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 04:51:17 host sshd[7984]: Invalid user sonar from 103.127.67.194 port 46852
Jan  4 04:51:17 host sshd[7984]: input_userauth_request: invalid user sonar [preauth]
Jan  4 04:51:17 host sshd[7984]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 04:51:17 host sshd[7984]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.127.67.194
Jan  4 04:51:19 host sshd[7984]: Failed password for invalid user sonar from 103.127.67.194 port 46852 ssh2
Jan  4 04:51:19 host sshd[7984]: Received disconnect from 103.127.67.194 port 46852:11: Bye Bye [preauth]
Jan  4 04:51:19 host sshd[7984]: Disconnected from 103.127.67.194 port 46852 [preauth]
Jan  4 04:52:25 host sshd[8101]: Invalid user minecraft from 134.122.34.44 port 52803
Jan  4 04:52:25 host sshd[8101]: input_userauth_request: invalid user minecraft [preauth]
Jan  4 04:52:25 host sshd[8101]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 04:52:25 host sshd[8101]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.34.44
Jan  4 04:52:27 host sshd[8101]: Failed password for invalid user minecraft from 134.122.34.44 port 52803 ssh2
Jan  4 04:52:27 host sshd[8101]: Received disconnect from 134.122.34.44 port 52803:11: Bye Bye [preauth]
Jan  4 04:52:27 host sshd[8101]: Disconnected from 134.122.34.44 port 52803 [preauth]
Jan  4 04:53:08 host sshd[8211]: User root from 103.13.40.2 not allowed because not listed in AllowUsers
Jan  4 04:53:08 host sshd[8211]: input_userauth_request: invalid user root [preauth]
Jan  4 04:53:08 host unix_chkpwd[8213]: password check failed for user (root)
Jan  4 04:53:08 host sshd[8211]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2  user=root
Jan  4 04:53:08 host sshd[8211]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 04:53:11 host sshd[8211]: Failed password for invalid user root from 103.13.40.2 port 42662 ssh2
Jan  4 04:53:11 host sshd[8211]: Connection closed by 103.13.40.2 port 42662 [preauth]
Jan  4 04:54:57 host sshd[8554]: User root from 112.133.203.150 not allowed because not listed in AllowUsers
Jan  4 04:54:57 host sshd[8554]: input_userauth_request: invalid user root [preauth]
Jan  4 04:54:57 host unix_chkpwd[8556]: password check failed for user (root)
Jan  4 04:54:57 host sshd[8554]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.133.203.150  user=root
Jan  4 04:54:57 host sshd[8554]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 04:54:59 host sshd[8554]: Failed password for invalid user root from 112.133.203.150 port 47846 ssh2
Jan  4 04:54:59 host sshd[8554]: Received disconnect from 112.133.203.150 port 47846:11: Bye Bye [preauth]
Jan  4 04:54:59 host sshd[8554]: Disconnected from 112.133.203.150 port 47846 [preauth]
Jan  4 04:56:55 host sshd[8796]: User root from 134.122.34.44 not allowed because not listed in AllowUsers
Jan  4 04:56:55 host sshd[8796]: input_userauth_request: invalid user root [preauth]
Jan  4 04:56:55 host unix_chkpwd[8799]: password check failed for user (root)
Jan  4 04:56:55 host sshd[8796]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.34.44  user=root
Jan  4 04:56:55 host sshd[8796]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 04:56:58 host sshd[8796]: Failed password for invalid user root from 134.122.34.44 port 50078 ssh2
Jan  4 04:56:58 host sshd[8796]: Received disconnect from 134.122.34.44 port 50078:11: Bye Bye [preauth]
Jan  4 04:56:58 host sshd[8796]: Disconnected from 134.122.34.44 port 50078 [preauth]
Jan  4 04:58:43 host sshd[9049]: Invalid user test2 from 112.133.203.150 port 56028
Jan  4 04:58:43 host sshd[9049]: input_userauth_request: invalid user test2 [preauth]
Jan  4 04:58:43 host sshd[9049]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 04:58:43 host sshd[9049]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.133.203.150
Jan  4 04:58:45 host sshd[9049]: Failed password for invalid user test2 from 112.133.203.150 port 56028 ssh2
Jan  4 04:58:45 host sshd[9049]: Received disconnect from 112.133.203.150 port 56028:11: Bye Bye [preauth]
Jan  4 04:58:45 host sshd[9049]: Disconnected from 112.133.203.150 port 56028 [preauth]
Jan  4 05:00:08 host sshd[9350]: User root from 103.127.67.194 not allowed because not listed in AllowUsers
Jan  4 05:00:08 host sshd[9350]: input_userauth_request: invalid user root [preauth]
Jan  4 05:00:08 host unix_chkpwd[9352]: password check failed for user (root)
Jan  4 05:00:08 host sshd[9350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.127.67.194  user=root
Jan  4 05:00:08 host sshd[9350]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 05:00:11 host sshd[9350]: Failed password for invalid user root from 103.127.67.194 port 42164 ssh2
Jan  4 05:00:11 host sshd[9350]: Received disconnect from 103.127.67.194 port 42164:11: Bye Bye [preauth]
Jan  4 05:00:11 host sshd[9350]: Disconnected from 103.127.67.194 port 42164 [preauth]
Jan  4 05:00:25 host sshd[9411]: Invalid user service from 194.169.175.102 port 64621
Jan  4 05:00:25 host sshd[9411]: input_userauth_request: invalid user service [preauth]
Jan  4 05:00:25 host sshd[9411]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 05:00:25 host sshd[9411]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.169.175.102
Jan  4 05:00:27 host sshd[9411]: Failed password for invalid user service from 194.169.175.102 port 64621 ssh2
Jan  4 05:00:27 host sshd[9411]: Received disconnect from 194.169.175.102 port 64621:11: Client disconnecting normally [preauth]
Jan  4 05:00:27 host sshd[9411]: Disconnected from 194.169.175.102 port 64621 [preauth]
Jan  4 05:09:12 host sshd[11035]: Connection closed by 169.228.66.212 port 33870 [preauth]
Jan  4 05:10:13 host sshd[11210]: Invalid user ubuntu from 122.170.115.130 port 35882
Jan  4 05:10:13 host sshd[11210]: input_userauth_request: invalid user ubuntu [preauth]
Jan  4 05:10:13 host sshd[11210]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 05:10:13 host sshd[11210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.170.115.130
Jan  4 05:10:15 host sshd[11210]: Failed password for invalid user ubuntu from 122.170.115.130 port 35882 ssh2
Jan  4 05:10:15 host sshd[11210]: Received disconnect from 122.170.115.130 port 35882:11: Bye Bye [preauth]
Jan  4 05:10:15 host sshd[11210]: Disconnected from 122.170.115.130 port 35882 [preauth]
Jan  4 05:10:56 host sshd[11425]: Invalid user ubuntu from 147.182.218.64 port 52460
Jan  4 05:10:56 host sshd[11425]: input_userauth_request: invalid user ubuntu [preauth]
Jan  4 05:10:56 host sshd[11425]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 05:10:56 host sshd[11425]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.182.218.64
Jan  4 05:10:58 host sshd[11425]: Failed password for invalid user ubuntu from 147.182.218.64 port 52460 ssh2
Jan  4 05:10:58 host sshd[11425]: Received disconnect from 147.182.218.64 port 52460:11: Bye Bye [preauth]
Jan  4 05:10:58 host sshd[11425]: Disconnected from 147.182.218.64 port 52460 [preauth]
Jan  4 05:11:22 host sshd[11492]: User root from 104.131.91.148 not allowed because not listed in AllowUsers
Jan  4 05:11:22 host sshd[11492]: input_userauth_request: invalid user root [preauth]
Jan  4 05:11:22 host unix_chkpwd[11521]: password check failed for user (root)
Jan  4 05:11:22 host sshd[11492]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.91.148  user=root
Jan  4 05:11:22 host sshd[11492]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 05:11:24 host sshd[11492]: Failed password for invalid user root from 104.131.91.148 port 35500 ssh2
Jan  4 05:11:24 host sshd[11492]: Received disconnect from 104.131.91.148 port 35500:11: Bye Bye [preauth]
Jan  4 05:11:24 host sshd[11492]: Disconnected from 104.131.91.148 port 35500 [preauth]
Jan  4 05:13:29 host sshd[11869]: User root from 159.65.41.104 not allowed because not listed in AllowUsers
Jan  4 05:13:29 host sshd[11869]: input_userauth_request: invalid user root [preauth]
Jan  4 05:13:30 host unix_chkpwd[11872]: password check failed for user (root)
Jan  4 05:13:30 host sshd[11869]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.41.104  user=root
Jan  4 05:13:30 host sshd[11869]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 05:13:31 host sshd[11869]: Failed password for invalid user root from 159.65.41.104 port 38760 ssh2
Jan  4 05:13:32 host sshd[11869]: Received disconnect from 159.65.41.104 port 38760:11: Bye Bye [preauth]
Jan  4 05:13:32 host sshd[11869]: Disconnected from 159.65.41.104 port 38760 [preauth]
Jan  4 05:14:58 host sshd[12024]: Invalid user leonardo from 147.182.218.64 port 48968
Jan  4 05:14:58 host sshd[12024]: input_userauth_request: invalid user leonardo [preauth]
Jan  4 05:14:58 host sshd[12024]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 05:14:58 host sshd[12024]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.182.218.64
Jan  4 05:15:00 host sshd[12024]: Failed password for invalid user leonardo from 147.182.218.64 port 48968 ssh2
Jan  4 05:15:01 host sshd[12024]: Received disconnect from 147.182.218.64 port 48968:11: Bye Bye [preauth]
Jan  4 05:15:01 host sshd[12024]: Disconnected from 147.182.218.64 port 48968 [preauth]
Jan  4 05:15:12 host sshd[12059]: User root from 104.131.91.148 not allowed because not listed in AllowUsers
Jan  4 05:15:12 host sshd[12059]: input_userauth_request: invalid user root [preauth]
Jan  4 05:15:12 host unix_chkpwd[12062]: password check failed for user (root)
Jan  4 05:15:12 host sshd[12059]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.91.148  user=root
Jan  4 05:15:12 host sshd[12059]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 05:15:14 host sshd[12059]: Failed password for invalid user root from 104.131.91.148 port 58734 ssh2
Jan  4 05:15:14 host sshd[12059]: Received disconnect from 104.131.91.148 port 58734:11: Bye Bye [preauth]
Jan  4 05:15:14 host sshd[12059]: Disconnected from 104.131.91.148 port 58734 [preauth]
Jan  4 05:15:23 host sshd[12221]: Invalid user ec2-user from 159.65.41.104 port 43534
Jan  4 05:15:23 host sshd[12221]: input_userauth_request: invalid user ec2-user [preauth]
Jan  4 05:15:23 host sshd[12221]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 05:15:23 host sshd[12221]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.41.104
Jan  4 05:15:25 host sshd[12221]: Failed password for invalid user ec2-user from 159.65.41.104 port 43534 ssh2
Jan  4 05:15:26 host sshd[12221]: Received disconnect from 159.65.41.104 port 43534:11: Bye Bye [preauth]
Jan  4 05:15:26 host sshd[12221]: Disconnected from 159.65.41.104 port 43534 [preauth]
Jan  4 05:15:29 host sshd[12253]: Invalid user worker from 122.170.115.130 port 41120
Jan  4 05:15:29 host sshd[12253]: input_userauth_request: invalid user worker [preauth]
Jan  4 05:15:29 host sshd[12253]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 05:15:29 host sshd[12253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.170.115.130
Jan  4 05:15:32 host sshd[12253]: Failed password for invalid user worker from 122.170.115.130 port 41120 ssh2
Jan  4 05:15:32 host sshd[12253]: Received disconnect from 122.170.115.130 port 41120:11: Bye Bye [preauth]
Jan  4 05:15:32 host sshd[12253]: Disconnected from 122.170.115.130 port 41120 [preauth]
Jan  4 05:16:07 host sshd[12345]: Invalid user zte from 147.182.218.64 port 48906
Jan  4 05:16:07 host sshd[12345]: input_userauth_request: invalid user zte [preauth]
Jan  4 05:16:07 host sshd[12345]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 05:16:07 host sshd[12345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.182.218.64
Jan  4 05:16:08 host sshd[12345]: Failed password for invalid user zte from 147.182.218.64 port 48906 ssh2
Jan  4 05:16:08 host sshd[12345]: Received disconnect from 147.182.218.64 port 48906:11: Bye Bye [preauth]
Jan  4 05:16:08 host sshd[12345]: Disconnected from 147.182.218.64 port 48906 [preauth]
Jan  4 05:16:54 host sshd[12473]: Invalid user oracle from 122.170.115.130 port 49002
Jan  4 05:16:54 host sshd[12473]: input_userauth_request: invalid user oracle [preauth]
Jan  4 05:16:54 host sshd[12473]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 05:16:54 host sshd[12473]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.170.115.130
Jan  4 05:16:56 host sshd[12473]: Failed password for invalid user oracle from 122.170.115.130 port 49002 ssh2
Jan  4 05:20:24 host sshd[12966]: User root from 106.10.122.53 not allowed because not listed in AllowUsers
Jan  4 05:20:24 host sshd[12966]: input_userauth_request: invalid user root [preauth]
Jan  4 05:20:25 host unix_chkpwd[12968]: password check failed for user (root)
Jan  4 05:20:25 host sshd[12966]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53  user=root
Jan  4 05:20:25 host sshd[12966]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 05:20:27 host sshd[12966]: Failed password for invalid user root from 106.10.122.53 port 46992 ssh2
Jan  4 05:20:27 host sshd[12966]: Connection closed by 106.10.122.53 port 46992 [preauth]
Jan  4 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  4 05:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 05:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  4 05:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 05:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  4 05:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 05:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  4 05:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 05:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  4 05:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 05:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  4 05:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 05:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  4 05:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 05:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  4 05:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 05:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  4 05:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 05:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  4 05:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 05:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  4 05:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 05:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  4 05:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 05:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  4 05:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 05:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=ugotscom user-3=keralaholi user-4=wwwresourcehunte user-5=wwwrmswll user-6=travelboniface user-7=cochintaxi user-8=wwwkaretakers user-9=laundryboniface user-10=a2zgroup user-11=dartsimp user-12=straightcurve user-13=wwwletsstalkfood user-14=wwwevmhonda user-15=bonifacegroup user-16=mrsclean user-17=wwwnexidigital user-18=phmetals user-19=kottayamcalldriv user-20=palco123 user-21=gifterman user-22=woodpeck user-23=wwwkapin user-24=disposeat user-25=wwwkmaorg user-26=remysagr user-27=pmcresources user-28=shalinijames user-29=wwwtestugo user-30=vfmassets feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  4 05:21:52 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  4 05:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 05:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  4 05:21:53 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 05:21:53 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=evmhonda.com --output=json
Jan  4 05:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 05:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/test -e /home/wwwevmhonda/wordpress-backups
Jan  4 05:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  4 05:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  4 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && find -H /home/wwwevmhonda/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  4 05:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  4 05:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  4 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=letsstalkfood.com --output=json
Jan  4 05:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 05:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/wordpress-backups
Jan  4 05:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  4 05:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  4 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && find -H /home/wwwletsstalkfood/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  4 05:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  4 05:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  4 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=mrsclean.co.in --output=json
Jan  4 05:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 05:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/wordpress-backups
Jan  4 05:21:53 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  4 05:21:53 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  4 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/backup && find -H /home/mrsclean/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  4 05:21:53 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  4 05:21:53 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  4 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/wordpress-backups
Jan  4 05:21:53 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  4 05:21:53 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  4 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/blog && find -H /home/mrsclean/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  4 05:21:53 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  4 05:21:53 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  4 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=shalinijames.com --output=json
Jan  4 05:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 05:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/wordpress-backups
Jan  4 05:21:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  4 05:21:54 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  4 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && find -H /home/shalinijames/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  4 05:21:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  4 05:21:54 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  4 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=testugo.in --output=json
Jan  4 05:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 05:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups
Jan  4 05:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 05:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && find -H /home/wwwtestugo/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  4 05:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 05:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups
Jan  4 05:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 05:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && find -H /home/wwwtestugo/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  4 05:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 05:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups
Jan  4 05:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 05:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && find -H /home/wwwtestugo/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  4 05:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 05:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=ugotechnologies.com --output=json
Jan  4 05:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 05:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups
Jan  4 05:21:54 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 05:21:54 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/boniface/blog && find -H /home/ugotscom/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  4 05:21:54 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 05:21:54 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups
Jan  4 05:21:54 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 05:21:54 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && find -H /home/ugotscom/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  4 05:21:54 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 05:21:54 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups
Jan  4 05:21:54 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 05:21:54 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && find -H /home/ugotscom/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  4 05:21:54 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 05:21:54 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=woodpeckerindia.com --output=json
Jan  4 05:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 05:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/test -e /home/woodpeck/wordpress-backups
Jan  4 05:21:55 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0)
Jan  4 05:21:55 host sudo: pam_unix(sudo:session): session closed for user woodpeck
Jan  4 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html/wp && find -H /home/woodpeck/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  4 05:21:55 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0)
Jan  4 05:21:55 host sudo: pam_unix(sudo:session): session closed for user woodpeck
Jan  4 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=panlys.com --output=json
Jan  4 05:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 05:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/wordpress-backups
Jan  4 05:21:55 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  4 05:21:55 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  4 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && find -H /home/palco123/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  4 05:21:55 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  4 05:21:55 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  4 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=resourcehunters.com --output=json
Jan  4 05:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 05:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/test -e /home/wwwresourcehunte/wordpress-backups
Jan  4 05:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  4 05:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  4 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && find -H /home/wwwresourcehunte/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  4 05:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  4 05:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  4 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /var/cpanel/licenseid_credentials.json
Jan  4 05:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 05:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  4 05:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 05:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwpmcresource ; COMMAND=/bin/cat /home/wwwpmcresource/.wp-toolkit-identifier
Jan  4 05:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwpmcresource by (uid=0)
Jan  4 05:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwpmcresource
Jan  4 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/cat /home/keralaholi/.wp-toolkit-identifier
Jan  4 05:21:55 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0)
Jan  4 05:21:55 host sudo: pam_unix(sudo:session): session closed for user keralaholi
Jan  4 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -f /home/keralaholi/.wp-toolkit-identifier
Jan  4 05:21:55 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0)
Jan  4 05:21:55 host sudo: pam_unix(sudo:session): session closed for user keralaholi
Jan  4 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -e /home/keralaholi/-wpt-tmp-7Cpwqd1tu65g1Ybi.wp-toolkit-identifier
Jan  4 05:21:55 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0)
Jan  4 05:21:55 host sudo: pam_unix(sudo:session): session closed for user keralaholi
Jan  4 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/sh -c cat > /home/keralaholi/-wpt-tmp-7Cpwqd1tu65g1Ybi.wp-toolkit-identifier
Jan  4 05:21:55 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0)
Jan  4 05:21:55 host sudo: pam_unix(sudo:session): session closed for user keralaholi
Jan  4 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/cat /home/wwwresourcehunte/.wp-toolkit-identifier
Jan  4 05:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  4 05:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  4 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwrmswll ; COMMAND=/bin/cat /home/wwwrmswll/.wp-toolkit-identifier
Jan  4 05:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwrmswll by (uid=0)
Jan  4 05:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwrmswll
Jan  4 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=travelboniface ; COMMAND=/bin/cat /home/travelboniface/.wp-toolkit-identifier
Jan  4 05:21:55 host sudo: pam_unix(sudo:session): session opened for user travelboniface by (uid=0)
Jan  4 05:21:55 host sudo: pam_unix(sudo:session): session closed for user travelboniface
Jan  4 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=cochintaxi ; COMMAND=/bin/cat /home/cochintaxi/.wp-toolkit-identifier
Jan  4 05:21:55 host sudo: pam_unix(sudo:session): session opened for user cochintaxi by (uid=0)
Jan  4 05:21:55 host sudo: pam_unix(sudo:session): session closed for user cochintaxi
Jan  4 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkaretakers ; COMMAND=/bin/cat /home/wwwkaretakers/.wp-toolkit-identifier
Jan  4 05:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwkaretakers by (uid=0)
Jan  4 05:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwkaretakers
Jan  4 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=laundryboniface ; COMMAND=/bin/cat /home/laundryboniface/.wp-toolkit-identifier
Jan  4 05:21:56 host sudo: pam_unix(sudo:session): session opened for user laundryboniface by (uid=0)
Jan  4 05:21:56 host sudo: pam_unix(sudo:session): session closed for user laundryboniface
Jan  4 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=a2zgroup ; COMMAND=/bin/cat /home/a2zgroup/.wp-toolkit-identifier
Jan  4 05:21:56 host sudo: pam_unix(sudo:session): session opened for user a2zgroup by (uid=0)
Jan  4 05:21:56 host sudo: pam_unix(sudo:session): session closed for user a2zgroup
Jan  4 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=dartsimp ; COMMAND=/bin/cat /home/dartsimp/.wp-toolkit-identifier
Jan  4 05:21:56 host sudo: pam_unix(sudo:session): session opened for user dartsimp by (uid=0)
Jan  4 05:21:56 host sudo: pam_unix(sudo:session): session closed for user dartsimp
Jan  4 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=straightcurve ; COMMAND=/bin/cat /home/straightcurve/.wp-toolkit-identifier
Jan  4 05:21:56 host sudo: pam_unix(sudo:session): session opened for user straightcurve by (uid=0)
Jan  4 05:21:56 host sudo: pam_unix(sudo:session): session closed for user straightcurve
Jan  4 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/cat /home/wwwletsstalkfood/.wp-toolkit-identifier
Jan  4 05:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  4 05:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  4 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/cat /home/wwwevmhonda/.wp-toolkit-identifier
Jan  4 05:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  4 05:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  4 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=bonifacegroup ; COMMAND=/bin/cat /home/bonifacegroup/.wp-toolkit-identifier
Jan  4 05:21:56 host sudo: pam_unix(sudo:session): session opened for user bonifacegroup by (uid=0)
Jan  4 05:21:56 host sudo: pam_unix(sudo:session): session closed for user bonifacegroup
Jan  4 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/cat /home/mrsclean/.wp-toolkit-identifier
Jan  4 05:21:56 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  4 05:21:56 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  4 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwnexidigital ; COMMAND=/bin/cat /home/wwwnexidigital/.wp-toolkit-identifier
Jan  4 05:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwnexidigital by (uid=0)
Jan  4 05:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwnexidigital
Jan  4 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=phmetals ; COMMAND=/bin/cat /home/phmetals/.wp-toolkit-identifier
Jan  4 05:21:56 host sudo: pam_unix(sudo:session): session opened for user phmetals by (uid=0)
Jan  4 05:21:56 host sudo: pam_unix(sudo:session): session closed for user phmetals
Jan  4 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=kottayamcalldriv ; COMMAND=/bin/cat /home/kottayamcalldriv/.wp-toolkit-identifier
Jan  4 05:21:56 host sudo: pam_unix(sudo:session): session opened for user kottayamcalldriv by (uid=0)
Jan  4 05:21:56 host sudo: pam_unix(sudo:session): session closed for user kottayamcalldriv
Jan  4 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/cat /home/palco123/.wp-toolkit-identifier
Jan  4 05:21:56 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  4 05:21:56 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  4 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=gifterman ; COMMAND=/bin/cat /home/gifterman/.wp-toolkit-identifier
Jan  4 05:21:56 host sudo: pam_unix(sudo:session): session opened for user gifterman by (uid=0)
Jan  4 05:21:56 host sudo: pam_unix(sudo:session): session closed for user gifterman
Jan  4 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/cat /home/woodpeck/.wp-toolkit-identifier
Jan  4 05:21:56 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0)
Jan  4 05:21:56 host sudo: pam_unix(sudo:session): session closed for user woodpeck
Jan  4 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkapin ; COMMAND=/bin/cat /home/wwwkapin/.wp-toolkit-identifier
Jan  4 05:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwkapin by (uid=0)
Jan  4 05:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwkapin
Jan  4 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=disposeat ; COMMAND=/bin/cat /home/disposeat/.wp-toolkit-identifier
Jan  4 05:21:56 host sudo: pam_unix(sudo:session): session opened for user disposeat by (uid=0)
Jan  4 05:21:56 host sudo: pam_unix(sudo:session): session closed for user disposeat
Jan  4 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkmaorg ; COMMAND=/bin/cat /home/wwwkmaorg/.wp-toolkit-identifier
Jan  4 05:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwkmaorg by (uid=0)
Jan  4 05:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwkmaorg
Jan  4 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=remysagr ; COMMAND=/bin/cat /home/remysagr/.wp-toolkit-identifier
Jan  4 05:21:56 host sudo: pam_unix(sudo:session): session opened for user remysagr by (uid=0)
Jan  4 05:21:56 host sudo: pam_unix(sudo:session): session closed for user remysagr
Jan  4 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=pmcresources ; COMMAND=/bin/cat /home/pmcresources/.wp-toolkit-identifier
Jan  4 05:21:56 host sudo: pam_unix(sudo:session): session opened for user pmcresources by (uid=0)
Jan  4 05:21:56 host sudo: pam_unix(sudo:session): session closed for user pmcresources
Jan  4 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/cat /home/shalinijames/.wp-toolkit-identifier
Jan  4 05:21:56 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  4 05:21:56 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  4 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/cat /home/wwwtestugo/.wp-toolkit-identifier
Jan  4 05:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 05:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=vfmassets ; COMMAND=/bin/cat /home/vfmassets/.wp-toolkit-identifier
Jan  4 05:21:57 host sudo: pam_unix(sudo:session): session opened for user vfmassets by (uid=0)
Jan  4 05:21:57 host sudo: pam_unix(sudo:session): session closed for user vfmassets
Jan  4 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/cat /home/keralaholi/.wp-toolkit-identifier
Jan  4 05:21:57 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0)
Jan  4 05:21:57 host sudo: pam_unix(sudo:session): session closed for user keralaholi
Jan  4 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -f /home/keralaholi/.wp-toolkit-identifier
Jan  4 05:21:57 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0)
Jan  4 05:21:57 host sudo: pam_unix(sudo:session): session closed for user keralaholi
Jan  4 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -e /home/keralaholi/-wpt-tmp-rfQqNsbIQ8LJICr5.wp-toolkit-identifier
Jan  4 05:21:57 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0)
Jan  4 05:21:57 host sudo: pam_unix(sudo:session): session closed for user keralaholi
Jan  4 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/sh -c cat > /home/keralaholi/-wpt-tmp-rfQqNsbIQ8LJICr5.wp-toolkit-identifier
Jan  4 05:21:57 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0)
Jan  4 05:21:57 host sudo: pam_unix(sudo:session): session closed for user keralaholi
Jan  4 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_shared_ip --output=json
Jan  4 05:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 05:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_public_ip ip=167.71.234.10 --output=json
Jan  4 05:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 05:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  4 05:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 05:21:59 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-3XE5CZRQCn25Mnak.~
Jan  4 05:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 05:22:00 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-3XE5CZRQCn25Mnak.~'
Jan  4 05:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 05:22:00 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-3XE5CZRQCn25Mnak.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  4 05:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 05:22:00 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  4 05:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 05:22:00 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  4 05:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 05:22:00 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  4 05:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 05:22:00 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  4 05:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 05:22:00 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  4 05:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 05:22:00 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  4 05:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 05:22:02 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  4 05:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  4 05:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  4 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  4 05:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  4 05:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  4 05:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  4 05:22:05 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  4 05:22:07 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  4 05:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  4 05:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 05:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 05:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  4 05:22:08 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 05:22:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 05:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  4 05:22:09 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 05:22:11 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 05:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  4 05:22:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 05:22:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 05:22:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  4 05:22:13 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 05:22:14 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 05:35:37 host sshd[15770]: User root from 41.65.19.86 not allowed because not listed in AllowUsers
Jan  4 05:35:37 host sshd[15770]: input_userauth_request: invalid user root [preauth]
Jan  4 05:35:37 host unix_chkpwd[15773]: password check failed for user (root)
Jan  4 05:35:37 host sshd[15770]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.65.19.86  user=root
Jan  4 05:35:37 host sshd[15770]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 05:35:39 host sshd[15770]: Failed password for invalid user root from 41.65.19.86 port 37356 ssh2
Jan  4 05:35:39 host sshd[15770]: Received disconnect from 41.65.19.86 port 37356:11: Bye Bye [preauth]
Jan  4 05:35:39 host sshd[15770]: Disconnected from 41.65.19.86 port 37356 [preauth]
Jan  4 05:38:37 host sshd[16174]: User root from 41.65.19.86 not allowed because not listed in AllowUsers
Jan  4 05:38:37 host sshd[16174]: input_userauth_request: invalid user root [preauth]
Jan  4 05:38:37 host unix_chkpwd[16179]: password check failed for user (root)
Jan  4 05:38:37 host sshd[16174]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.65.19.86  user=root
Jan  4 05:38:37 host sshd[16174]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 05:38:38 host sshd[16174]: Failed password for invalid user root from 41.65.19.86 port 37490 ssh2
Jan  4 05:38:39 host sshd[16174]: Received disconnect from 41.65.19.86 port 37490:11: Bye Bye [preauth]
Jan  4 05:38:39 host sshd[16174]: Disconnected from 41.65.19.86 port 37490 [preauth]
Jan  4 05:41:24 host sshd[16666]: Invalid user zjc from 162.218.126.136 port 59846
Jan  4 05:41:24 host sshd[16666]: input_userauth_request: invalid user zjc [preauth]
Jan  4 05:41:24 host sshd[16666]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 05:41:24 host sshd[16666]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136
Jan  4 05:41:26 host sshd[16666]: Failed password for invalid user zjc from 162.218.126.136 port 59846 ssh2
Jan  4 05:41:26 host sshd[16666]: Connection closed by 162.218.126.136 port 59846 [preauth]
Jan  4 05:55:54 host sshd[19317]: Invalid user jessalyn from 38.54.27.45 port 59364
Jan  4 05:55:54 host sshd[19317]: input_userauth_request: invalid user jessalyn [preauth]
Jan  4 05:55:54 host sshd[19317]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 05:55:54 host sshd[19317]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=38.54.27.45
Jan  4 05:55:55 host sshd[19317]: Failed password for invalid user jessalyn from 38.54.27.45 port 59364 ssh2
Jan  4 05:55:55 host sshd[19317]: Received disconnect from 38.54.27.45 port 59364:11: Bye Bye [preauth]
Jan  4 05:55:55 host sshd[19317]: Disconnected from 38.54.27.45 port 59364 [preauth]
Jan  4 05:57:57 host sshd[19660]: Invalid user test2 from 38.54.27.45 port 54620
Jan  4 05:57:57 host sshd[19660]: input_userauth_request: invalid user test2 [preauth]
Jan  4 05:57:57 host sshd[19660]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 05:57:57 host sshd[19660]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=38.54.27.45
Jan  4 05:57:59 host sshd[19660]: Failed password for invalid user test2 from 38.54.27.45 port 54620 ssh2
Jan  4 05:58:00 host sshd[19660]: Received disconnect from 38.54.27.45 port 54620:11: Bye Bye [preauth]
Jan  4 05:58:00 host sshd[19660]: Disconnected from 38.54.27.45 port 54620 [preauth]
Jan  4 05:59:11 host sshd[19818]: Invalid user ftpuser2 from 38.54.27.45 port 41356
Jan  4 05:59:11 host sshd[19818]: input_userauth_request: invalid user ftpuser2 [preauth]
Jan  4 05:59:11 host sshd[19818]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 05:59:11 host sshd[19818]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=38.54.27.45
Jan  4 05:59:13 host sshd[19818]: Failed password for invalid user ftpuser2 from 38.54.27.45 port 41356 ssh2
Jan  4 05:59:14 host sshd[19818]: Received disconnect from 38.54.27.45 port 41356:11: Bye Bye [preauth]
Jan  4 05:59:14 host sshd[19818]: Disconnected from 38.54.27.45 port 41356 [preauth]
Jan  4 05:59:41 host sshd[19918]: Invalid user ljx from 41.197.31.178 port 58946
Jan  4 05:59:41 host sshd[19918]: input_userauth_request: invalid user ljx [preauth]
Jan  4 05:59:41 host sshd[19918]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 05:59:41 host sshd[19918]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178
Jan  4 05:59:44 host sshd[19918]: Failed password for invalid user ljx from 41.197.31.178 port 58946 ssh2
Jan  4 05:59:45 host sshd[19918]: Connection closed by 41.197.31.178 port 58946 [preauth]
Jan  4 06:01:16 host sshd[20234]: User root from 92.46.108.20 not allowed because not listed in AllowUsers
Jan  4 06:01:16 host sshd[20234]: input_userauth_request: invalid user root [preauth]
Jan  4 06:01:17 host unix_chkpwd[20241]: password check failed for user (root)
Jan  4 06:01:17 host sshd[20234]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20  user=root
Jan  4 06:01:17 host sshd[20234]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 06:01:20 host sshd[20234]: Failed password for invalid user root from 92.46.108.20 port 46818 ssh2
Jan  4 06:01:20 host sshd[20234]: Connection closed by 92.46.108.20 port 46818 [preauth]
Jan  4 06:13:52 host sshd[22116]: Invalid user test01 from 103.13.40.2 port 55100
Jan  4 06:13:52 host sshd[22116]: input_userauth_request: invalid user test01 [preauth]
Jan  4 06:13:52 host sshd[22116]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 06:13:52 host sshd[22116]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2
Jan  4 06:13:54 host sshd[22116]: Failed password for invalid user test01 from 103.13.40.2 port 55100 ssh2
Jan  4 06:13:54 host sshd[22116]: Connection closed by 103.13.40.2 port 55100 [preauth]
Jan  4 06:15:37 host sshd[22375]: Invalid user arthur from 107.189.30.59 port 51592
Jan  4 06:15:37 host sshd[22375]: input_userauth_request: invalid user arthur [preauth]
Jan  4 06:15:37 host sshd[22375]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 06:15:37 host sshd[22375]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59
Jan  4 06:15:39 host sshd[22375]: Failed password for invalid user arthur from 107.189.30.59 port 51592 ssh2
Jan  4 06:15:40 host sshd[22375]: Connection closed by 107.189.30.59 port 51592 [preauth]
Jan  4 06:15:54 host sshd[22395]: Connection closed by 45.33.80.243 port 28842 [preauth]
Jan  4 06:15:55 host sshd[22402]: Did not receive identification string from 45.33.80.243 port 60938
Jan  4 06:15:59 host sshd[22404]: Connection closed by 45.33.80.243 port 60950 [preauth]
Jan  4 06:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  4 06:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 06:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 06:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  4 06:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 06:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 06:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  4 06:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 06:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 06:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  4 06:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 06:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 06:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  4 06:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 06:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 06:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  4 06:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 06:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 06:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  4 06:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 06:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 06:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  4 06:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 06:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 06:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  4 06:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 06:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 06:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  4 06:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 06:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 06:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  4 06:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 06:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 06:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  4 06:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 06:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 06:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  4 06:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 06:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 06:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=wwwrmswll user-3=wwwresourcehunte user-4=keralaholi user-5=ugotscom user-6=travelboniface user-7=wwwkaretakers user-8=cochintaxi user-9=laundryboniface user-10=dartsimp user-11=a2zgroup user-12=straightcurve user-13=wwwletsstalkfood user-14=bonifacegroup user-15=wwwevmhonda user-16=mrsclean user-17=wwwnexidigital user-18=gifterman user-19=palco123 user-20=kottayamcalldriv user-21=phmetals user-22=woodpeck user-23=wwwkapin user-24=wwwkmaorg user-25=disposeat user-26=remysagr user-27=pmcresources user-28=vfmassets user-29=wwwtestugo user-30=shalinijames feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  4 06:21:52 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  4 06:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 06:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 06:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  4 06:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 06:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 06:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-pELOd6j9J5iOSbvi.~
Jan  4 06:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 06:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 06:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-pELOd6j9J5iOSbvi.~'
Jan  4 06:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 06:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 06:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-pELOd6j9J5iOSbvi.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  4 06:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 06:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 06:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  4 06:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 06:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 06:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  4 06:21:53 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 06:21:53 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 06:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  4 06:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 06:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 06:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  4 06:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 06:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 06:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  4 06:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 06:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 06:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  4 06:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 06:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 06:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  4 06:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 06:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 06:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  4 06:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  4 06:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  4 06:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  4 06:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  4 06:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  4 06:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  4 06:21:58 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  4 06:22:00 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  4 06:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  4 06:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 06:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 06:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  4 06:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 06:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 06:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  4 06:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 06:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 06:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  4 06:22:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 06:22:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 06:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  4 06:22:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 06:22:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 06:40:35 host sshd[26926]: Invalid user apache from 106.10.122.53 port 52718
Jan  4 06:40:35 host sshd[26926]: input_userauth_request: invalid user apache [preauth]
Jan  4 06:40:36 host sshd[26926]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 06:40:36 host sshd[26926]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53
Jan  4 06:40:37 host sshd[26926]: Failed password for invalid user apache from 106.10.122.53 port 52718 ssh2
Jan  4 06:40:37 host sshd[26926]: Connection closed by 106.10.122.53 port 52718 [preauth]
Jan  4 06:42:59 host sshd[27234]: User root from 162.218.126.136 not allowed because not listed in AllowUsers
Jan  4 06:42:59 host sshd[27234]: input_userauth_request: invalid user root [preauth]
Jan  4 06:43:00 host unix_chkpwd[27237]: password check failed for user (root)
Jan  4 06:43:00 host sshd[27234]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136  user=root
Jan  4 06:43:00 host sshd[27234]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 06:43:02 host sshd[27234]: Failed password for invalid user root from 162.218.126.136 port 33304 ssh2
Jan  4 06:43:02 host sshd[27234]: Connection closed by 162.218.126.136 port 33304 [preauth]
Jan  4 07:06:38 host sshd[30795]: Bad protocol version identification 'CONNECT www.google.com:443 HTTP/1.1' from 164.92.67.54 port 57960
Jan  4 07:18:45 host sshd[325]: Did not receive identification string from 154.89.5.78 port 39380
Jan  4 07:18:59 host sshd[326]: Connection closed by 154.89.5.78 port 39396 [preauth]
Jan  4 07:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  4 07:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 07:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 07:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  4 07:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 07:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 07:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  4 07:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 07:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 07:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  4 07:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 07:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 07:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  4 07:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 07:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 07:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  4 07:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 07:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 07:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  4 07:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 07:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 07:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  4 07:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 07:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 07:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  4 07:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 07:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 07:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  4 07:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 07:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 07:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  4 07:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 07:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 07:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  4 07:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 07:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 07:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  4 07:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 07:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 07:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=disposeat user-2=wwwkmaorg user-3=remysagr user-4=wwwkapin user-5=woodpeck user-6=vfmassets user-7=wwwtestugo user-8=shalinijames user-9=pmcresources user-10=bonifacegroup user-11=wwwevmhonda user-12=straightcurve user-13=wwwletsstalkfood user-14=gifterman user-15=palco123 user-16=phmetals user-17=kottayamcalldriv user-18=mrsclean user-19=wwwnexidigital user-20=wwwkaretakers user-21=cochintaxi user-22=dartsimp user-23=a2zgroup user-24=laundryboniface user-25=wwwpmcresource user-26=travelboniface user-27=wwwrmswll user-28=wwwresourcehunte user-29=keralaholi user-30=ugotscom feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  4 07:21:53 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  4 07:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 07:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 07:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  4 07:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 07:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 07:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-DGLVqWyhErJh53Kg.~
Jan  4 07:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 07:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 07:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-DGLVqWyhErJh53Kg.~'
Jan  4 07:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 07:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 07:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-DGLVqWyhErJh53Kg.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  4 07:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 07:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 07:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  4 07:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 07:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 07:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  4 07:21:57 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 07:21:57 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 07:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  4 07:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 07:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 07:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  4 07:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 07:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 07:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  4 07:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 07:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 07:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  4 07:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 07:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 07:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  4 07:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 07:21:59 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 07:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  4 07:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  4 07:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  4 07:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  4 07:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  4 07:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  4 07:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  4 07:22:03 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  4 07:22:04 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  4 07:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  4 07:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 07:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 07:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  4 07:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 07:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 07:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  4 07:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 07:22:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 07:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  4 07:22:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 07:22:10 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 07:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  4 07:22:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 07:22:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 07:33:34 host sshd[2798]: Invalid user odoo from 41.197.31.178 port 53240
Jan  4 07:33:34 host sshd[2798]: input_userauth_request: invalid user odoo [preauth]
Jan  4 07:33:35 host sshd[2798]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 07:33:35 host sshd[2798]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178
Jan  4 07:33:37 host sshd[2798]: Failed password for invalid user odoo from 41.197.31.178 port 53240 ssh2
Jan  4 07:33:37 host sshd[2798]: Connection closed by 41.197.31.178 port 53240 [preauth]
Jan  4 07:34:39 host sshd[2950]: User root from 103.13.40.2 not allowed because not listed in AllowUsers
Jan  4 07:34:39 host sshd[2950]: input_userauth_request: invalid user root [preauth]
Jan  4 07:34:39 host unix_chkpwd[2952]: password check failed for user (root)
Jan  4 07:34:39 host sshd[2950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2  user=root
Jan  4 07:34:39 host sshd[2950]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 07:34:42 host sshd[2950]: Failed password for invalid user root from 103.13.40.2 port 53502 ssh2
Jan  4 07:34:42 host sshd[2950]: Connection closed by 103.13.40.2 port 53502 [preauth]
Jan  4 07:44:48 host sshd[4730]: User root from 162.218.126.136 not allowed because not listed in AllowUsers
Jan  4 07:44:48 host sshd[4730]: input_userauth_request: invalid user root [preauth]
Jan  4 07:44:48 host unix_chkpwd[4734]: password check failed for user (root)
Jan  4 07:44:48 host sshd[4730]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136  user=root
Jan  4 07:44:48 host sshd[4730]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 07:44:49 host sshd[4730]: Failed password for invalid user root from 162.218.126.136 port 56632 ssh2
Jan  4 07:44:50 host sshd[4730]: Connection closed by 162.218.126.136 port 56632 [preauth]
Jan  4 08:07:17 host sshd[8355]: Invalid user user from 71.25.118.117 port 60020
Jan  4 08:07:17 host sshd[8355]: input_userauth_request: invalid user user [preauth]
Jan  4 08:07:17 host sshd[8355]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 08:07:17 host sshd[8355]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=71.25.118.117
Jan  4 08:07:19 host sshd[8355]: Failed password for invalid user user from 71.25.118.117 port 60020 ssh2
Jan  4 08:07:19 host sshd[8355]: Received disconnect from 71.25.118.117 port 60020:11: Bye Bye [preauth]
Jan  4 08:07:19 host sshd[8355]: Disconnected from 71.25.118.117 port 60020 [preauth]
Jan  4 08:10:39 host sshd[8937]: Invalid user frappe from 201.48.76.244 port 60589
Jan  4 08:10:39 host sshd[8937]: input_userauth_request: invalid user frappe [preauth]
Jan  4 08:10:39 host sshd[8937]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 08:10:39 host sshd[8937]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.48.76.244
Jan  4 08:10:42 host sshd[8937]: Failed password for invalid user frappe from 201.48.76.244 port 60589 ssh2
Jan  4 08:10:42 host sshd[8937]: Received disconnect from 201.48.76.244 port 60589:11: Bye Bye [preauth]
Jan  4 08:10:42 host sshd[8937]: Disconnected from 201.48.76.244 port 60589 [preauth]
Jan  4 08:11:04 host sshd[8988]: User root from 128.199.228.25 not allowed because not listed in AllowUsers
Jan  4 08:11:04 host sshd[8988]: input_userauth_request: invalid user root [preauth]
Jan  4 08:11:04 host unix_chkpwd[8993]: password check failed for user (root)
Jan  4 08:11:04 host sshd[8988]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.228.25  user=root
Jan  4 08:11:04 host sshd[8988]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 08:11:06 host sshd[8988]: Failed password for invalid user root from 128.199.228.25 port 46418 ssh2
Jan  4 08:11:06 host sshd[8988]: Received disconnect from 128.199.228.25 port 46418:11: Bye Bye [preauth]
Jan  4 08:11:06 host sshd[8988]: Disconnected from 128.199.228.25 port 46418 [preauth]
Jan  4 08:11:51 host sshd[9203]: User root from 142.93.209.170 not allowed because not listed in AllowUsers
Jan  4 08:11:51 host sshd[9203]: input_userauth_request: invalid user root [preauth]
Jan  4 08:11:51 host unix_chkpwd[9205]: password check failed for user (root)
Jan  4 08:11:51 host sshd[9203]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.209.170  user=root
Jan  4 08:11:51 host sshd[9203]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 08:11:53 host sshd[9203]: Failed password for invalid user root from 142.93.209.170 port 37470 ssh2
Jan  4 08:11:53 host sshd[9203]: Received disconnect from 142.93.209.170 port 37470:11: Bye Bye [preauth]
Jan  4 08:11:53 host sshd[9203]: Disconnected from 142.93.209.170 port 37470 [preauth]
Jan  4 08:13:23 host sshd[9455]: User root from 71.25.118.117 not allowed because not listed in AllowUsers
Jan  4 08:13:23 host sshd[9455]: input_userauth_request: invalid user root [preauth]
Jan  4 08:13:23 host unix_chkpwd[9459]: password check failed for user (root)
Jan  4 08:13:23 host sshd[9455]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=71.25.118.117  user=root
Jan  4 08:13:23 host sshd[9455]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 08:13:26 host sshd[9455]: Failed password for invalid user root from 71.25.118.117 port 60924 ssh2
Jan  4 08:13:26 host sshd[9455]: Received disconnect from 71.25.118.117 port 60924:11: Bye Bye [preauth]
Jan  4 08:13:26 host sshd[9455]: Disconnected from 71.25.118.117 port 60924 [preauth]
Jan  4 08:14:01 host sshd[9577]: Invalid user postgres from 201.48.76.244 port 52719
Jan  4 08:14:01 host sshd[9577]: input_userauth_request: invalid user postgres [preauth]
Jan  4 08:14:01 host sshd[9577]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 08:14:01 host sshd[9577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.48.76.244
Jan  4 08:14:03 host sshd[9577]: Failed password for invalid user postgres from 201.48.76.244 port 52719 ssh2
Jan  4 08:14:03 host sshd[9577]: Received disconnect from 201.48.76.244 port 52719:11: Bye Bye [preauth]
Jan  4 08:14:03 host sshd[9577]: Disconnected from 201.48.76.244 port 52719 [preauth]
Jan  4 08:14:07 host sshd[9609]: Invalid user ec2-user from 128.199.228.25 port 58634
Jan  4 08:14:07 host sshd[9609]: input_userauth_request: invalid user ec2-user [preauth]
Jan  4 08:14:07 host sshd[9609]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 08:14:07 host sshd[9609]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.228.25
Jan  4 08:14:09 host sshd[9609]: Failed password for invalid user ec2-user from 128.199.228.25 port 58634 ssh2
Jan  4 08:14:09 host sshd[9609]: Received disconnect from 128.199.228.25 port 58634:11: Bye Bye [preauth]
Jan  4 08:14:09 host sshd[9609]: Disconnected from 128.199.228.25 port 58634 [preauth]
Jan  4 08:15:30 host sshd[9849]: Invalid user username from 201.48.76.244 port 38703
Jan  4 08:15:30 host sshd[9849]: input_userauth_request: invalid user username [preauth]
Jan  4 08:15:30 host sshd[9849]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 08:15:30 host sshd[9849]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.48.76.244
Jan  4 08:15:32 host sshd[9849]: Failed password for invalid user username from 201.48.76.244 port 38703 ssh2
Jan  4 08:15:38 host sshd[9900]: User root from 142.93.209.170 not allowed because not listed in AllowUsers
Jan  4 08:15:38 host sshd[9900]: input_userauth_request: invalid user root [preauth]
Jan  4 08:15:39 host unix_chkpwd[9903]: password check failed for user (root)
Jan  4 08:15:39 host sshd[9900]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.209.170  user=root
Jan  4 08:15:39 host sshd[9900]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 08:15:41 host sshd[9900]: Failed password for invalid user root from 142.93.209.170 port 46292 ssh2
Jan  4 08:15:41 host sshd[9900]: Received disconnect from 142.93.209.170 port 46292:11: Bye Bye [preauth]
Jan  4 08:15:41 host sshd[9900]: Disconnected from 142.93.209.170 port 46292 [preauth]
Jan  4 08:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  4 08:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 08:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 08:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  4 08:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 08:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 08:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  4 08:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 08:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 08:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  4 08:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 08:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 08:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  4 08:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 08:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 08:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  4 08:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 08:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 08:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  4 08:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 08:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 08:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  4 08:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 08:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 08:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  4 08:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 08:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 08:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  4 08:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 08:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 08:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  4 08:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 08:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 08:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  4 08:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 08:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 08:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  4 08:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 08:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 08:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=laundryboniface user-2=dartsimp user-3=a2zgroup user-4=cochintaxi user-5=wwwkaretakers user-6=ugotscom user-7=wwwrmswll user-8=wwwresourcehunte user-9=keralaholi user-10=travelboniface user-11=wwwpmcresource user-12=pmcresources user-13=wwwtestugo user-14=shalinijames user-15=vfmassets user-16=wwwkapin user-17=woodpeck user-18=wwwkmaorg user-19=disposeat user-20=remysagr user-21=wwwnexidigital user-22=mrsclean user-23=phmetals user-24=kottayamcalldriv user-25=gifterman user-26=palco123 user-27=wwwletsstalkfood user-28=straightcurve user-29=wwwevmhonda user-30=bonifacegroup feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  4 08:21:52 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  4 08:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 08:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 08:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  4 08:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 08:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 08:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-l9BlsCbTrrCOGDSM.~
Jan  4 08:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 08:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 08:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-l9BlsCbTrrCOGDSM.~'
Jan  4 08:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 08:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 08:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-l9BlsCbTrrCOGDSM.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  4 08:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 08:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 08:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  4 08:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 08:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 08:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  4 08:21:53 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 08:21:53 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 08:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  4 08:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 08:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 08:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  4 08:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 08:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 08:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  4 08:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 08:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 08:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  4 08:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 08:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 08:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  4 08:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 08:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 08:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  4 08:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  4 08:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  4 08:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  4 08:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  4 08:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  4 08:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  4 08:21:59 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  4 08:22:01 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  4 08:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  4 08:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 08:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 08:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  4 08:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 08:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 08:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  4 08:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 08:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 08:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  4 08:22:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 08:22:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 08:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  4 08:22:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 08:22:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 08:39:51 host sshd[14959]: Invalid user user from 92.46.108.20 port 42374
Jan  4 08:39:51 host sshd[14959]: input_userauth_request: invalid user user [preauth]
Jan  4 08:39:51 host sshd[14959]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 08:39:51 host sshd[14959]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20
Jan  4 08:39:53 host sshd[14959]: Failed password for invalid user user from 92.46.108.20 port 42374 ssh2
Jan  4 08:39:54 host sshd[14959]: Connection closed by 92.46.108.20 port 42374 [preauth]
Jan  4 08:46:40 host sshd[16042]: User root from 162.218.126.136 not allowed because not listed in AllowUsers
Jan  4 08:46:40 host sshd[16042]: input_userauth_request: invalid user root [preauth]
Jan  4 08:46:41 host unix_chkpwd[16046]: password check failed for user (root)
Jan  4 08:46:41 host sshd[16042]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136  user=root
Jan  4 08:46:41 host sshd[16042]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 08:46:42 host sshd[16042]: Failed password for invalid user root from 162.218.126.136 port 45076 ssh2
Jan  4 08:46:43 host sshd[16042]: Connection closed by 162.218.126.136 port 45076 [preauth]
Jan  4 08:55:47 host sshd[17468]: User bin from 103.13.40.2 not allowed because not listed in AllowUsers
Jan  4 08:55:47 host sshd[17468]: input_userauth_request: invalid user bin [preauth]
Jan  4 08:55:47 host unix_chkpwd[17470]: password check failed for user (bin)
Jan  4 08:55:47 host sshd[17468]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2  user=bin
Jan  4 08:55:47 host sshd[17468]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "bin"
Jan  4 08:55:49 host sshd[17468]: Failed password for invalid user bin from 103.13.40.2 port 52700 ssh2
Jan  4 08:55:49 host sshd[17468]: Connection closed by 103.13.40.2 port 52700 [preauth]
Jan  4 09:04:00 host sshd[18884]: Invalid user user1 from 41.197.31.178 port 35942
Jan  4 09:04:00 host sshd[18884]: input_userauth_request: invalid user user1 [preauth]
Jan  4 09:04:00 host sshd[18884]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 09:04:00 host sshd[18884]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178
Jan  4 09:04:02 host sshd[18884]: Failed password for invalid user user1 from 41.197.31.178 port 35942 ssh2
Jan  4 09:04:02 host sshd[18884]: Connection closed by 41.197.31.178 port 35942 [preauth]
Jan  4 09:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  4 09:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 09:21:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 09:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  4 09:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 09:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 09:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  4 09:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 09:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 09:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  4 09:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 09:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 09:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  4 09:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 09:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 09:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  4 09:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 09:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 09:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  4 09:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 09:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 09:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  4 09:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 09:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 09:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  4 09:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 09:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 09:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  4 09:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 09:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 09:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  4 09:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 09:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 09:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  4 09:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 09:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 09:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  4 09:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 09:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 09:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=straightcurve user-2=wwwletsstalkfood user-3=bonifacegroup user-4=wwwevmhonda user-5=wwwnexidigital user-6=mrsclean user-7=palco123 user-8=gifterman user-9=phmetals user-10=kottayamcalldriv user-11=woodpeck user-12=wwwkapin user-13=disposeat user-14=remysagr user-15=wwwkmaorg user-16=pmcresources user-17=vfmassets user-18=shalinijames user-19=wwwtestugo user-20=wwwpmcresource user-21=keralaholi user-22=wwwresourcehunte user-23=wwwrmswll user-24=ugotscom user-25=travelboniface user-26=wwwkaretakers user-27=cochintaxi user-28=laundryboniface user-29=a2zgroup user-30=dartsimp feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  4 09:21:52 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  4 09:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 09:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 09:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  4 09:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 09:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 09:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-F76p9a4K26BpRsw7.~
Jan  4 09:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 09:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 09:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-F76p9a4K26BpRsw7.~'
Jan  4 09:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 09:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 09:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-F76p9a4K26BpRsw7.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  4 09:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 09:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 09:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  4 09:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 09:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 09:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  4 09:21:57 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 09:21:57 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 09:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  4 09:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 09:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 09:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  4 09:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 09:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 09:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  4 09:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 09:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 09:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  4 09:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 09:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 09:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  4 09:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 09:21:59 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 09:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  4 09:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  4 09:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  4 09:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  4 09:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  4 09:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  4 09:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  4 09:22:02 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  4 09:22:04 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  4 09:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  4 09:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 09:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 09:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  4 09:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 09:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 09:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  4 09:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 09:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 09:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  4 09:22:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 09:22:10 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 09:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  4 09:22:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 09:22:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 09:31:15 host sshd[25216]: Bad protocol version identification 'MGLNDD_167.71.234.10_22' from 107.170.255.24 port 53224
Jan  4 09:48:34 host sshd[29179]: Invalid user postgres from 162.218.126.136 port 51002
Jan  4 09:48:34 host sshd[29179]: input_userauth_request: invalid user postgres [preauth]
Jan  4 09:48:34 host sshd[29179]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 09:48:34 host sshd[29179]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136
Jan  4 09:48:36 host sshd[29179]: Failed password for invalid user postgres from 162.218.126.136 port 51002 ssh2
Jan  4 09:48:36 host sshd[29179]: Connection closed by 162.218.126.136 port 51002 [preauth]
Jan  4 10:16:34 host sshd[4119]: Invalid user user1 from 103.13.40.2 port 38272
Jan  4 10:16:34 host sshd[4119]: input_userauth_request: invalid user user1 [preauth]
Jan  4 10:16:34 host sshd[4119]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 10:16:34 host sshd[4119]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2
Jan  4 10:16:36 host sshd[4119]: Failed password for invalid user user1 from 103.13.40.2 port 38272 ssh2
Jan  4 10:16:36 host sshd[4119]: Connection closed by 103.13.40.2 port 38272 [preauth]
Jan  4 10:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  4 10:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 10:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 10:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  4 10:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 10:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 10:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  4 10:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 10:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 10:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  4 10:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 10:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 10:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  4 10:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 10:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 10:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  4 10:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 10:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 10:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  4 10:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 10:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 10:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  4 10:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 10:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 10:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  4 10:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 10:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 10:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  4 10:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 10:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 10:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  4 10:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 10:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 10:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  4 10:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 10:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 10:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  4 10:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 10:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 10:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=palco123 user-2=gifterman user-3=kottayamcalldriv user-4=phmetals user-5=wwwnexidigital user-6=mrsclean user-7=bonifacegroup user-8=wwwevmhonda user-9=straightcurve user-10=wwwletsstalkfood user-11=vfmassets user-12=shalinijames user-13=wwwtestugo user-14=pmcresources user-15=wwwkmaorg user-16=disposeat user-17=remysagr user-18=wwwkapin user-19=woodpeck user-20=travelboniface user-21=keralaholi user-22=wwwresourcehunte user-23=wwwrmswll user-24=ugotscom user-25=wwwpmcresource user-26=a2zgroup user-27=dartsimp user-28=laundryboniface user-29=wwwkaretakers user-30=cochintaxi feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  4 10:21:52 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  4 10:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 10:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 10:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  4 10:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 10:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 10:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-6ePVkfiEWyVRZ1HT.~
Jan  4 10:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 10:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 10:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-6ePVkfiEWyVRZ1HT.~'
Jan  4 10:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 10:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 10:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-6ePVkfiEWyVRZ1HT.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  4 10:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 10:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 10:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  4 10:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 10:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 10:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  4 10:21:53 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 10:21:53 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 10:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  4 10:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 10:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 10:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  4 10:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 10:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 10:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  4 10:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 10:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 10:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  4 10:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 10:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 10:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  4 10:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 10:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 10:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  4 10:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  4 10:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  4 10:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  4 10:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  4 10:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  4 10:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  4 10:21:57 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  4 10:21:59 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  4 10:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  4 10:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 10:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 10:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  4 10:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 10:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 10:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  4 10:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 10:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 10:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  4 10:22:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 10:22:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 10:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  4 10:22:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 10:22:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 10:32:34 host sshd[8679]: Did not receive identification string from 157.245.248.106 port 36380
Jan  4 10:32:36 host sshd[8681]: Invalid user vagrant from 157.245.248.106 port 36452
Jan  4 10:32:36 host sshd[8682]: Invalid user test from 157.245.248.106 port 36392
Jan  4 10:32:36 host sshd[8683]: Invalid user pi from 157.245.248.106 port 36676
Jan  4 10:32:36 host sshd[8681]: input_userauth_request: invalid user vagrant [preauth]
Jan  4 10:32:36 host sshd[8683]: input_userauth_request: invalid user pi [preauth]
Jan  4 10:32:36 host sshd[8682]: input_userauth_request: invalid user test [preauth]
Jan  4 10:32:36 host sshd[8684]: Invalid user pi from 157.245.248.106 port 36430
Jan  4 10:32:36 host sshd[8684]: input_userauth_request: invalid user pi [preauth]
Jan  4 10:32:36 host sshd[8687]: Invalid user gitlab-runner from 157.245.248.106 port 36600
Jan  4 10:32:36 host sshd[8685]: Invalid user halo from 157.245.248.106 port 36390
Jan  4 10:32:36 host sshd[8686]: User mysql from 157.245.248.106 not allowed because not listed in AllowUsers
Jan  4 10:32:36 host sshd[8687]: input_userauth_request: invalid user gitlab-runner [preauth]
Jan  4 10:32:36 host sshd[8685]: input_userauth_request: invalid user halo [preauth]
Jan  4 10:32:36 host sshd[8686]: input_userauth_request: invalid user mysql [preauth]
Jan  4 10:32:36 host sshd[8688]: User root from 157.245.248.106 not allowed because not listed in AllowUsers
Jan  4 10:32:36 host sshd[8688]: input_userauth_request: invalid user root [preauth]
Jan  4 10:32:36 host sshd[8689]: User root from 157.245.248.106 not allowed because not listed in AllowUsers
Jan  4 10:32:36 host sshd[8689]: input_userauth_request: invalid user root [preauth]
Jan  4 10:32:36 host sshd[8691]: Invalid user ftpuser from 157.245.248.106 port 36622
Jan  4 10:32:36 host sshd[8691]: input_userauth_request: invalid user ftpuser [preauth]
Jan  4 10:32:36 host sshd[8690]: Invalid user ubuntu from 157.245.248.106 port 36408
Jan  4 10:32:36 host sshd[8690]: input_userauth_request: invalid user ubuntu [preauth]
Jan  4 10:32:36 host sshd[8681]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 10:32:36 host sshd[8683]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 10:32:36 host sshd[8681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.248.106
Jan  4 10:32:36 host sshd[8683]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.248.106
Jan  4 10:32:36 host sshd[8682]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 10:32:36 host sshd[8682]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.248.106
Jan  4 10:32:36 host sshd[8684]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 10:32:36 host sshd[8684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.248.106
Jan  4 10:32:36 host sshd[8685]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 10:32:36 host sshd[8685]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.248.106
Jan  4 10:32:36 host sshd[8687]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 10:32:36 host sshd[8687]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.248.106
Jan  4 10:32:36 host unix_chkpwd[8711]: password check failed for user (mysql)
Jan  4 10:32:36 host sshd[8686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.248.106  user=mysql
Jan  4 10:32:36 host sshd[8686]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "mysql"
Jan  4 10:32:36 host sshd[8691]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 10:32:36 host sshd[8691]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.248.106
Jan  4 10:32:36 host sshd[8690]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 10:32:36 host sshd[8690]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.248.106
Jan  4 10:32:36 host unix_chkpwd[8713]: password check failed for user (root)
Jan  4 10:32:36 host sshd[8689]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.248.106  user=root
Jan  4 10:32:36 host sshd[8689]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 10:32:36 host unix_chkpwd[8712]: password check failed for user (root)
Jan  4 10:32:36 host sshd[8688]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.248.106  user=root
Jan  4 10:32:36 host sshd[8688]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 10:32:37 host sshd[8706]: Invalid user devops from 157.245.248.106 port 36646
Jan  4 10:32:37 host sshd[8706]: input_userauth_request: invalid user devops [preauth]
Jan  4 10:32:37 host sshd[8707]: Invalid user tester from 157.245.248.106 port 36544
Jan  4 10:32:37 host sshd[8707]: input_userauth_request: invalid user tester [preauth]
Jan  4 10:32:37 host sshd[8706]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 10:32:37 host sshd[8706]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.248.106
Jan  4 10:32:37 host sshd[8707]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 10:32:37 host sshd[8707]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.248.106
Jan  4 10:32:38 host sshd[8683]: Failed password for invalid user pi from 157.245.248.106 port 36676 ssh2
Jan  4 10:32:38 host sshd[8681]: Failed password for invalid user vagrant from 157.245.248.106 port 36452 ssh2
Jan  4 10:32:38 host sshd[8682]: Failed password for invalid user test from 157.245.248.106 port 36392 ssh2
Jan  4 10:32:38 host sshd[8684]: Failed password for invalid user pi from 157.245.248.106 port 36430 ssh2
Jan  4 10:32:38 host sshd[8685]: Failed password for invalid user halo from 157.245.248.106 port 36390 ssh2
Jan  4 10:32:38 host sshd[8687]: Failed password for invalid user gitlab-runner from 157.245.248.106 port 36600 ssh2
Jan  4 10:32:38 host sshd[8686]: Failed password for invalid user mysql from 157.245.248.106 port 36476 ssh2
Jan  4 10:32:38 host sshd[8691]: Failed password for invalid user ftpuser from 157.245.248.106 port 36622 ssh2
Jan  4 10:32:38 host sshd[8690]: Failed password for invalid user ubuntu from 157.245.248.106 port 36408 ssh2
Jan  4 10:32:38 host sshd[8689]: Failed password for invalid user root from 157.245.248.106 port 36670 ssh2
Jan  4 10:32:38 host sshd[8688]: Failed password for invalid user root from 157.245.248.106 port 36554 ssh2
Jan  4 10:32:39 host sshd[8706]: Failed password for invalid user devops from 157.245.248.106 port 36646 ssh2
Jan  4 10:32:39 host sshd[8707]: Failed password for invalid user tester from 157.245.248.106 port 36544 ssh2
Jan  4 10:39:51 host sshd[9781]: Invalid user soft from 43.132.183.192 port 36530
Jan  4 10:39:51 host sshd[9781]: input_userauth_request: invalid user soft [preauth]
Jan  4 10:39:51 host sshd[9781]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 10:39:51 host sshd[9781]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.132.183.192
Jan  4 10:39:53 host sshd[9781]: Failed password for invalid user soft from 43.132.183.192 port 36530 ssh2
Jan  4 10:39:53 host sshd[9781]: Received disconnect from 43.132.183.192 port 36530:11: Bye Bye [preauth]
Jan  4 10:39:53 host sshd[9781]: Disconnected from 43.132.183.192 port 36530 [preauth]
Jan  4 10:40:25 host sshd[9863]: Invalid user admin from 49.247.147.180 port 47252
Jan  4 10:40:25 host sshd[9863]: input_userauth_request: invalid user admin [preauth]
Jan  4 10:40:25 host sshd[9863]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 10:40:25 host sshd[9863]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.247.147.180
Jan  4 10:40:26 host sshd[9863]: Failed password for invalid user admin from 49.247.147.180 port 47252 ssh2
Jan  4 10:40:26 host sshd[9863]: Received disconnect from 49.247.147.180 port 47252:11: Bye Bye [preauth]
Jan  4 10:40:26 host sshd[9863]: Disconnected from 49.247.147.180 port 47252 [preauth]
Jan  4 10:40:32 host sshd[9904]: Invalid user admin from 77.37.168.42 port 38714
Jan  4 10:40:32 host sshd[9904]: input_userauth_request: invalid user admin [preauth]
Jan  4 10:40:32 host sshd[9904]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 10:40:32 host sshd[9904]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.37.168.42
Jan  4 10:40:33 host sshd[9904]: Failed password for invalid user admin from 77.37.168.42 port 38714 ssh2
Jan  4 10:40:34 host sshd[9904]: Received disconnect from 77.37.168.42 port 38714:11: Bye Bye [preauth]
Jan  4 10:40:34 host sshd[9904]: Disconnected from 77.37.168.42 port 38714 [preauth]
Jan  4 10:42:14 host sshd[10119]: Invalid user linaro from 165.22.121.218 port 48492
Jan  4 10:42:14 host sshd[10119]: input_userauth_request: invalid user linaro [preauth]
Jan  4 10:42:14 host sshd[10119]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 10:42:14 host sshd[10119]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.121.218
Jan  4 10:42:16 host sshd[10119]: Failed password for invalid user linaro from 165.22.121.218 port 48492 ssh2
Jan  4 10:42:16 host sshd[10119]: Received disconnect from 165.22.121.218 port 48492:11: Bye Bye [preauth]
Jan  4 10:42:16 host sshd[10119]: Disconnected from 165.22.121.218 port 48492 [preauth]
Jan  4 10:44:30 host sshd[10458]: Invalid user www from 165.22.121.218 port 50054
Jan  4 10:44:30 host sshd[10458]: input_userauth_request: invalid user www [preauth]
Jan  4 10:44:30 host sshd[10458]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 10:44:30 host sshd[10458]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.121.218
Jan  4 10:44:32 host sshd[10458]: Failed password for invalid user www from 165.22.121.218 port 50054 ssh2
Jan  4 10:44:32 host sshd[10458]: Received disconnect from 165.22.121.218 port 50054:11: Bye Bye [preauth]
Jan  4 10:44:32 host sshd[10458]: Disconnected from 165.22.121.218 port 50054 [preauth]
Jan  4 10:44:55 host sshd[10499]: Invalid user admin from 43.132.183.192 port 58902
Jan  4 10:44:55 host sshd[10499]: input_userauth_request: invalid user admin [preauth]
Jan  4 10:44:55 host sshd[10499]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 10:44:55 host sshd[10499]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.132.183.192
Jan  4 10:44:57 host sshd[10499]: Failed password for invalid user admin from 43.132.183.192 port 58902 ssh2
Jan  4 10:44:57 host sshd[10499]: Received disconnect from 43.132.183.192 port 58902:11: Bye Bye [preauth]
Jan  4 10:44:57 host sshd[10499]: Disconnected from 43.132.183.192 port 58902 [preauth]
Jan  4 10:45:03 host sshd[10526]: Invalid user user02 from 77.37.168.42 port 54978
Jan  4 10:45:03 host sshd[10526]: input_userauth_request: invalid user user02 [preauth]
Jan  4 10:45:03 host sshd[10526]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 10:45:03 host sshd[10526]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.37.168.42
Jan  4 10:45:05 host sshd[10526]: Failed password for invalid user user02 from 77.37.168.42 port 54978 ssh2
Jan  4 10:45:06 host sshd[10526]: Received disconnect from 77.37.168.42 port 54978:11: Bye Bye [preauth]
Jan  4 10:45:06 host sshd[10526]: Disconnected from 77.37.168.42 port 54978 [preauth]
Jan  4 10:45:07 host sshd[10537]: User root from 49.247.147.180 not allowed because not listed in AllowUsers
Jan  4 10:45:07 host sshd[10537]: input_userauth_request: invalid user root [preauth]
Jan  4 10:45:07 host unix_chkpwd[10541]: password check failed for user (root)
Jan  4 10:45:07 host sshd[10537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.247.147.180  user=root
Jan  4 10:45:07 host sshd[10537]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 10:45:09 host sshd[10537]: Failed password for invalid user root from 49.247.147.180 port 36800 ssh2
Jan  4 10:45:10 host sshd[10537]: Received disconnect from 49.247.147.180 port 36800:11: Bye Bye [preauth]
Jan  4 10:45:10 host sshd[10537]: Disconnected from 49.247.147.180 port 36800 [preauth]
Jan  4 10:45:39 host sshd[10748]: Invalid user mike from 165.22.121.218 port 38922
Jan  4 10:45:39 host sshd[10748]: input_userauth_request: invalid user mike [preauth]
Jan  4 10:45:39 host sshd[10748]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 10:45:39 host sshd[10748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.121.218
Jan  4 10:45:41 host sshd[10748]: Failed password for invalid user mike from 165.22.121.218 port 38922 ssh2
Jan  4 10:45:41 host sshd[10748]: Received disconnect from 165.22.121.218 port 38922:11: Bye Bye [preauth]
Jan  4 10:45:41 host sshd[10748]: Disconnected from 165.22.121.218 port 38922 [preauth]
Jan  4 10:46:18 host sshd[10884]: User root from 77.37.168.42 not allowed because not listed in AllowUsers
Jan  4 10:46:18 host sshd[10884]: input_userauth_request: invalid user root [preauth]
Jan  4 10:46:18 host unix_chkpwd[10887]: password check failed for user (root)
Jan  4 10:46:18 host sshd[10884]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.37.168.42  user=root
Jan  4 10:46:18 host sshd[10884]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 10:46:20 host sshd[10884]: Failed password for invalid user root from 77.37.168.42 port 49886 ssh2
Jan  4 10:46:20 host sshd[10884]: Received disconnect from 77.37.168.42 port 49886:11: Bye Bye [preauth]
Jan  4 10:46:20 host sshd[10884]: Disconnected from 77.37.168.42 port 49886 [preauth]
Jan  4 10:46:26 host sshd[10927]: User root from 43.132.183.192 not allowed because not listed in AllowUsers
Jan  4 10:46:26 host sshd[10927]: input_userauth_request: invalid user root [preauth]
Jan  4 10:46:26 host unix_chkpwd[10936]: password check failed for user (root)
Jan  4 10:46:26 host sshd[10927]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.132.183.192  user=root
Jan  4 10:46:26 host sshd[10927]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 10:46:27 host sshd[10927]: Failed password for invalid user root from 43.132.183.192 port 58920 ssh2
Jan  4 10:46:27 host sshd[10927]: Received disconnect from 43.132.183.192 port 58920:11: Bye Bye [preauth]
Jan  4 10:46:27 host sshd[10927]: Disconnected from 43.132.183.192 port 58920 [preauth]
Jan  4 10:48:04 host sshd[11144]: Did not receive identification string from 104.248.241.167 port 40762
Jan  4 10:48:44 host sshd[11224]: Invalid user uucp from 104.248.241.167 port 39432
Jan  4 10:48:44 host sshd[11224]: input_userauth_request: invalid user uucp [preauth]
Jan  4 10:48:44 host sshd[11224]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 10:48:44 host sshd[11224]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.241.167
Jan  4 10:48:45 host sshd[11224]: Failed password for invalid user uucp from 104.248.241.167 port 39432 ssh2
Jan  4 10:48:46 host sshd[11224]: Received disconnect from 104.248.241.167 port 39432:11: Normal Shutdown, Thank you for playing [preauth]
Jan  4 10:48:46 host sshd[11224]: Disconnected from 104.248.241.167 port 39432 [preauth]
Jan  4 10:49:10 host sshd[11277]: Invalid user pinapp from 104.248.241.167 port 39018
Jan  4 10:49:10 host sshd[11277]: input_userauth_request: invalid user pinapp [preauth]
Jan  4 10:49:10 host sshd[11277]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 10:49:10 host sshd[11277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.241.167
Jan  4 10:49:12 host sshd[11277]: Failed password for invalid user pinapp from 104.248.241.167 port 39018 ssh2
Jan  4 10:49:12 host sshd[11277]: Received disconnect from 104.248.241.167 port 39018:11: Normal Shutdown, Thank you for playing [preauth]
Jan  4 10:49:12 host sshd[11277]: Disconnected from 104.248.241.167 port 39018 [preauth]
Jan  4 10:50:01 host sshd[11409]: User root from 162.218.126.136 not allowed because not listed in AllowUsers
Jan  4 10:50:01 host sshd[11409]: input_userauth_request: invalid user root [preauth]
Jan  4 10:50:02 host unix_chkpwd[11444]: password check failed for user (root)
Jan  4 10:50:02 host sshd[11409]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136  user=root
Jan  4 10:50:02 host sshd[11409]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 10:50:03 host sshd[11409]: Failed password for invalid user root from 162.218.126.136 port 49154 ssh2
Jan  4 10:50:03 host sshd[11409]: Connection closed by 162.218.126.136 port 49154 [preauth]
Jan  4 11:04:25 host sshd[13607]: Invalid user user1 from 41.197.31.178 port 36772
Jan  4 11:04:25 host sshd[13607]: input_userauth_request: invalid user user1 [preauth]
Jan  4 11:04:25 host sshd[13607]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 11:04:25 host sshd[13607]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178
Jan  4 11:04:27 host sshd[13607]: Failed password for invalid user user1 from 41.197.31.178 port 36772 ssh2
Jan  4 11:04:27 host sshd[13607]: Connection closed by 41.197.31.178 port 36772 [preauth]
Jan  4 11:15:05 host sshd[15073]: Invalid user bbnc from 92.46.108.20 port 47070
Jan  4 11:15:05 host sshd[15073]: input_userauth_request: invalid user bbnc [preauth]
Jan  4 11:15:05 host sshd[15073]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 11:15:05 host sshd[15073]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20
Jan  4 11:15:07 host sshd[15073]: Failed password for invalid user bbnc from 92.46.108.20 port 47070 ssh2
Jan  4 11:15:08 host sshd[15073]: Connection closed by 92.46.108.20 port 47070 [preauth]
Jan  4 11:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  4 11:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 11:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 11:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  4 11:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 11:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 11:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  4 11:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 11:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 11:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  4 11:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 11:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 11:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  4 11:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 11:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 11:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  4 11:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 11:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 11:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  4 11:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 11:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 11:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  4 11:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 11:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 11:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  4 11:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 11:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 11:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  4 11:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 11:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 11:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  4 11:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 11:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 11:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  4 11:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 11:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 11:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  4 11:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 11:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 11:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=straightcurve user-2=wwwletsstalkfood user-3=wwwevmhonda user-4=bonifacegroup user-5=wwwnexidigital user-6=mrsclean user-7=phmetals user-8=kottayamcalldriv user-9=gifterman user-10=palco123 user-11=wwwkapin user-12=woodpeck user-13=disposeat user-14=wwwkmaorg user-15=remysagr user-16=pmcresources user-17=wwwtestugo user-18=shalinijames user-19=vfmassets user-20=wwwpmcresource user-21=ugotscom user-22=wwwrmswll user-23=wwwresourcehunte user-24=keralaholi user-25=travelboniface user-26=wwwkaretakers user-27=cochintaxi user-28=laundryboniface user-29=dartsimp user-30=a2zgroup feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  4 11:21:53 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  4 11:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 11:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 11:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  4 11:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 11:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 11:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-zEMTXHJLxzEXbm8w.~
Jan  4 11:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 11:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 11:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-zEMTXHJLxzEXbm8w.~'
Jan  4 11:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 11:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 11:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-zEMTXHJLxzEXbm8w.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  4 11:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 11:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 11:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  4 11:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 11:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 11:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  4 11:21:53 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 11:21:53 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 11:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  4 11:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 11:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 11:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  4 11:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 11:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 11:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  4 11:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 11:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 11:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  4 11:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 11:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 11:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  4 11:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 11:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 11:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  4 11:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  4 11:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  4 11:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  4 11:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  4 11:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  4 11:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  4 11:22:00 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  4 11:22:02 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  4 11:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  4 11:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 11:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 11:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  4 11:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 11:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 11:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  4 11:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 11:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 11:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  4 11:22:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 11:22:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 11:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  4 11:22:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 11:22:10 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 11:22:44 host sshd[16264]: Invalid user ryan from 107.189.30.59 port 38052
Jan  4 11:22:44 host sshd[16264]: input_userauth_request: invalid user ryan [preauth]
Jan  4 11:22:44 host sshd[16264]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 11:22:44 host sshd[16264]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59
Jan  4 11:22:46 host sshd[16264]: Failed password for invalid user ryan from 107.189.30.59 port 38052 ssh2
Jan  4 11:22:47 host sshd[16264]: Connection closed by 107.189.30.59 port 38052 [preauth]
Jan  4 11:28:19 host sshd[17038]: Did not receive identification string from 87.236.176.188 port 47813
Jan  4 11:28:19 host sshd[17041]: Connection closed by 87.236.176.188 port 39177 [preauth]
Jan  4 11:32:28 host sshd[17636]: Invalid user zhao from 178.128.35.197 port 57682
Jan  4 11:32:28 host sshd[17636]: input_userauth_request: invalid user zhao [preauth]
Jan  4 11:32:28 host sshd[17636]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 11:32:28 host sshd[17636]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.35.197
Jan  4 11:32:30 host sshd[17636]: Failed password for invalid user zhao from 178.128.35.197 port 57682 ssh2
Jan  4 11:32:30 host sshd[17636]: Received disconnect from 178.128.35.197 port 57682:11: Bye Bye [preauth]
Jan  4 11:32:30 host sshd[17636]: Disconnected from 178.128.35.197 port 57682 [preauth]
Jan  4 11:33:14 host sshd[17737]: Did not receive identification string from 46.101.97.107 port 61000
Jan  4 11:34:25 host sshd[17857]: Invalid user server from 124.137.205.59 port 53183
Jan  4 11:34:25 host sshd[17857]: input_userauth_request: invalid user server [preauth]
Jan  4 11:34:25 host sshd[17857]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 11:34:25 host sshd[17857]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.137.205.59
Jan  4 11:34:27 host sshd[17857]: Failed password for invalid user server from 124.137.205.59 port 53183 ssh2
Jan  4 11:34:27 host sshd[17857]: Received disconnect from 124.137.205.59 port 53183:11: Bye Bye [preauth]
Jan  4 11:34:27 host sshd[17857]: Disconnected from 124.137.205.59 port 53183 [preauth]
Jan  4 11:36:57 host sshd[18327]: Invalid user postgres from 186.209.41.35 port 45835
Jan  4 11:36:57 host sshd[18327]: input_userauth_request: invalid user postgres [preauth]
Jan  4 11:36:57 host sshd[18327]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 11:36:57 host sshd[18327]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.209.41.35
Jan  4 11:36:59 host sshd[18327]: Failed password for invalid user postgres from 186.209.41.35 port 45835 ssh2
Jan  4 11:36:59 host sshd[18327]: Received disconnect from 186.209.41.35 port 45835:11: Bye Bye [preauth]
Jan  4 11:36:59 host sshd[18327]: Disconnected from 186.209.41.35 port 45835 [preauth]
Jan  4 11:37:30 host sshd[18438]: Invalid user chris from 187.191.60.178 port 39841
Jan  4 11:37:30 host sshd[18438]: input_userauth_request: invalid user chris [preauth]
Jan  4 11:37:30 host sshd[18438]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 11:37:30 host sshd[18438]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.191.60.178
Jan  4 11:37:32 host sshd[18438]: Failed password for invalid user chris from 187.191.60.178 port 39841 ssh2
Jan  4 11:37:33 host sshd[18438]: Received disconnect from 187.191.60.178 port 39841:11: Bye Bye [preauth]
Jan  4 11:37:33 host sshd[18438]: Disconnected from 187.191.60.178 port 39841 [preauth]
Jan  4 11:37:33 host sshd[18455]: Invalid user user1 from 103.13.40.2 port 53356
Jan  4 11:37:33 host sshd[18455]: input_userauth_request: invalid user user1 [preauth]
Jan  4 11:37:33 host sshd[18455]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 11:37:33 host sshd[18455]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2
Jan  4 11:37:35 host sshd[18455]: Failed password for invalid user user1 from 103.13.40.2 port 53356 ssh2
Jan  4 11:37:35 host sshd[18455]: Connection closed by 103.13.40.2 port 53356 [preauth]
Jan  4 11:37:56 host sshd[18513]: User root from 141.94.76.58 not allowed because not listed in AllowUsers
Jan  4 11:37:56 host sshd[18513]: input_userauth_request: invalid user root [preauth]
Jan  4 11:37:56 host unix_chkpwd[18517]: password check failed for user (root)
Jan  4 11:37:56 host sshd[18513]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.94.76.58  user=root
Jan  4 11:37:56 host sshd[18513]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 11:37:58 host sshd[18513]: Failed password for invalid user root from 141.94.76.58 port 54154 ssh2
Jan  4 11:37:58 host sshd[18513]: Received disconnect from 141.94.76.58 port 54154:11: Bye Bye [preauth]
Jan  4 11:37:58 host sshd[18513]: Disconnected from 141.94.76.58 port 54154 [preauth]
Jan  4 11:38:09 host sshd[18545]: Invalid user alex from 188.250.172.49 port 16947
Jan  4 11:38:09 host sshd[18545]: input_userauth_request: invalid user alex [preauth]
Jan  4 11:38:09 host sshd[18545]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 11:38:09 host sshd[18545]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.250.172.49
Jan  4 11:38:11 host sshd[18545]: Failed password for invalid user alex from 188.250.172.49 port 16947 ssh2
Jan  4 11:38:11 host sshd[18545]: Received disconnect from 188.250.172.49 port 16947:11: Bye Bye [preauth]
Jan  4 11:38:11 host sshd[18545]: Disconnected from 188.250.172.49 port 16947 [preauth]
Jan  4 11:38:11 host sshd[18552]: Invalid user posto from 178.128.35.197 port 60698
Jan  4 11:38:11 host sshd[18552]: input_userauth_request: invalid user posto [preauth]
Jan  4 11:38:11 host sshd[18552]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 11:38:11 host sshd[18552]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.35.197
Jan  4 11:38:13 host sshd[18552]: Failed password for invalid user posto from 178.128.35.197 port 60698 ssh2
Jan  4 11:38:13 host sshd[18552]: Received disconnect from 178.128.35.197 port 60698:11: Bye Bye [preauth]
Jan  4 11:38:13 host sshd[18552]: Disconnected from 178.128.35.197 port 60698 [preauth]
Jan  4 11:38:15 host sshd[18559]: Invalid user smart from 161.35.113.114 port 57032
Jan  4 11:38:15 host sshd[18559]: input_userauth_request: invalid user smart [preauth]
Jan  4 11:38:15 host sshd[18559]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 11:38:15 host sshd[18559]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.113.114
Jan  4 11:38:17 host sshd[18559]: Failed password for invalid user smart from 161.35.113.114 port 57032 ssh2
Jan  4 11:38:17 host sshd[18559]: Received disconnect from 161.35.113.114 port 57032:11: Bye Bye [preauth]
Jan  4 11:38:17 host sshd[18559]: Disconnected from 161.35.113.114 port 57032 [preauth]
Jan  4 11:39:10 host sshd[18699]: Invalid user gitea from 124.137.205.59 port 18999
Jan  4 11:39:10 host sshd[18699]: input_userauth_request: invalid user gitea [preauth]
Jan  4 11:39:10 host sshd[18699]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 11:39:10 host sshd[18699]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.137.205.59
Jan  4 11:39:12 host sshd[18699]: Failed password for invalid user gitea from 124.137.205.59 port 18999 ssh2
Jan  4 11:39:12 host sshd[18699]: Received disconnect from 124.137.205.59 port 18999:11: Bye Bye [preauth]
Jan  4 11:39:12 host sshd[18699]: Disconnected from 124.137.205.59 port 18999 [preauth]
Jan  4 11:39:19 host sshd[18712]: User root from 178.128.35.197 not allowed because not listed in AllowUsers
Jan  4 11:39:19 host sshd[18712]: input_userauth_request: invalid user root [preauth]
Jan  4 11:39:19 host unix_chkpwd[18717]: password check failed for user (root)
Jan  4 11:39:19 host sshd[18712]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.35.197  user=root
Jan  4 11:39:19 host sshd[18712]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 11:39:21 host sshd[18712]: Failed password for invalid user root from 178.128.35.197 port 60240 ssh2
Jan  4 11:39:21 host sshd[18712]: Received disconnect from 178.128.35.197 port 60240:11: Bye Bye [preauth]
Jan  4 11:39:21 host sshd[18712]: Disconnected from 178.128.35.197 port 60240 [preauth]
Jan  4 11:39:38 host sshd[18793]: Invalid user amit from 186.209.41.35 port 35874
Jan  4 11:39:38 host sshd[18793]: input_userauth_request: invalid user amit [preauth]
Jan  4 11:39:38 host sshd[18793]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 11:39:38 host sshd[18793]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.209.41.35
Jan  4 11:39:40 host sshd[18793]: Failed password for invalid user amit from 186.209.41.35 port 35874 ssh2
Jan  4 11:39:40 host sshd[18793]: Received disconnect from 186.209.41.35 port 35874:11: Bye Bye [preauth]
Jan  4 11:39:40 host sshd[18793]: Disconnected from 186.209.41.35 port 35874 [preauth]
Jan  4 11:40:12 host sshd[18857]: Invalid user prod from 141.94.76.58 port 56902
Jan  4 11:40:12 host sshd[18857]: input_userauth_request: invalid user prod [preauth]
Jan  4 11:40:12 host sshd[18857]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 11:40:12 host sshd[18857]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.94.76.58
Jan  4 11:40:14 host sshd[18857]: Failed password for invalid user prod from 141.94.76.58 port 56902 ssh2
Jan  4 11:40:14 host sshd[18857]: Received disconnect from 141.94.76.58 port 56902:11: Bye Bye [preauth]
Jan  4 11:40:14 host sshd[18857]: Disconnected from 141.94.76.58 port 56902 [preauth]
Jan  4 11:40:22 host sshd[18902]: User root from 124.137.205.59 not allowed because not listed in AllowUsers
Jan  4 11:40:22 host sshd[18902]: input_userauth_request: invalid user root [preauth]
Jan  4 11:40:22 host unix_chkpwd[18905]: password check failed for user (root)
Jan  4 11:40:22 host sshd[18902]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.137.205.59  user=root
Jan  4 11:40:22 host sshd[18902]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 11:40:24 host sshd[18902]: Failed password for invalid user root from 124.137.205.59 port 26658 ssh2
Jan  4 11:40:24 host sshd[18902]: Received disconnect from 124.137.205.59 port 26658:11: Bye Bye [preauth]
Jan  4 11:40:24 host sshd[18902]: Disconnected from 124.137.205.59 port 26658 [preauth]
Jan  4 11:40:34 host sshd[18984]: Invalid user postgres from 161.35.113.114 port 34072
Jan  4 11:40:34 host sshd[18984]: input_userauth_request: invalid user postgres [preauth]
Jan  4 11:40:34 host sshd[18984]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 11:40:34 host sshd[18984]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.113.114
Jan  4 11:40:36 host sshd[18984]: Failed password for invalid user postgres from 161.35.113.114 port 34072 ssh2
Jan  4 11:40:36 host sshd[18984]: Received disconnect from 161.35.113.114 port 34072:11: Bye Bye [preauth]
Jan  4 11:40:36 host sshd[18984]: Disconnected from 161.35.113.114 port 34072 [preauth]
Jan  4 11:41:06 host sshd[19140]: User root from 186.209.41.35 not allowed because not listed in AllowUsers
Jan  4 11:41:06 host sshd[19140]: input_userauth_request: invalid user root [preauth]
Jan  4 11:41:06 host unix_chkpwd[19147]: password check failed for user (root)
Jan  4 11:41:06 host sshd[19140]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.209.41.35  user=root
Jan  4 11:41:06 host sshd[19140]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 11:41:08 host sshd[19140]: Failed password for invalid user root from 186.209.41.35 port 50130 ssh2
Jan  4 11:41:09 host sshd[19140]: Received disconnect from 186.209.41.35 port 50130:11: Bye Bye [preauth]
Jan  4 11:41:09 host sshd[19140]: Disconnected from 186.209.41.35 port 50130 [preauth]
Jan  4 11:42:53 host sshd[19386]: Invalid user xx from 161.35.113.114 port 47964
Jan  4 11:42:53 host sshd[19386]: input_userauth_request: invalid user xx [preauth]
Jan  4 11:42:53 host sshd[19386]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 11:42:53 host sshd[19386]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.113.114
Jan  4 11:42:55 host sshd[19386]: Failed password for invalid user xx from 161.35.113.114 port 47964 ssh2
Jan  4 11:43:26 host sshd[19490]: User root from 188.250.172.49 not allowed because not listed in AllowUsers
Jan  4 11:43:26 host sshd[19490]: input_userauth_request: invalid user root [preauth]
Jan  4 11:43:26 host unix_chkpwd[19514]: password check failed for user (root)
Jan  4 11:43:26 host sshd[19490]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.250.172.49  user=root
Jan  4 11:43:26 host sshd[19490]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 11:43:28 host sshd[19490]: Failed password for invalid user root from 188.250.172.49 port 14466 ssh2
Jan  4 11:43:28 host sshd[19490]: Received disconnect from 188.250.172.49 port 14466:11: Bye Bye [preauth]
Jan  4 11:43:28 host sshd[19490]: Disconnected from 188.250.172.49 port 14466 [preauth]
Jan  4 11:44:01 host sshd[19613]: Invalid user bot from 187.191.60.178 port 18822
Jan  4 11:44:01 host sshd[19613]: input_userauth_request: invalid user bot [preauth]
Jan  4 11:44:01 host sshd[19613]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 11:44:01 host sshd[19613]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.191.60.178
Jan  4 11:44:03 host sshd[19613]: Failed password for invalid user bot from 187.191.60.178 port 18822 ssh2
Jan  4 11:44:03 host sshd[19613]: Received disconnect from 187.191.60.178 port 18822:11: Bye Bye [preauth]
Jan  4 11:44:03 host sshd[19613]: Disconnected from 187.191.60.178 port 18822 [preauth]
Jan  4 11:45:17 host sshd[19802]: Invalid user user from 187.191.60.178 port 11368
Jan  4 11:45:17 host sshd[19802]: input_userauth_request: invalid user user [preauth]
Jan  4 11:45:17 host sshd[19802]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 11:45:17 host sshd[19802]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.191.60.178
Jan  4 11:45:19 host sshd[19802]: Failed password for invalid user user from 187.191.60.178 port 11368 ssh2
Jan  4 11:45:19 host sshd[19802]: Received disconnect from 187.191.60.178 port 11368:11: Bye Bye [preauth]
Jan  4 11:45:19 host sshd[19802]: Disconnected from 187.191.60.178 port 11368 [preauth]
Jan  4 11:52:30 host sshd[21053]: Invalid user guest from 162.218.126.136 port 33936
Jan  4 11:52:30 host sshd[21053]: input_userauth_request: invalid user guest [preauth]
Jan  4 11:52:30 host sshd[21053]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 11:52:30 host sshd[21053]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136
Jan  4 11:52:32 host sshd[21053]: Failed password for invalid user guest from 162.218.126.136 port 33936 ssh2
Jan  4 11:52:32 host sshd[21053]: Connection closed by 162.218.126.136 port 33936 [preauth]
Jan  4 11:54:09 host sshd[21254]: Invalid user cockpit-ws from 104.244.74.6 port 44188
Jan  4 11:54:09 host sshd[21254]: input_userauth_request: invalid user cockpit-ws [preauth]
Jan  4 11:54:09 host sshd[21254]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 11:54:09 host sshd[21254]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6
Jan  4 11:54:10 host sshd[21254]: Failed password for invalid user cockpit-ws from 104.244.74.6 port 44188 ssh2
Jan  4 11:54:11 host sshd[21254]: Connection closed by 104.244.74.6 port 44188 [preauth]
Jan  4 11:58:09 host sshd[21848]: Invalid user cockpit-ws from 104.244.74.6 port 57748
Jan  4 11:58:09 host sshd[21848]: input_userauth_request: invalid user cockpit-ws [preauth]
Jan  4 11:58:09 host sshd[21848]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 11:58:09 host sshd[21848]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6
Jan  4 11:58:12 host sshd[21848]: Failed password for invalid user cockpit-ws from 104.244.74.6 port 57748 ssh2
Jan  4 11:58:12 host sshd[21848]: Connection closed by 104.244.74.6 port 57748 [preauth]
Jan  4 12:15:23 host sshd[25362]: Connection closed by 172.104.11.34 port 18894 [preauth]
Jan  4 12:15:24 host sshd[25368]: Connection closed by 172.104.11.34 port 18898 [preauth]
Jan  4 12:15:26 host sshd[25378]: Connection closed by 172.104.11.34 port 18906 [preauth]
Jan  4 12:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  4 12:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 12:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 12:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  4 12:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 12:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 12:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  4 12:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 12:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 12:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  4 12:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 12:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 12:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  4 12:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 12:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 12:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  4 12:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 12:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 12:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  4 12:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 12:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 12:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  4 12:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 12:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 12:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  4 12:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 12:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 12:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  4 12:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 12:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 12:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  4 12:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 12:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 12:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  4 12:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 12:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 12:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  4 12:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 12:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 12:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=travelboniface user-3=wwwrmswll user-4=wwwresourcehunte user-5=keralaholi user-6=ugotscom user-7=wwwkaretakers user-8=cochintaxi user-9=dartsimp user-10=a2zgroup user-11=laundryboniface user-12=bonifacegroup user-13=wwwevmhonda user-14=straightcurve user-15=wwwletsstalkfood user-16=gifterman user-17=palco123 user-18=kottayamcalldriv user-19=phmetals user-20=mrsclean user-21=wwwnexidigital user-22=remysagr user-23=disposeat user-24=wwwkmaorg user-25=wwwkapin user-26=woodpeck user-27=vfmassets user-28=wwwtestugo user-29=shalinijames user-30=pmcresources feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  4 12:21:52 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  4 12:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 12:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 12:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  4 12:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 12:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 12:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-W9R8NQfarVHm7ofJ.~
Jan  4 12:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 12:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 12:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-W9R8NQfarVHm7ofJ.~'
Jan  4 12:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 12:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 12:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-W9R8NQfarVHm7ofJ.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  4 12:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 12:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 12:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  4 12:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 12:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 12:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  4 12:21:53 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 12:21:53 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 12:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  4 12:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 12:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 12:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  4 12:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 12:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 12:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  4 12:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 12:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 12:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  4 12:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 12:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 12:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  4 12:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 12:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 12:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  4 12:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  4 12:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  4 12:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  4 12:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  4 12:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  4 12:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  4 12:21:58 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  4 12:22:01 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  4 12:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  4 12:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 12:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 12:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  4 12:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 12:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 12:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  4 12:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 12:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 12:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  4 12:22:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 12:22:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 12:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  4 12:22:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 12:22:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 12:26:12 host sshd[27000]: Invalid user admin from 121.171.55.115 port 39136
Jan  4 12:26:12 host sshd[27000]: input_userauth_request: invalid user admin [preauth]
Jan  4 12:26:12 host sshd[27000]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 12:26:12 host sshd[27000]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.171.55.115
Jan  4 12:26:14 host sshd[27000]: Failed password for invalid user admin from 121.171.55.115 port 39136 ssh2
Jan  4 12:26:18 host sshd[27000]: Connection closed by 121.171.55.115 port 39136 [preauth]
Jan  4 12:27:49 host sshd[27227]: Invalid user cockpit-ws from 104.244.74.6 port 34348
Jan  4 12:27:49 host sshd[27227]: input_userauth_request: invalid user cockpit-ws [preauth]
Jan  4 12:27:49 host sshd[27227]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 12:27:49 host sshd[27227]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6
Jan  4 12:27:52 host sshd[27227]: Failed password for invalid user cockpit-ws from 104.244.74.6 port 34348 ssh2
Jan  4 12:32:22 host sshd[27894]: Invalid user a from 210.14.6.60 port 33622
Jan  4 12:32:22 host sshd[27894]: input_userauth_request: invalid user a [preauth]
Jan  4 12:32:22 host sshd[27894]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 12:32:22 host sshd[27894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.14.6.60
Jan  4 12:32:24 host sshd[27894]: Failed password for invalid user a from 210.14.6.60 port 33622 ssh2
Jan  4 12:32:24 host sshd[27894]: Received disconnect from 210.14.6.60 port 33622:11: Bye Bye [preauth]
Jan  4 12:32:24 host sshd[27894]: Disconnected from 210.14.6.60 port 33622 [preauth]
Jan  4 12:32:38 host sshd[27950]: Invalid user User from 89.171.37.93 port 33034
Jan  4 12:32:38 host sshd[27950]: input_userauth_request: invalid user User [preauth]
Jan  4 12:32:38 host sshd[27950]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 12:32:38 host sshd[27950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.171.37.93
Jan  4 12:32:41 host sshd[27950]: Failed password for invalid user User from 89.171.37.93 port 33034 ssh2
Jan  4 12:32:41 host sshd[27950]: Received disconnect from 89.171.37.93 port 33034:11: Bye Bye [preauth]
Jan  4 12:32:41 host sshd[27950]: Disconnected from 89.171.37.93 port 33034 [preauth]
Jan  4 12:35:52 host sshd[28443]: User root from 147.182.248.62 not allowed because not listed in AllowUsers
Jan  4 12:35:52 host sshd[28443]: input_userauth_request: invalid user root [preauth]
Jan  4 12:35:52 host unix_chkpwd[28449]: password check failed for user (root)
Jan  4 12:35:52 host sshd[28443]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.182.248.62  user=root
Jan  4 12:35:52 host sshd[28443]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 12:35:54 host sshd[28443]: Failed password for invalid user root from 147.182.248.62 port 39650 ssh2
Jan  4 12:35:54 host sshd[28443]: Received disconnect from 147.182.248.62 port 39650:11: Bye Bye [preauth]
Jan  4 12:35:54 host sshd[28443]: Disconnected from 147.182.248.62 port 39650 [preauth]
Jan  4 12:36:58 host sshd[28561]: Invalid user teamspeak3 from 103.31.38.123 port 43362
Jan  4 12:36:58 host sshd[28561]: input_userauth_request: invalid user teamspeak3 [preauth]
Jan  4 12:36:58 host sshd[28561]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 12:36:58 host sshd[28561]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.31.38.123
Jan  4 12:37:00 host sshd[28561]: Failed password for invalid user teamspeak3 from 103.31.38.123 port 43362 ssh2
Jan  4 12:37:00 host sshd[28561]: Received disconnect from 103.31.38.123 port 43362:11: Bye Bye [preauth]
Jan  4 12:37:00 host sshd[28561]: Disconnected from 103.31.38.123 port 43362 [preauth]
Jan  4 12:38:07 host sshd[28718]: User root from 210.14.6.60 not allowed because not listed in AllowUsers
Jan  4 12:38:07 host sshd[28718]: input_userauth_request: invalid user root [preauth]
Jan  4 12:38:07 host unix_chkpwd[28723]: password check failed for user (root)
Jan  4 12:38:07 host sshd[28718]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.14.6.60  user=root
Jan  4 12:38:07 host sshd[28718]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 12:38:09 host sshd[28718]: Failed password for invalid user root from 210.14.6.60 port 35234 ssh2
Jan  4 12:38:09 host sshd[28718]: Received disconnect from 210.14.6.60 port 35234:11: Bye Bye [preauth]
Jan  4 12:38:09 host sshd[28718]: Disconnected from 210.14.6.60 port 35234 [preauth]
Jan  4 12:38:25 host sshd[28768]: Invalid user worker from 147.182.248.62 port 44110
Jan  4 12:38:25 host sshd[28768]: input_userauth_request: invalid user worker [preauth]
Jan  4 12:38:25 host sshd[28768]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 12:38:25 host sshd[28768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.182.248.62
Jan  4 12:38:27 host sshd[28768]: Failed password for invalid user worker from 147.182.248.62 port 44110 ssh2
Jan  4 12:38:27 host sshd[28768]: Received disconnect from 147.182.248.62 port 44110:11: Bye Bye [preauth]
Jan  4 12:38:27 host sshd[28768]: Disconnected from 147.182.248.62 port 44110 [preauth]
Jan  4 12:38:50 host sshd[28848]: Invalid user test from 103.31.38.123 port 34034
Jan  4 12:38:50 host sshd[28848]: input_userauth_request: invalid user test [preauth]
Jan  4 12:38:50 host sshd[28848]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 12:38:50 host sshd[28848]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.31.38.123
Jan  4 12:38:52 host sshd[28848]: Failed password for invalid user test from 103.31.38.123 port 34034 ssh2
Jan  4 12:38:53 host sshd[28848]: Received disconnect from 103.31.38.123 port 34034:11: Bye Bye [preauth]
Jan  4 12:38:53 host sshd[28848]: Disconnected from 103.31.38.123 port 34034 [preauth]
Jan  4 12:39:18 host sshd[28901]: User root from 89.171.37.93 not allowed because not listed in AllowUsers
Jan  4 12:39:18 host sshd[28901]: input_userauth_request: invalid user root [preauth]
Jan  4 12:39:18 host unix_chkpwd[28904]: password check failed for user (root)
Jan  4 12:39:18 host sshd[28901]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.171.37.93  user=root
Jan  4 12:39:18 host sshd[28901]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 12:39:20 host sshd[28901]: Failed password for invalid user root from 89.171.37.93 port 57648 ssh2
Jan  4 12:39:21 host sshd[28901]: Received disconnect from 89.171.37.93 port 57648:11: Bye Bye [preauth]
Jan  4 12:39:21 host sshd[28901]: Disconnected from 89.171.37.93 port 57648 [preauth]
Jan  4 12:40:18 host sshd[29145]: User root from 103.31.38.123 not allowed because not listed in AllowUsers
Jan  4 12:40:18 host sshd[29145]: input_userauth_request: invalid user root [preauth]
Jan  4 12:40:18 host unix_chkpwd[29149]: password check failed for user (root)
Jan  4 12:40:18 host sshd[29145]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.31.38.123  user=root
Jan  4 12:40:18 host sshd[29145]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 12:40:20 host sshd[29145]: Failed password for invalid user root from 103.31.38.123 port 37980 ssh2
Jan  4 12:40:20 host sshd[29145]: Received disconnect from 103.31.38.123 port 37980:11: Bye Bye [preauth]
Jan  4 12:40:20 host sshd[29145]: Disconnected from 103.31.38.123 port 37980 [preauth]
Jan  4 12:48:22 host sshd[30193]: Did not receive identification string from 27.71.231.21 port 34736
Jan  4 12:48:22 host sshd[30194]: Invalid user test from 27.71.231.21 port 34862
Jan  4 12:48:22 host sshd[30194]: input_userauth_request: invalid user test [preauth]
Jan  4 12:48:22 host sshd[30195]: Invalid user oracle from 27.71.231.21 port 34842
Jan  4 12:48:22 host sshd[30195]: input_userauth_request: invalid user oracle [preauth]
Jan  4 12:48:22 host sshd[30198]: Invalid user dmdba from 27.71.231.21 port 34768
Jan  4 12:48:22 host sshd[30196]: Invalid user openhabian from 27.71.231.21 port 35078
Jan  4 12:48:22 host sshd[30196]: input_userauth_request: invalid user openhabian [preauth]
Jan  4 12:48:22 host sshd[30198]: input_userauth_request: invalid user dmdba [preauth]
Jan  4 12:48:22 host sshd[30197]: Invalid user guest from 27.71.231.21 port 34898
Jan  4 12:48:22 host sshd[30197]: input_userauth_request: invalid user guest [preauth]
Jan  4 12:48:22 host sshd[30200]: Invalid user postgres from 27.71.231.21 port 34828
Jan  4 12:48:22 host sshd[30199]: Invalid user zjw from 27.71.231.21 port 34946
Jan  4 12:48:22 host sshd[30200]: input_userauth_request: invalid user postgres [preauth]
Jan  4 12:48:22 host sshd[30199]: input_userauth_request: invalid user zjw [preauth]
Jan  4 12:48:22 host sshd[30201]: Invalid user jenkins from 27.71.231.21 port 34858
Jan  4 12:48:22 host sshd[30201]: input_userauth_request: invalid user jenkins [preauth]
Jan  4 12:48:22 host sshd[30194]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 12:48:22 host sshd[30194]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  4 12:48:23 host sshd[30195]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 12:48:23 host sshd[30195]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  4 12:48:23 host sshd[30196]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 12:48:23 host sshd[30196]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  4 12:48:23 host sshd[30198]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 12:48:23 host sshd[30198]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  4 12:48:23 host sshd[30197]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 12:48:23 host sshd[30197]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  4 12:48:23 host sshd[30199]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 12:48:23 host sshd[30199]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  4 12:48:23 host sshd[30200]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 12:48:23 host sshd[30200]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  4 12:48:23 host sshd[30201]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 12:48:23 host sshd[30201]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  4 12:48:23 host sshd[30210]: Invalid user moxa from 27.71.231.21 port 34888
Jan  4 12:48:23 host sshd[30210]: input_userauth_request: invalid user moxa [preauth]
Jan  4 12:48:23 host sshd[30211]: Invalid user emqx from 27.71.231.21 port 34968
Jan  4 12:48:23 host sshd[30211]: input_userauth_request: invalid user emqx [preauth]
Jan  4 12:48:23 host sshd[30212]: Invalid user guest from 27.71.231.21 port 34910
Jan  4 12:48:23 host sshd[30212]: input_userauth_request: invalid user guest [preauth]
Jan  4 12:48:23 host sshd[30216]: Invalid user dmdba from 27.71.231.21 port 34760
Jan  4 12:48:23 host sshd[30216]: input_userauth_request: invalid user dmdba [preauth]
Jan  4 12:48:23 host sshd[30214]: User centos from 27.71.231.21 not allowed because not listed in AllowUsers
Jan  4 12:48:23 host sshd[30214]: input_userauth_request: invalid user centos [preauth]
Jan  4 12:48:23 host sshd[30219]: Invalid user ansible from 27.71.231.21 port 35036
Jan  4 12:48:23 host sshd[30219]: input_userauth_request: invalid user ansible [preauth]
Jan  4 12:48:23 host sshd[30213]: Invalid user test from 27.71.231.21 port 35024
Jan  4 12:48:23 host sshd[30213]: input_userauth_request: invalid user test [preauth]
Jan  4 12:48:23 host sshd[30215]: Invalid user devops from 27.71.231.21 port 34982
Jan  4 12:48:23 host sshd[30217]: Invalid user discord from 27.71.231.21 port 35014
Jan  4 12:48:23 host sshd[30215]: input_userauth_request: invalid user devops [preauth]
Jan  4 12:48:23 host sshd[30217]: input_userauth_request: invalid user discord [preauth]
Jan  4 12:48:23 host sshd[30218]: Invalid user dmdba from 27.71.231.21 port 34930
Jan  4 12:48:23 host sshd[30218]: input_userauth_request: invalid user dmdba [preauth]
Jan  4 12:48:23 host sshd[30210]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 12:48:23 host sshd[30210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  4 12:48:23 host sshd[30211]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 12:48:23 host sshd[30211]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  4 12:48:23 host sshd[30212]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 12:48:23 host sshd[30212]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  4 12:48:23 host sshd[30216]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 12:48:23 host sshd[30216]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  4 12:48:23 host sshd[30213]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 12:48:23 host sshd[30213]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  4 12:48:23 host sshd[30217]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 12:48:23 host sshd[30215]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 12:48:23 host sshd[30215]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  4 12:48:23 host sshd[30217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  4 12:48:23 host sshd[30219]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 12:48:23 host sshd[30219]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  4 12:48:23 host unix_chkpwd[30231]: password check failed for user (centos)
Jan  4 12:48:23 host sshd[30214]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21  user=centos
Jan  4 12:48:23 host sshd[30218]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 12:48:23 host sshd[30218]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  4 12:48:24 host sshd[30194]: Failed password for invalid user test from 27.71.231.21 port 34862 ssh2
Jan  4 12:48:24 host sshd[30194]: Connection closed by 27.71.231.21 port 34862 [preauth]
Jan  4 12:48:25 host sshd[30195]: Failed password for invalid user oracle from 27.71.231.21 port 34842 ssh2
Jan  4 12:48:25 host sshd[30196]: Failed password for invalid user openhabian from 27.71.231.21 port 35078 ssh2
Jan  4 12:48:25 host sshd[30198]: Failed password for invalid user dmdba from 27.71.231.21 port 34768 ssh2
Jan  4 12:48:25 host sshd[30197]: Failed password for invalid user guest from 27.71.231.21 port 34898 ssh2
Jan  4 12:48:25 host sshd[30199]: Failed password for invalid user zjw from 27.71.231.21 port 34946 ssh2
Jan  4 12:48:25 host sshd[30200]: Failed password for invalid user postgres from 27.71.231.21 port 34828 ssh2
Jan  4 12:48:25 host sshd[30201]: Failed password for invalid user jenkins from 27.71.231.21 port 34858 ssh2
Jan  4 12:48:25 host sshd[30195]: Connection closed by 27.71.231.21 port 34842 [preauth]
Jan  4 12:48:25 host sshd[30196]: Connection closed by 27.71.231.21 port 35078 [preauth]
Jan  4 12:48:25 host sshd[30198]: Connection closed by 27.71.231.21 port 34768 [preauth]
Jan  4 12:48:25 host sshd[30197]: Connection closed by 27.71.231.21 port 34898 [preauth]
Jan  4 12:48:25 host sshd[30199]: Connection closed by 27.71.231.21 port 34946 [preauth]
Jan  4 12:48:25 host sshd[30200]: Connection closed by 27.71.231.21 port 34828 [preauth]
Jan  4 12:48:25 host sshd[30201]: Connection closed by 27.71.231.21 port 34858 [preauth]
Jan  4 12:48:25 host sshd[30236]: User mail from 27.71.231.21 not allowed because not listed in AllowUsers
Jan  4 12:48:25 host sshd[30236]: input_userauth_request: invalid user mail [preauth]
Jan  4 12:48:25 host sshd[30210]: Failed password for invalid user moxa from 27.71.231.21 port 34888 ssh2
Jan  4 12:48:25 host sshd[30211]: Failed password for invalid user emqx from 27.71.231.21 port 34968 ssh2
Jan  4 12:48:25 host sshd[30235]: Invalid user postgres from 27.71.231.21 port 35064
Jan  4 12:48:25 host sshd[30235]: input_userauth_request: invalid user postgres [preauth]
Jan  4 12:48:25 host sshd[30212]: Failed password for invalid user guest from 27.71.231.21 port 34910 ssh2
Jan  4 12:48:25 host sshd[30239]: User centos from 27.71.231.21 not allowed because not listed in AllowUsers
Jan  4 12:48:25 host sshd[30239]: input_userauth_request: invalid user centos [preauth]
Jan  4 12:48:25 host sshd[30234]: Invalid user oracle from 27.71.231.21 port 34970
Jan  4 12:48:25 host sshd[30234]: input_userauth_request: invalid user oracle [preauth]
Jan  4 12:48:25 host sshd[30216]: Failed password for invalid user dmdba from 27.71.231.21 port 34760 ssh2
Jan  4 12:48:25 host sshd[30238]: Invalid user admin from 27.71.231.21 port 34794
Jan  4 12:48:25 host sshd[30238]: input_userauth_request: invalid user admin [preauth]
Jan  4 12:48:25 host sshd[30237]: Invalid user posiflex from 27.71.231.21 port 34880
Jan  4 12:48:25 host sshd[30237]: input_userauth_request: invalid user posiflex [preauth]
Jan  4 12:48:25 host sshd[30213]: Failed password for invalid user test from 27.71.231.21 port 35024 ssh2
Jan  4 12:48:25 host sshd[30217]: Failed password for invalid user discord from 27.71.231.21 port 35014 ssh2
Jan  4 12:48:25 host sshd[30215]: Failed password for invalid user devops from 27.71.231.21 port 34982 ssh2
Jan  4 12:48:25 host sshd[30219]: Failed password for invalid user ansible from 27.71.231.21 port 35036 ssh2
Jan  4 12:48:25 host sshd[30214]: Failed password for invalid user centos from 27.71.231.21 port 34950 ssh2
Jan  4 12:48:25 host sshd[30218]: Failed password for invalid user dmdba from 27.71.231.21 port 34930 ssh2
Jan  4 12:48:25 host sshd[30240]: Invalid user admin from 27.71.231.21 port 34992
Jan  4 12:48:25 host sshd[30240]: input_userauth_request: invalid user admin [preauth]
Jan  4 12:48:25 host sshd[30241]: Invalid user notes from 27.71.231.21 port 35022
Jan  4 12:48:25 host sshd[30241]: input_userauth_request: invalid user notes [preauth]
Jan  4 12:48:25 host unix_chkpwd[30271]: password check failed for user (mail)
Jan  4 12:48:25 host sshd[30236]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21  user=mail
Jan  4 12:48:25 host sshd[30236]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "mail"
Jan  4 12:48:25 host sshd[30210]: Connection closed by 27.71.231.21 port 34888 [preauth]
Jan  4 12:48:25 host sshd[30235]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 12:48:25 host sshd[30235]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  4 12:48:25 host sshd[30211]: Connection closed by 27.71.231.21 port 34968 [preauth]
Jan  4 12:48:26 host unix_chkpwd[30272]: password check failed for user (centos)
Jan  4 12:48:26 host sshd[30239]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21  user=centos
Jan  4 12:48:26 host sshd[30234]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 12:48:26 host sshd[30234]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  4 12:48:26 host sshd[30219]: Connection closed by 27.71.231.21 port 35036 [preauth]
Jan  4 12:48:26 host sshd[30214]: Connection closed by 27.71.231.21 port 34950 [preauth]
Jan  4 12:48:26 host sshd[30217]: Connection closed by 27.71.231.21 port 35014 [preauth]
Jan  4 12:48:26 host sshd[30215]: Connection closed by 27.71.231.21 port 34982 [preauth]
Jan  4 12:48:26 host sshd[30213]: Connection closed by 27.71.231.21 port 35024 [preauth]
Jan  4 12:48:26 host sshd[30237]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 12:48:26 host sshd[30237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  4 12:48:26 host sshd[30216]: Connection closed by 27.71.231.21 port 34760 [preauth]
Jan  4 12:48:26 host sshd[30240]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 12:48:26 host sshd[30240]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  4 12:48:26 host sshd[30238]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 12:48:26 host sshd[30238]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  4 12:48:26 host sshd[30241]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 12:48:26 host sshd[30241]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  4 12:48:26 host sshd[30212]: Connection closed by 27.71.231.21 port 34910 [preauth]
Jan  4 12:48:26 host sshd[30218]: Connection closed by 27.71.231.21 port 34930 [preauth]
Jan  4 12:48:28 host sshd[30234]: Failed password for invalid user oracle from 27.71.231.21 port 34970 ssh2
Jan  4 12:48:28 host sshd[30237]: Failed password for invalid user posiflex from 27.71.231.21 port 34880 ssh2
Jan  4 12:48:28 host sshd[30238]: Failed password for invalid user admin from 27.71.231.21 port 34794 ssh2
Jan  4 12:48:28 host sshd[30240]: Failed password for invalid user admin from 27.71.231.21 port 34992 ssh2
Jan  4 12:48:28 host sshd[30241]: Failed password for invalid user notes from 27.71.231.21 port 35022 ssh2
Jan  4 12:48:28 host sshd[30236]: Failed password for invalid user mail from 27.71.231.21 port 35114 ssh2
Jan  4 12:48:28 host sshd[30235]: Failed password for invalid user postgres from 27.71.231.21 port 35064 ssh2
Jan  4 12:48:28 host sshd[30239]: Failed password for invalid user centos from 27.71.231.21 port 35126 ssh2
Jan  4 12:54:53 host sshd[31143]: Invalid user kevin from 162.218.126.136 port 36526
Jan  4 12:54:53 host sshd[31143]: input_userauth_request: invalid user kevin [preauth]
Jan  4 12:54:53 host sshd[31143]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 12:54:53 host sshd[31143]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136
Jan  4 12:54:55 host sshd[31143]: Failed password for invalid user kevin from 162.218.126.136 port 36526 ssh2
Jan  4 12:54:55 host sshd[31143]: Connection closed by 162.218.126.136 port 36526 [preauth]
Jan  4 12:58:20 host sshd[31646]: Invalid user webapp from 103.13.40.2 port 55262
Jan  4 12:58:20 host sshd[31646]: input_userauth_request: invalid user webapp [preauth]
Jan  4 12:58:20 host sshd[31646]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 12:58:20 host sshd[31646]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2
Jan  4 12:58:22 host sshd[31646]: Failed password for invalid user webapp from 103.13.40.2 port 55262 ssh2
Jan  4 12:58:22 host sshd[31646]: Connection closed by 103.13.40.2 port 55262 [preauth]
Jan  4 13:09:38 host sshd[810]: Invalid user oracle from 41.197.31.178 port 43842
Jan  4 13:09:38 host sshd[810]: input_userauth_request: invalid user oracle [preauth]
Jan  4 13:09:38 host sshd[810]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 13:09:38 host sshd[810]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178
Jan  4 13:09:40 host sshd[810]: Failed password for invalid user oracle from 41.197.31.178 port 43842 ssh2
Jan  4 13:09:40 host sshd[810]: Connection closed by 41.197.31.178 port 43842 [preauth]
Jan  4 13:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  4 13:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 13:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 13:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  4 13:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 13:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 13:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  4 13:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 13:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 13:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  4 13:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 13:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 13:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  4 13:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 13:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 13:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  4 13:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 13:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 13:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  4 13:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 13:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 13:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  4 13:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 13:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 13:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  4 13:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 13:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 13:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  4 13:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 13:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 13:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  4 13:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 13:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 13:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  4 13:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 13:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 13:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  4 13:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 13:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 13:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=bonifacegroup user-2=wwwevmhonda user-3=wwwletsstalkfood user-4=straightcurve user-5=palco123 user-6=gifterman user-7=phmetals user-8=kottayamcalldriv user-9=mrsclean user-10=wwwnexidigital user-11=remysagr user-12=disposeat user-13=wwwkmaorg user-14=wwwkapin user-15=woodpeck user-16=vfmassets user-17=shalinijames user-18=wwwtestugo user-19=pmcresources user-20=wwwpmcresource user-21=travelboniface user-22=keralaholi user-23=wwwresourcehunte user-24=wwwrmswll user-25=ugotscom user-26=wwwkaretakers user-27=cochintaxi user-28=a2zgroup user-29=dartsimp user-30=laundryboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  4 13:21:52 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  4 13:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 13:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 13:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  4 13:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 13:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 13:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-2NF0mKsx1USxsexy.~
Jan  4 13:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 13:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 13:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-2NF0mKsx1USxsexy.~'
Jan  4 13:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 13:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 13:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-2NF0mKsx1USxsexy.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  4 13:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 13:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 13:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  4 13:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 13:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 13:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  4 13:21:56 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 13:21:56 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 13:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  4 13:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 13:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 13:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  4 13:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 13:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 13:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  4 13:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 13:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 13:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  4 13:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 13:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 13:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  4 13:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 13:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 13:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  4 13:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  4 13:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  4 13:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  4 13:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  4 13:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  4 13:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  4 13:22:01 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  4 13:22:03 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  4 13:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  4 13:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 13:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 13:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  4 13:22:08 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 13:22:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 13:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  4 13:22:09 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 13:22:13 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 13:22:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  4 13:22:14 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 13:22:15 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 13:22:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  4 13:22:15 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 13:22:21 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 13:26:10 host sshd[4392]: User root from 131.0.0.11 not allowed because not listed in AllowUsers
Jan  4 13:26:10 host sshd[4392]: input_userauth_request: invalid user root [preauth]
Jan  4 13:26:11 host unix_chkpwd[4405]: password check failed for user (root)
Jan  4 13:26:11 host sshd[4392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=131.0.0.11  user=root
Jan  4 13:26:11 host sshd[4392]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 13:26:13 host sshd[4392]: Failed password for invalid user root from 131.0.0.11 port 43946 ssh2
Jan  4 13:26:15 host sshd[4392]: Connection closed by 131.0.0.11 port 43946 [preauth]
Jan  4 13:52:28 host sshd[8844]: User root from 92.46.108.20 not allowed because not listed in AllowUsers
Jan  4 13:52:28 host sshd[8844]: input_userauth_request: invalid user root [preauth]
Jan  4 13:52:29 host unix_chkpwd[8851]: password check failed for user (root)
Jan  4 13:52:29 host sshd[8844]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20  user=root
Jan  4 13:52:29 host sshd[8844]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 13:52:31 host sshd[8844]: Failed password for invalid user root from 92.46.108.20 port 39800 ssh2
Jan  4 13:52:32 host sshd[8844]: Connection closed by 92.46.108.20 port 39800 [preauth]
Jan  4 13:57:22 host sshd[9519]: Invalid user yuanjiale from 162.218.126.136 port 33078
Jan  4 13:57:22 host sshd[9519]: input_userauth_request: invalid user yuanjiale [preauth]
Jan  4 13:57:22 host sshd[9519]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 13:57:22 host sshd[9519]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136
Jan  4 13:57:24 host sshd[9519]: Failed password for invalid user yuanjiale from 162.218.126.136 port 33078 ssh2
Jan  4 13:57:24 host sshd[9519]: Connection closed by 162.218.126.136 port 33078 [preauth]
Jan  4 14:11:25 host sshd[12782]: Bad protocol version identification '\003' from 92.255.85.183 port 63403
Jan  4 14:19:24 host sshd[13862]: User root from 103.13.40.2 not allowed because not listed in AllowUsers
Jan  4 14:19:24 host sshd[13862]: input_userauth_request: invalid user root [preauth]
Jan  4 14:19:24 host unix_chkpwd[13864]: password check failed for user (root)
Jan  4 14:19:24 host sshd[13862]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2  user=root
Jan  4 14:19:24 host sshd[13862]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 14:19:26 host sshd[13862]: Failed password for invalid user root from 103.13.40.2 port 54574 ssh2
Jan  4 14:19:26 host sshd[13862]: Connection closed by 103.13.40.2 port 54574 [preauth]
Jan  4 14:20:30 host sshd[14079]: User root from 190.210.182.179 not allowed because not listed in AllowUsers
Jan  4 14:20:30 host sshd[14079]: input_userauth_request: invalid user root [preauth]
Jan  4 14:20:30 host unix_chkpwd[14084]: password check failed for user (root)
Jan  4 14:20:30 host sshd[14079]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.210.182.179  user=root
Jan  4 14:20:30 host sshd[14079]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 14:20:32 host sshd[14079]: Failed password for invalid user root from 190.210.182.179 port 45091 ssh2
Jan  4 14:20:32 host sshd[14079]: Received disconnect from 190.210.182.179 port 45091:11: Bye Bye [preauth]
Jan  4 14:20:32 host sshd[14079]: Disconnected from 190.210.182.179 port 45091 [preauth]
Jan  4 14:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  4 14:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 14:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 14:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  4 14:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 14:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 14:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  4 14:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 14:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 14:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  4 14:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 14:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 14:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  4 14:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 14:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 14:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  4 14:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 14:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 14:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  4 14:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 14:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 14:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  4 14:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 14:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 14:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  4 14:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 14:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 14:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  4 14:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 14:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 14:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  4 14:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 14:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 14:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  4 14:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 14:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 14:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  4 14:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 14:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 14:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=pmcresources user-2=shalinijames user-3=wwwtestugo user-4=vfmassets user-5=woodpeck user-6=wwwkapin user-7=wwwkmaorg user-8=disposeat user-9=remysagr user-10=mrsclean user-11=wwwnexidigital user-12=kottayamcalldriv user-13=phmetals user-14=palco123 user-15=gifterman user-16=wwwletsstalkfood user-17=straightcurve user-18=wwwevmhonda user-19=bonifacegroup user-20=laundryboniface user-21=a2zgroup user-22=dartsimp user-23=wwwkaretakers user-24=cochintaxi user-25=ugotscom user-26=keralaholi user-27=wwwresourcehunte user-28=wwwrmswll user-29=travelboniface user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  4 14:21:52 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  4 14:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 14:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 14:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  4 14:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 14:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 14:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-MoOflnggcGjD5YZ2.~
Jan  4 14:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 14:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 14:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-MoOflnggcGjD5YZ2.~'
Jan  4 14:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 14:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 14:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-MoOflnggcGjD5YZ2.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  4 14:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 14:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 14:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  4 14:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 14:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 14:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  4 14:21:53 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 14:21:53 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 14:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  4 14:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 14:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 14:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  4 14:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 14:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 14:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  4 14:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 14:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 14:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  4 14:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 14:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 14:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  4 14:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 14:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 14:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  4 14:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  4 14:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  4 14:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  4 14:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  4 14:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  4 14:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  4 14:21:57 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  4 14:21:59 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  4 14:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  4 14:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 14:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 14:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  4 14:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 14:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 14:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  4 14:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 14:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 14:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  4 14:22:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 14:22:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 14:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  4 14:22:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 14:22:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 14:25:02 host sshd[14854]: User root from 190.210.182.179 not allowed because not listed in AllowUsers
Jan  4 14:25:02 host sshd[14854]: input_userauth_request: invalid user root [preauth]
Jan  4 14:25:02 host unix_chkpwd[14880]: password check failed for user (root)
Jan  4 14:25:02 host sshd[14854]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.210.182.179  user=root
Jan  4 14:25:02 host sshd[14854]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 14:25:05 host sshd[14854]: Failed password for invalid user root from 190.210.182.179 port 41311 ssh2
Jan  4 14:25:05 host sshd[14854]: Received disconnect from 190.210.182.179 port 41311:11: Bye Bye [preauth]
Jan  4 14:25:05 host sshd[14854]: Disconnected from 190.210.182.179 port 41311 [preauth]
Jan  4 14:31:37 host sshd[15866]: Invalid user admin from 183.107.47.119 port 48947
Jan  4 14:31:37 host sshd[15866]: input_userauth_request: invalid user admin [preauth]
Jan  4 14:31:37 host sshd[15866]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 14:31:37 host sshd[15866]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.107.47.119
Jan  4 14:31:39 host sshd[15866]: Failed password for invalid user admin from 183.107.47.119 port 48947 ssh2
Jan  4 14:31:40 host sshd[15866]: Connection closed by 183.107.47.119 port 48947 [preauth]
Jan  4 14:53:54 host sshd[18864]: Invalid user caoke from 41.197.31.178 port 53338
Jan  4 14:53:54 host sshd[18864]: input_userauth_request: invalid user caoke [preauth]
Jan  4 14:53:54 host sshd[18864]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 14:53:54 host sshd[18864]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178
Jan  4 14:53:57 host sshd[18864]: Failed password for invalid user caoke from 41.197.31.178 port 53338 ssh2
Jan  4 14:53:57 host sshd[18864]: Connection closed by 41.197.31.178 port 53338 [preauth]
Jan  4 15:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  4 15:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 15:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 15:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  4 15:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 15:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 15:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  4 15:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 15:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 15:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  4 15:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 15:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 15:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  4 15:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 15:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 15:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  4 15:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 15:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 15:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  4 15:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 15:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 15:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  4 15:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 15:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 15:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  4 15:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 15:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 15:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  4 15:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 15:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 15:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  4 15:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 15:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 15:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  4 15:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 15:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 15:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  4 15:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 15:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 15:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwevmhonda user-2=bonifacegroup user-3=wwwletsstalkfood user-4=straightcurve user-5=phmetals user-6=kottayamcalldriv user-7=gifterman user-8=palco123 user-9=wwwnexidigital user-10=mrsclean user-11=wwwkmaorg user-12=disposeat user-13=remysagr user-14=woodpeck user-15=wwwkapin user-16=wwwtestugo user-17=shalinijames user-18=vfmassets user-19=pmcresources user-20=wwwpmcresource user-21=travelboniface user-22=ugotscom user-23=wwwrmswll user-24=wwwresourcehunte user-25=keralaholi user-26=cochintaxi user-27=wwwkaretakers user-28=dartsimp user-29=a2zgroup user-30=laundryboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  4 15:21:52 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  4 15:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 15:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 15:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  4 15:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 15:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 15:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-vDKjDeXtfbwgmWpH.~
Jan  4 15:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 15:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 15:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-vDKjDeXtfbwgmWpH.~'
Jan  4 15:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 15:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 15:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-vDKjDeXtfbwgmWpH.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  4 15:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 15:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 15:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  4 15:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 15:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 15:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  4 15:21:53 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 15:21:53 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 15:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  4 15:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 15:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 15:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  4 15:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 15:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 15:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  4 15:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 15:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 15:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  4 15:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 15:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 15:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  4 15:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 15:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 15:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  4 15:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  4 15:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  4 15:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  4 15:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  4 15:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  4 15:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  4 15:21:58 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  4 15:21:59 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  4 15:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  4 15:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 15:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 15:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  4 15:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 15:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 15:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  4 15:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 15:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 15:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  4 15:22:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 15:22:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 15:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  4 15:22:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 15:22:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 15:25:44 host sshd[23341]: Invalid user admin from 220.84.234.193 port 33499
Jan  4 15:25:44 host sshd[23341]: input_userauth_request: invalid user admin [preauth]
Jan  4 15:25:44 host sshd[23341]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 15:25:44 host sshd[23341]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.84.234.193
Jan  4 15:25:46 host sshd[23341]: Failed password for invalid user admin from 220.84.234.193 port 33499 ssh2
Jan  4 15:25:46 host sshd[23341]: Connection closed by 220.84.234.193 port 33499 [preauth]
Jan  4 15:29:01 host sshd[23708]: Invalid user service from 162.218.126.136 port 47844
Jan  4 15:29:01 host sshd[23708]: input_userauth_request: invalid user service [preauth]
Jan  4 15:29:02 host sshd[23708]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 15:29:02 host sshd[23708]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136
Jan  4 15:29:03 host sshd[23708]: Failed password for invalid user service from 162.218.126.136 port 47844 ssh2
Jan  4 15:29:04 host sshd[23708]: Connection closed by 162.218.126.136 port 47844 [preauth]
Jan  4 15:31:59 host sshd[24207]: Connection reset by 205.210.31.51 port 63818 [preauth]
Jan  4 15:40:09 host sshd[25362]: User root from 103.13.40.2 not allowed because not listed in AllowUsers
Jan  4 15:40:09 host sshd[25362]: input_userauth_request: invalid user root [preauth]
Jan  4 15:40:09 host unix_chkpwd[25364]: password check failed for user (root)
Jan  4 15:40:09 host sshd[25362]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2  user=root
Jan  4 15:40:09 host sshd[25362]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 15:40:11 host sshd[25362]: Failed password for invalid user root from 103.13.40.2 port 53344 ssh2
Jan  4 15:40:11 host sshd[25362]: Connection closed by 103.13.40.2 port 53344 [preauth]
Jan  4 16:03:05 host sshd[28512]: Did not receive identification string from 43.153.51.28 port 42130
Jan  4 16:17:08 host sshd[30488]: Did not receive identification string from 64.227.181.236 port 61000
Jan  4 16:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  4 16:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 16:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 16:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  4 16:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 16:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 16:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  4 16:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 16:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 16:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  4 16:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 16:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 16:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  4 16:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 16:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 16:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  4 16:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 16:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 16:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  4 16:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 16:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 16:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  4 16:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 16:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 16:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  4 16:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 16:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 16:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  4 16:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 16:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 16:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  4 16:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 16:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 16:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  4 16:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 16:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 16:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  4 16:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 16:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 16:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=straightcurve user-2=wwwletsstalkfood user-3=bonifacegroup user-4=wwwevmhonda user-5=wwwnexidigital user-6=mrsclean user-7=gifterman user-8=palco123 user-9=phmetals user-10=kottayamcalldriv user-11=wwwkapin user-12=woodpeck user-13=disposeat user-14=wwwkmaorg user-15=remysagr user-16=pmcresources user-17=vfmassets user-18=wwwtestugo user-19=shalinijames user-20=wwwpmcresource user-21=wwwrmswll user-22=wwwresourcehunte user-23=keralaholi user-24=ugotscom user-25=travelboniface user-26=wwwkaretakers user-27=cochintaxi user-28=laundryboniface user-29=dartsimp user-30=a2zgroup feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  4 16:21:52 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  4 16:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 16:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 16:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  4 16:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 16:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 16:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-oTtMYZIRElrfG4Ix.~
Jan  4 16:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 16:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 16:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-oTtMYZIRElrfG4Ix.~'
Jan  4 16:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 16:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 16:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-oTtMYZIRElrfG4Ix.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  4 16:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 16:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 16:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  4 16:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 16:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 16:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  4 16:21:53 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 16:21:53 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 16:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  4 16:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 16:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 16:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  4 16:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 16:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 16:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  4 16:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 16:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 16:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  4 16:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 16:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 16:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  4 16:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 16:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 16:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  4 16:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  4 16:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  4 16:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  4 16:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  4 16:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  4 16:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  4 16:21:58 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  4 16:22:00 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  4 16:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  4 16:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 16:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 16:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  4 16:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 16:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 16:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  4 16:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 16:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 16:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  4 16:22:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 16:22:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 16:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  4 16:22:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 16:22:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 16:22:46 host sshd[31460]: User root from 188.173.136.132 not allowed because not listed in AllowUsers
Jan  4 16:22:46 host sshd[31460]: input_userauth_request: invalid user root [preauth]
Jan  4 16:22:46 host unix_chkpwd[31463]: password check failed for user (root)
Jan  4 16:22:46 host sshd[31460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.173.136.132  user=root
Jan  4 16:22:46 host sshd[31460]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 16:22:48 host sshd[31460]: Failed password for invalid user root from 188.173.136.132 port 33353 ssh2
Jan  4 16:22:48 host sshd[31460]: Received disconnect from 188.173.136.132 port 33353:11: Bye Bye [preauth]
Jan  4 16:22:48 host sshd[31460]: Disconnected from 188.173.136.132 port 33353 [preauth]
Jan  4 16:23:43 host sshd[31571]: User root from 206.189.130.185 not allowed because not listed in AllowUsers
Jan  4 16:23:43 host sshd[31571]: input_userauth_request: invalid user root [preauth]
Jan  4 16:23:43 host unix_chkpwd[31573]: password check failed for user (root)
Jan  4 16:23:43 host sshd[31571]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.130.185  user=root
Jan  4 16:23:43 host sshd[31571]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 16:23:45 host sshd[31571]: Failed password for invalid user root from 206.189.130.185 port 43486 ssh2
Jan  4 16:23:45 host sshd[31571]: Received disconnect from 206.189.130.185 port 43486:11: Bye Bye [preauth]
Jan  4 16:23:45 host sshd[31571]: Disconnected from 206.189.130.185 port 43486 [preauth]
Jan  4 16:23:50 host sshd[31585]: Invalid user haldaemon from 154.16.115.170 port 37842
Jan  4 16:23:50 host sshd[31585]: input_userauth_request: invalid user haldaemon [preauth]
Jan  4 16:23:50 host sshd[31585]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 16:23:50 host sshd[31585]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.16.115.170
Jan  4 16:23:52 host sshd[31585]: Failed password for invalid user haldaemon from 154.16.115.170 port 37842 ssh2
Jan  4 16:23:53 host sshd[31585]: Received disconnect from 154.16.115.170 port 37842:11: Bye Bye [preauth]
Jan  4 16:23:53 host sshd[31585]: Disconnected from 154.16.115.170 port 37842 [preauth]
Jan  4 16:23:53 host sshd[31591]: Invalid user mongod from 143.198.146.239 port 42094
Jan  4 16:23:53 host sshd[31591]: input_userauth_request: invalid user mongod [preauth]
Jan  4 16:23:53 host sshd[31591]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 16:23:53 host sshd[31591]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.146.239
Jan  4 16:23:55 host sshd[31591]: Failed password for invalid user mongod from 143.198.146.239 port 42094 ssh2
Jan  4 16:23:55 host sshd[31591]: Received disconnect from 143.198.146.239 port 42094:11: Bye Bye [preauth]
Jan  4 16:23:55 host sshd[31591]: Disconnected from 143.198.146.239 port 42094 [preauth]
Jan  4 16:24:34 host sshd[31668]: User root from 35.198.18.45 not allowed because not listed in AllowUsers
Jan  4 16:24:34 host sshd[31668]: input_userauth_request: invalid user root [preauth]
Jan  4 16:24:34 host unix_chkpwd[31671]: password check failed for user (root)
Jan  4 16:24:34 host sshd[31668]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.198.18.45  user=root
Jan  4 16:24:34 host sshd[31668]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 16:24:35 host sshd[31668]: Failed password for invalid user root from 35.198.18.45 port 41118 ssh2
Jan  4 16:24:36 host sshd[31668]: Received disconnect from 35.198.18.45 port 41118:11: Bye Bye [preauth]
Jan  4 16:24:36 host sshd[31668]: Disconnected from 35.198.18.45 port 41118 [preauth]
Jan  4 16:26:06 host sshd[31857]: Invalid user test from 43.156.40.46 port 43976
Jan  4 16:26:06 host sshd[31857]: input_userauth_request: invalid user test [preauth]
Jan  4 16:26:06 host sshd[31857]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 16:26:06 host sshd[31857]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.40.46
Jan  4 16:26:08 host sshd[31857]: Failed password for invalid user test from 43.156.40.46 port 43976 ssh2
Jan  4 16:26:08 host sshd[31857]: Received disconnect from 43.156.40.46 port 43976:11: Bye Bye [preauth]
Jan  4 16:26:08 host sshd[31857]: Disconnected from 43.156.40.46 port 43976 [preauth]
Jan  4 16:26:23 host sshd[31874]: User root from 103.124.94.240 not allowed because not listed in AllowUsers
Jan  4 16:26:23 host sshd[31874]: input_userauth_request: invalid user root [preauth]
Jan  4 16:26:23 host unix_chkpwd[31876]: password check failed for user (root)
Jan  4 16:26:23 host sshd[31874]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.124.94.240  user=root
Jan  4 16:26:23 host sshd[31874]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 16:26:25 host sshd[31874]: Failed password for invalid user root from 103.124.94.240 port 52486 ssh2
Jan  4 16:26:26 host sshd[31874]: Received disconnect from 103.124.94.240 port 52486:11: Bye Bye [preauth]
Jan  4 16:26:26 host sshd[31874]: Disconnected from 103.124.94.240 port 52486 [preauth]
Jan  4 16:26:35 host sshd[31909]: Invalid user lyl from 92.46.108.20 port 39654
Jan  4 16:26:35 host sshd[31909]: input_userauth_request: invalid user lyl [preauth]
Jan  4 16:26:36 host sshd[31909]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 16:26:36 host sshd[31909]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20
Jan  4 16:26:38 host sshd[31909]: Failed password for invalid user lyl from 92.46.108.20 port 39654 ssh2
Jan  4 16:26:38 host sshd[31909]: Connection closed by 92.46.108.20 port 39654 [preauth]
Jan  4 16:26:41 host sshd[31920]: User root from 41.197.31.178 not allowed because not listed in AllowUsers
Jan  4 16:26:41 host sshd[31920]: input_userauth_request: invalid user root [preauth]
Jan  4 16:26:41 host unix_chkpwd[31926]: password check failed for user (root)
Jan  4 16:26:41 host sshd[31920]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178  user=root
Jan  4 16:26:41 host sshd[31920]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 16:26:43 host sshd[31920]: Failed password for invalid user root from 41.197.31.178 port 47764 ssh2
Jan  4 16:26:43 host sshd[31920]: Connection closed by 41.197.31.178 port 47764 [preauth]
Jan  4 16:27:08 host sshd[32068]: Invalid user hugo from 152.67.40.146 port 48210
Jan  4 16:27:08 host sshd[32068]: input_userauth_request: invalid user hugo [preauth]
Jan  4 16:27:08 host sshd[32068]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 16:27:08 host sshd[32068]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.67.40.146
Jan  4 16:27:10 host sshd[32068]: Failed password for invalid user hugo from 152.67.40.146 port 48210 ssh2
Jan  4 16:27:11 host sshd[32068]: Received disconnect from 152.67.40.146 port 48210:11: Bye Bye [preauth]
Jan  4 16:27:11 host sshd[32068]: Disconnected from 152.67.40.146 port 48210 [preauth]
Jan  4 16:29:08 host sshd[32273]: Invalid user zabbix from 35.198.18.45 port 48136
Jan  4 16:29:08 host sshd[32273]: input_userauth_request: invalid user zabbix [preauth]
Jan  4 16:29:08 host sshd[32273]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 16:29:08 host sshd[32273]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.198.18.45
Jan  4 16:29:09 host sshd[32277]: User root from 45.240.88.142 not allowed because not listed in AllowUsers
Jan  4 16:29:09 host sshd[32277]: input_userauth_request: invalid user root [preauth]
Jan  4 16:29:10 host unix_chkpwd[32280]: password check failed for user (root)
Jan  4 16:29:10 host sshd[32277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.240.88.142  user=root
Jan  4 16:29:10 host sshd[32277]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 16:29:10 host sshd[32273]: Failed password for invalid user zabbix from 35.198.18.45 port 48136 ssh2
Jan  4 16:29:10 host sshd[32273]: Received disconnect from 35.198.18.45 port 48136:11: Bye Bye [preauth]
Jan  4 16:29:10 host sshd[32273]: Disconnected from 35.198.18.45 port 48136 [preauth]
Jan  4 16:29:12 host sshd[32277]: Failed password for invalid user root from 45.240.88.142 port 52540 ssh2
Jan  4 16:29:12 host sshd[32277]: Received disconnect from 45.240.88.142 port 52540:11: Bye Bye [preauth]
Jan  4 16:29:12 host sshd[32277]: Disconnected from 45.240.88.142 port 52540 [preauth]
Jan  4 16:29:20 host sshd[32326]: User root from 188.173.136.132 not allowed because not listed in AllowUsers
Jan  4 16:29:20 host sshd[32326]: input_userauth_request: invalid user root [preauth]
Jan  4 16:29:20 host unix_chkpwd[32329]: password check failed for user (root)
Jan  4 16:29:20 host sshd[32326]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.173.136.132  user=root
Jan  4 16:29:20 host sshd[32326]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 16:29:22 host sshd[32326]: Failed password for invalid user root from 188.173.136.132 port 34441 ssh2
Jan  4 16:29:22 host sshd[32326]: Received disconnect from 188.173.136.132 port 34441:11: Bye Bye [preauth]
Jan  4 16:29:22 host sshd[32326]: Disconnected from 188.173.136.132 port 34441 [preauth]
Jan  4 16:29:26 host sshd[32388]: User root from 206.189.130.185 not allowed because not listed in AllowUsers
Jan  4 16:29:26 host sshd[32388]: input_userauth_request: invalid user root [preauth]
Jan  4 16:29:27 host unix_chkpwd[32391]: password check failed for user (root)
Jan  4 16:29:27 host sshd[32388]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.130.185  user=root
Jan  4 16:29:27 host sshd[32388]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 16:29:29 host sshd[32388]: Failed password for invalid user root from 206.189.130.185 port 49330 ssh2
Jan  4 16:29:29 host sshd[32388]: Received disconnect from 206.189.130.185 port 49330:11: Bye Bye [preauth]
Jan  4 16:29:29 host sshd[32388]: Disconnected from 206.189.130.185 port 49330 [preauth]
Jan  4 16:29:33 host sshd[32429]: Invalid user gmodserver from 43.156.40.46 port 57952
Jan  4 16:29:33 host sshd[32429]: input_userauth_request: invalid user gmodserver [preauth]
Jan  4 16:29:33 host sshd[32429]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 16:29:33 host sshd[32429]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.40.46
Jan  4 16:29:35 host sshd[32429]: Failed password for invalid user gmodserver from 43.156.40.46 port 57952 ssh2
Jan  4 16:29:35 host sshd[32429]: Received disconnect from 43.156.40.46 port 57952:11: Bye Bye [preauth]
Jan  4 16:29:35 host sshd[32429]: Disconnected from 43.156.40.46 port 57952 [preauth]
Jan  4 16:29:38 host sshd[32435]: User root from 143.198.146.239 not allowed because not listed in AllowUsers
Jan  4 16:29:38 host sshd[32435]: input_userauth_request: invalid user root [preauth]
Jan  4 16:29:38 host unix_chkpwd[32439]: password check failed for user (root)
Jan  4 16:29:38 host sshd[32435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.146.239  user=root
Jan  4 16:29:38 host sshd[32435]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 16:29:41 host sshd[32435]: Failed password for invalid user root from 143.198.146.239 port 34674 ssh2
Jan  4 16:29:41 host sshd[32443]: User root from 103.124.94.240 not allowed because not listed in AllowUsers
Jan  4 16:29:41 host sshd[32443]: input_userauth_request: invalid user root [preauth]
Jan  4 16:29:41 host unix_chkpwd[32446]: password check failed for user (root)
Jan  4 16:29:41 host sshd[32443]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.124.94.240  user=root
Jan  4 16:29:41 host sshd[32443]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 16:29:41 host sshd[32435]: Received disconnect from 143.198.146.239 port 34674:11: Bye Bye [preauth]
Jan  4 16:29:41 host sshd[32435]: Disconnected from 143.198.146.239 port 34674 [preauth]
Jan  4 16:29:43 host sshd[32443]: Failed password for invalid user root from 103.124.94.240 port 36788 ssh2
Jan  4 16:29:43 host sshd[32443]: Received disconnect from 103.124.94.240 port 36788:11: Bye Bye [preauth]
Jan  4 16:29:43 host sshd[32443]: Disconnected from 103.124.94.240 port 36788 [preauth]
Jan  4 16:30:37 host sshd[32636]: Invalid user ubuntu from 45.240.88.142 port 43028
Jan  4 16:30:37 host sshd[32636]: input_userauth_request: invalid user ubuntu [preauth]
Jan  4 16:30:37 host sshd[32636]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 16:30:37 host sshd[32636]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.240.88.142
Jan  4 16:30:39 host sshd[32636]: Failed password for invalid user ubuntu from 45.240.88.142 port 43028 ssh2
Jan  4 16:30:39 host sshd[32636]: Received disconnect from 45.240.88.142 port 43028:11: Bye Bye [preauth]
Jan  4 16:30:39 host sshd[32636]: Disconnected from 45.240.88.142 port 43028 [preauth]
Jan  4 16:30:57 host sshd[32701]: User root from 43.156.40.46 not allowed because not listed in AllowUsers
Jan  4 16:30:57 host sshd[32701]: input_userauth_request: invalid user root [preauth]
Jan  4 16:30:57 host unix_chkpwd[32703]: password check failed for user (root)
Jan  4 16:30:57 host sshd[32701]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.40.46  user=root
Jan  4 16:30:57 host sshd[32701]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 16:30:59 host sshd[32701]: Failed password for invalid user root from 43.156.40.46 port 57974 ssh2
Jan  4 16:30:59 host sshd[32701]: Received disconnect from 43.156.40.46 port 57974:11: Bye Bye [preauth]
Jan  4 16:30:59 host sshd[32701]: Disconnected from 43.156.40.46 port 57974 [preauth]
Jan  4 16:32:14 host sshd[517]: Invalid user ubuntu from 144.22.221.52 port 37494
Jan  4 16:32:14 host sshd[517]: input_userauth_request: invalid user ubuntu [preauth]
Jan  4 16:32:14 host sshd[517]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 16:32:14 host sshd[517]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.22.221.52
Jan  4 16:32:16 host sshd[517]: Failed password for invalid user ubuntu from 144.22.221.52 port 37494 ssh2
Jan  4 16:32:17 host sshd[517]: Received disconnect from 144.22.221.52 port 37494:11: Bye Bye [preauth]
Jan  4 16:32:17 host sshd[517]: Disconnected from 144.22.221.52 port 37494 [preauth]
Jan  4 16:32:24 host sshd[530]: Invalid user cashier from 152.67.40.146 port 33116
Jan  4 16:32:24 host sshd[530]: input_userauth_request: invalid user cashier [preauth]
Jan  4 16:32:24 host sshd[530]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 16:32:24 host sshd[530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.67.40.146
Jan  4 16:32:25 host sshd[530]: Failed password for invalid user cashier from 152.67.40.146 port 33116 ssh2
Jan  4 16:32:25 host sshd[530]: Received disconnect from 152.67.40.146 port 33116:11: Bye Bye [preauth]
Jan  4 16:32:25 host sshd[530]: Disconnected from 152.67.40.146 port 33116 [preauth]
Jan  4 16:32:49 host sshd[641]: Invalid user roger from 107.189.30.59 port 52744
Jan  4 16:32:49 host sshd[641]: input_userauth_request: invalid user roger [preauth]
Jan  4 16:32:49 host sshd[641]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 16:32:49 host sshd[641]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59
Jan  4 16:32:52 host sshd[641]: Failed password for invalid user roger from 107.189.30.59 port 52744 ssh2
Jan  4 16:32:52 host sshd[641]: Connection closed by 107.189.30.59 port 52744 [preauth]
Jan  4 16:33:56 host sshd[747]: Invalid user ubuntu from 154.16.115.170 port 45138
Jan  4 16:33:56 host sshd[747]: input_userauth_request: invalid user ubuntu [preauth]
Jan  4 16:33:56 host sshd[747]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 16:33:56 host sshd[747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.16.115.170
Jan  4 16:33:58 host sshd[747]: Failed password for invalid user ubuntu from 154.16.115.170 port 45138 ssh2
Jan  4 16:34:01 host sshd[747]: Received disconnect from 154.16.115.170 port 45138:11: Bye Bye [preauth]
Jan  4 16:34:01 host sshd[747]: Disconnected from 154.16.115.170 port 45138 [preauth]
Jan  4 16:34:37 host sshd[854]: User root from 152.67.40.146 not allowed because not listed in AllowUsers
Jan  4 16:34:37 host sshd[854]: input_userauth_request: invalid user root [preauth]
Jan  4 16:34:37 host unix_chkpwd[858]: password check failed for user (root)
Jan  4 16:34:37 host sshd[854]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.67.40.146  user=root
Jan  4 16:34:37 host sshd[854]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 16:34:39 host sshd[854]: Failed password for invalid user root from 152.67.40.146 port 56810 ssh2
Jan  4 16:34:39 host sshd[854]: Received disconnect from 152.67.40.146 port 56810:11: Bye Bye [preauth]
Jan  4 16:34:39 host sshd[854]: Disconnected from 152.67.40.146 port 56810 [preauth]
Jan  4 16:36:17 host sshd[1100]: Invalid user usuario2 from 154.16.115.170 port 38926
Jan  4 16:36:17 host sshd[1100]: input_userauth_request: invalid user usuario2 [preauth]
Jan  4 16:36:17 host sshd[1100]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 16:36:17 host sshd[1100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.16.115.170
Jan  4 16:36:19 host sshd[1100]: Failed password for invalid user usuario2 from 154.16.115.170 port 38926 ssh2
Jan  4 16:38:54 host sshd[1517]: User root from 144.22.221.52 not allowed because not listed in AllowUsers
Jan  4 16:38:54 host sshd[1517]: input_userauth_request: invalid user root [preauth]
Jan  4 16:38:54 host unix_chkpwd[1520]: password check failed for user (root)
Jan  4 16:38:54 host sshd[1517]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.22.221.52  user=root
Jan  4 16:38:54 host sshd[1517]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 16:38:56 host sshd[1517]: Failed password for invalid user root from 144.22.221.52 port 49270 ssh2
Jan  4 16:38:57 host sshd[1517]: Received disconnect from 144.22.221.52 port 49270:11: Bye Bye [preauth]
Jan  4 16:38:57 host sshd[1517]: Disconnected from 144.22.221.52 port 49270 [preauth]
Jan  4 16:48:58 host sshd[2994]: User root from 161.49.215.46 not allowed because not listed in AllowUsers
Jan  4 16:48:58 host sshd[2994]: input_userauth_request: invalid user root [preauth]
Jan  4 16:48:58 host unix_chkpwd[2996]: password check failed for user (root)
Jan  4 16:48:58 host sshd[2994]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.49.215.46  user=root
Jan  4 16:48:58 host sshd[2994]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 16:49:00 host sshd[2994]: Failed password for invalid user root from 161.49.215.46 port 51425 ssh2
Jan  4 16:49:01 host sshd[2994]: Received disconnect from 161.49.215.46 port 51425:11: Bye Bye [preauth]
Jan  4 16:49:01 host sshd[2994]: Disconnected from 161.49.215.46 port 51425 [preauth]
Jan  4 16:49:55 host sshd[3111]: User root from 41.60.245.89 not allowed because not listed in AllowUsers
Jan  4 16:49:55 host sshd[3111]: input_userauth_request: invalid user root [preauth]
Jan  4 16:49:55 host unix_chkpwd[3115]: password check failed for user (root)
Jan  4 16:49:55 host sshd[3111]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.60.245.89  user=root
Jan  4 16:49:55 host sshd[3111]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 16:49:57 host sshd[3111]: Failed password for invalid user root from 41.60.245.89 port 59320 ssh2
Jan  4 16:49:57 host sshd[3111]: Received disconnect from 41.60.245.89 port 59320:11: Bye Bye [preauth]
Jan  4 16:49:57 host sshd[3111]: Disconnected from 41.60.245.89 port 59320 [preauth]
Jan  4 16:49:58 host sshd[3118]: Invalid user rakesh from 194.5.152.189 port 56966
Jan  4 16:49:58 host sshd[3118]: input_userauth_request: invalid user rakesh [preauth]
Jan  4 16:49:58 host sshd[3118]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 16:49:58 host sshd[3118]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.5.152.189
Jan  4 16:50:00 host sshd[3118]: Failed password for invalid user rakesh from 194.5.152.189 port 56966 ssh2
Jan  4 16:50:00 host sshd[3118]: Received disconnect from 194.5.152.189 port 56966:11: Bye Bye [preauth]
Jan  4 16:50:00 host sshd[3118]: Disconnected from 194.5.152.189 port 56966 [preauth]
Jan  4 16:50:27 host sshd[3201]: Invalid user testuser from 178.57.195.4 port 57724
Jan  4 16:50:27 host sshd[3201]: input_userauth_request: invalid user testuser [preauth]
Jan  4 16:50:27 host sshd[3201]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 16:50:27 host sshd[3201]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.57.195.4
Jan  4 16:50:27 host sshd[3207]: User root from 92.177.100.149 not allowed because not listed in AllowUsers
Jan  4 16:50:27 host sshd[3207]: input_userauth_request: invalid user root [preauth]
Jan  4 16:50:27 host unix_chkpwd[3211]: password check failed for user (root)
Jan  4 16:50:27 host sshd[3207]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.177.100.149  user=root
Jan  4 16:50:27 host sshd[3207]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 16:50:29 host sshd[3201]: Failed password for invalid user testuser from 178.57.195.4 port 57724 ssh2
Jan  4 16:50:29 host sshd[3201]: Received disconnect from 178.57.195.4 port 57724:11: Bye Bye [preauth]
Jan  4 16:50:29 host sshd[3201]: Disconnected from 178.57.195.4 port 57724 [preauth]
Jan  4 16:50:29 host sshd[3207]: Failed password for invalid user root from 92.177.100.149 port 40718 ssh2
Jan  4 16:50:29 host sshd[3207]: Received disconnect from 92.177.100.149 port 40718:11: Bye Bye [preauth]
Jan  4 16:50:29 host sshd[3207]: Disconnected from 92.177.100.149 port 40718 [preauth]
Jan  4 16:51:36 host sshd[3334]: Invalid user user1 from 192.241.157.126 port 42866
Jan  4 16:51:36 host sshd[3334]: input_userauth_request: invalid user user1 [preauth]
Jan  4 16:51:36 host sshd[3334]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 16:51:36 host sshd[3334]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.157.126
Jan  4 16:51:37 host sshd[3334]: Failed password for invalid user user1 from 192.241.157.126 port 42866 ssh2
Jan  4 16:51:38 host sshd[3334]: Received disconnect from 192.241.157.126 port 42866:11: Bye Bye [preauth]
Jan  4 16:51:38 host sshd[3334]: Disconnected from 192.241.157.126 port 42866 [preauth]
Jan  4 16:52:25 host sshd[3407]: User root from 142.132.230.3 not allowed because not listed in AllowUsers
Jan  4 16:52:25 host sshd[3407]: input_userauth_request: invalid user root [preauth]
Jan  4 16:52:25 host unix_chkpwd[3411]: password check failed for user (root)
Jan  4 16:52:25 host sshd[3407]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.132.230.3  user=root
Jan  4 16:52:25 host sshd[3407]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 16:52:26 host sshd[3407]: Failed password for invalid user root from 142.132.230.3 port 37856 ssh2
Jan  4 16:52:26 host sshd[3407]: Received disconnect from 142.132.230.3 port 37856:11: Bye Bye [preauth]
Jan  4 16:52:26 host sshd[3407]: Disconnected from 142.132.230.3 port 37856 [preauth]
Jan  4 16:53:07 host sshd[3603]: Invalid user ftpuser from 103.111.23.22 port 48992
Jan  4 16:53:07 host sshd[3603]: input_userauth_request: invalid user ftpuser [preauth]
Jan  4 16:53:07 host sshd[3603]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 16:53:07 host sshd[3603]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.111.23.22
Jan  4 16:53:09 host sshd[3603]: Failed password for invalid user ftpuser from 103.111.23.22 port 48992 ssh2
Jan  4 16:53:09 host sshd[3603]: Received disconnect from 103.111.23.22 port 48992:11: Bye Bye [preauth]
Jan  4 16:53:09 host sshd[3603]: Disconnected from 103.111.23.22 port 48992 [preauth]
Jan  4 16:53:57 host sshd[3682]: User root from 192.241.154.229 not allowed because not listed in AllowUsers
Jan  4 16:53:57 host sshd[3682]: input_userauth_request: invalid user root [preauth]
Jan  4 16:53:58 host unix_chkpwd[3686]: password check failed for user (root)
Jan  4 16:53:58 host sshd[3682]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.154.229  user=root
Jan  4 16:53:58 host sshd[3682]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 16:54:00 host sshd[3682]: Failed password for invalid user root from 192.241.154.229 port 47740 ssh2
Jan  4 16:54:00 host sshd[3682]: Received disconnect from 192.241.154.229 port 47740:11: Bye Bye [preauth]
Jan  4 16:54:00 host sshd[3682]: Disconnected from 192.241.154.229 port 47740 [preauth]
Jan  4 16:54:02 host sshd[3689]: Invalid user rakesh from 46.101.85.176 port 58324
Jan  4 16:54:02 host sshd[3689]: input_userauth_request: invalid user rakesh [preauth]
Jan  4 16:54:02 host sshd[3689]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 16:54:02 host sshd[3689]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.85.176
Jan  4 16:54:04 host sshd[3689]: Failed password for invalid user rakesh from 46.101.85.176 port 58324 ssh2
Jan  4 16:54:04 host sshd[3689]: Received disconnect from 46.101.85.176 port 58324:11: Bye Bye [preauth]
Jan  4 16:54:04 host sshd[3689]: Disconnected from 46.101.85.176 port 58324 [preauth]
Jan  4 16:54:31 host sshd[3753]: Invalid user oracle from 92.177.100.149 port 57016
Jan  4 16:54:31 host sshd[3753]: input_userauth_request: invalid user oracle [preauth]
Jan  4 16:54:31 host sshd[3753]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 16:54:31 host sshd[3753]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.177.100.149
Jan  4 16:54:33 host sshd[3753]: Failed password for invalid user oracle from 92.177.100.149 port 57016 ssh2
Jan  4 16:54:34 host sshd[3753]: Received disconnect from 92.177.100.149 port 57016:11: Bye Bye [preauth]
Jan  4 16:54:34 host sshd[3753]: Disconnected from 92.177.100.149 port 57016 [preauth]
Jan  4 16:54:53 host sshd[3829]: User root from 164.92.112.145 not allowed because not listed in AllowUsers
Jan  4 16:54:53 host sshd[3829]: input_userauth_request: invalid user root [preauth]
Jan  4 16:54:53 host unix_chkpwd[3833]: password check failed for user (root)
Jan  4 16:54:53 host sshd[3829]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.112.145  user=root
Jan  4 16:54:53 host sshd[3829]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 16:54:55 host sshd[3829]: Failed password for invalid user root from 164.92.112.145 port 43362 ssh2
Jan  4 16:54:55 host sshd[3829]: Received disconnect from 164.92.112.145 port 43362:11: Bye Bye [preauth]
Jan  4 16:54:55 host sshd[3829]: Disconnected from 164.92.112.145 port 43362 [preauth]
Jan  4 16:55:10 host sshd[3870]: User root from 142.132.230.3 not allowed because not listed in AllowUsers
Jan  4 16:55:10 host sshd[3870]: input_userauth_request: invalid user root [preauth]
Jan  4 16:55:10 host unix_chkpwd[3873]: password check failed for user (root)
Jan  4 16:55:10 host sshd[3870]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.132.230.3  user=root
Jan  4 16:55:10 host sshd[3870]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 16:55:12 host sshd[3870]: Failed password for invalid user root from 142.132.230.3 port 57422 ssh2
Jan  4 16:55:22 host sshd[3915]: Invalid user ubuntu from 178.57.195.4 port 51686
Jan  4 16:55:22 host sshd[3915]: input_userauth_request: invalid user ubuntu [preauth]
Jan  4 16:55:22 host sshd[3915]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 16:55:22 host sshd[3915]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.57.195.4
Jan  4 16:55:24 host sshd[3915]: Failed password for invalid user ubuntu from 178.57.195.4 port 51686 ssh2
Jan  4 16:55:25 host sshd[3915]: Received disconnect from 178.57.195.4 port 51686:11: Bye Bye [preauth]
Jan  4 16:55:25 host sshd[3915]: Disconnected from 178.57.195.4 port 51686 [preauth]
Jan  4 16:55:26 host sshd[3923]: Invalid user amit from 41.60.245.89 port 57378
Jan  4 16:55:26 host sshd[3923]: input_userauth_request: invalid user amit [preauth]
Jan  4 16:55:26 host sshd[3923]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 16:55:26 host sshd[3923]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.60.245.89
Jan  4 16:55:28 host sshd[3923]: Failed password for invalid user amit from 41.60.245.89 port 57378 ssh2
Jan  4 16:55:28 host sshd[3923]: Received disconnect from 41.60.245.89 port 57378:11: Bye Bye [preauth]
Jan  4 16:55:28 host sshd[3923]: Disconnected from 41.60.245.89 port 57378 [preauth]
Jan  4 16:55:33 host sshd[3983]: Invalid user ubuntu from 122.3.79.91 port 5217
Jan  4 16:55:33 host sshd[3983]: input_userauth_request: invalid user ubuntu [preauth]
Jan  4 16:55:33 host sshd[3983]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 16:55:33 host sshd[3983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.3.79.91
Jan  4 16:55:34 host sshd[3987]: Invalid user oracle from 194.5.152.189 port 33898
Jan  4 16:55:34 host sshd[3987]: input_userauth_request: invalid user oracle [preauth]
Jan  4 16:55:34 host sshd[3987]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 16:55:34 host sshd[3987]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.5.152.189
Jan  4 16:55:36 host sshd[3983]: Failed password for invalid user ubuntu from 122.3.79.91 port 5217 ssh2
Jan  4 16:55:36 host sshd[3983]: Received disconnect from 122.3.79.91 port 5217:11: Bye Bye [preauth]
Jan  4 16:55:36 host sshd[3983]: Disconnected from 122.3.79.91 port 5217 [preauth]
Jan  4 16:55:37 host sshd[3987]: Failed password for invalid user oracle from 194.5.152.189 port 33898 ssh2
Jan  4 16:55:37 host sshd[3987]: Received disconnect from 194.5.152.189 port 33898:11: Bye Bye [preauth]
Jan  4 16:55:37 host sshd[3987]: Disconnected from 194.5.152.189 port 33898 [preauth]
Jan  4 16:55:42 host sshd[3997]: User root from 192.241.157.126 not allowed because not listed in AllowUsers
Jan  4 16:55:42 host sshd[3997]: input_userauth_request: invalid user root [preauth]
Jan  4 16:55:42 host unix_chkpwd[4006]: password check failed for user (root)
Jan  4 16:55:42 host sshd[3997]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.157.126  user=root
Jan  4 16:55:42 host sshd[3997]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 16:55:43 host sshd[3997]: Failed password for invalid user root from 192.241.157.126 port 57726 ssh2
Jan  4 16:55:44 host sshd[3997]: Received disconnect from 192.241.157.126 port 57726:11: Bye Bye [preauth]
Jan  4 16:55:44 host sshd[3997]: Disconnected from 192.241.157.126 port 57726 [preauth]
Jan  4 16:55:51 host sshd[4052]: Invalid user galaxy from 46.101.85.176 port 60276
Jan  4 16:55:51 host sshd[4052]: input_userauth_request: invalid user galaxy [preauth]
Jan  4 16:55:51 host sshd[4052]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 16:55:51 host sshd[4052]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.85.176
Jan  4 16:55:53 host sshd[4052]: Failed password for invalid user galaxy from 46.101.85.176 port 60276 ssh2
Jan  4 16:55:54 host sshd[4052]: Received disconnect from 46.101.85.176 port 60276:11: Bye Bye [preauth]
Jan  4 16:55:54 host sshd[4052]: Disconnected from 46.101.85.176 port 60276 [preauth]
Jan  4 16:55:59 host sshd[4060]: Invalid user rakesh from 192.241.154.229 port 39672
Jan  4 16:55:59 host sshd[4060]: input_userauth_request: invalid user rakesh [preauth]
Jan  4 16:55:59 host sshd[4060]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 16:55:59 host sshd[4060]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.154.229
Jan  4 16:56:02 host sshd[4060]: Failed password for invalid user rakesh from 192.241.154.229 port 39672 ssh2
Jan  4 16:56:02 host sshd[4060]: Received disconnect from 192.241.154.229 port 39672:11: Bye Bye [preauth]
Jan  4 16:56:02 host sshd[4060]: Disconnected from 192.241.154.229 port 39672 [preauth]
Jan  4 16:56:33 host sshd[4153]: Invalid user amit from 164.92.112.145 port 58726
Jan  4 16:56:33 host sshd[4153]: input_userauth_request: invalid user amit [preauth]
Jan  4 16:56:33 host sshd[4153]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 16:56:33 host sshd[4153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.112.145
Jan  4 16:56:35 host sshd[4153]: Failed password for invalid user amit from 164.92.112.145 port 58726 ssh2
Jan  4 16:56:35 host sshd[4153]: Received disconnect from 164.92.112.145 port 58726:11: Bye Bye [preauth]
Jan  4 16:56:35 host sshd[4153]: Disconnected from 164.92.112.145 port 58726 [preauth]
Jan  4 16:56:44 host sshd[4202]: User root from 178.57.195.4 not allowed because not listed in AllowUsers
Jan  4 16:56:44 host sshd[4202]: input_userauth_request: invalid user root [preauth]
Jan  4 16:56:44 host unix_chkpwd[4207]: password check failed for user (root)
Jan  4 16:56:44 host sshd[4202]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.57.195.4  user=root
Jan  4 16:56:44 host sshd[4202]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 16:56:45 host sshd[4205]: Invalid user user1 from 194.5.152.189 port 51768
Jan  4 16:56:45 host sshd[4205]: input_userauth_request: invalid user user1 [preauth]
Jan  4 16:56:45 host sshd[4205]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 16:56:45 host sshd[4205]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.5.152.189
Jan  4 16:56:46 host sshd[4202]: Failed password for invalid user root from 178.57.195.4 port 49780 ssh2
Jan  4 16:56:46 host sshd[4202]: Received disconnect from 178.57.195.4 port 49780:11: Bye Bye [preauth]
Jan  4 16:56:46 host sshd[4202]: Disconnected from 178.57.195.4 port 49780 [preauth]
Jan  4 16:56:47 host sshd[4205]: Failed password for invalid user user1 from 194.5.152.189 port 51768 ssh2
Jan  4 16:56:57 host sshd[4285]: Invalid user oracle from 46.101.85.176 port 57676
Jan  4 16:56:57 host sshd[4285]: input_userauth_request: invalid user oracle [preauth]
Jan  4 16:56:57 host sshd[4285]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 16:56:57 host sshd[4285]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.85.176
Jan  4 16:56:58 host sshd[4298]: Invalid user downloader from 122.3.79.91 port 65313
Jan  4 16:56:58 host sshd[4298]: input_userauth_request: invalid user downloader [preauth]
Jan  4 16:56:58 host sshd[4298]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 16:56:58 host sshd[4298]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.3.79.91
Jan  4 16:56:59 host sshd[4285]: Failed password for invalid user oracle from 46.101.85.176 port 57676 ssh2
Jan  4 16:56:59 host sshd[4298]: Failed password for invalid user downloader from 122.3.79.91 port 65313 ssh2
Jan  4 16:57:00 host sshd[4285]: Received disconnect from 46.101.85.176 port 57676:11: Bye Bye [preauth]
Jan  4 16:57:00 host sshd[4285]: Disconnected from 46.101.85.176 port 57676 [preauth]
Jan  4 16:57:00 host sshd[4298]: Received disconnect from 122.3.79.91 port 65313:11: Bye Bye [preauth]
Jan  4 16:57:00 host sshd[4298]: Disconnected from 122.3.79.91 port 65313 [preauth]
Jan  4 16:57:18 host sshd[4360]: Invalid user tom from 103.111.23.22 port 60158
Jan  4 16:57:18 host sshd[4360]: input_userauth_request: invalid user tom [preauth]
Jan  4 16:57:18 host sshd[4360]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 16:57:18 host sshd[4360]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.111.23.22
Jan  4 16:57:20 host sshd[4360]: Failed password for invalid user tom from 103.111.23.22 port 60158 ssh2
Jan  4 16:57:20 host sshd[4360]: Received disconnect from 103.111.23.22 port 60158:11: Bye Bye [preauth]
Jan  4 16:57:20 host sshd[4360]: Disconnected from 103.111.23.22 port 60158 [preauth]
Jan  4 16:58:19 host sshd[4591]: User ftp from 122.3.79.91 not allowed because not listed in AllowUsers
Jan  4 16:58:19 host sshd[4591]: input_userauth_request: invalid user ftp [preauth]
Jan  4 16:58:19 host unix_chkpwd[4598]: password check failed for user (ftp)
Jan  4 16:58:19 host sshd[4591]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.3.79.91  user=ftp
Jan  4 16:58:19 host sshd[4591]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp"
Jan  4 16:58:21 host sshd[4591]: Failed password for invalid user ftp from 122.3.79.91 port 65089 ssh2
Jan  4 16:58:21 host sshd[4591]: Received disconnect from 122.3.79.91 port 65089:11: Bye Bye [preauth]
Jan  4 16:58:21 host sshd[4591]: Disconnected from 122.3.79.91 port 65089 [preauth]
Jan  4 16:58:53 host sshd[4690]: Invalid user elasticsearch from 103.111.23.22 port 48210
Jan  4 16:58:53 host sshd[4690]: input_userauth_request: invalid user elasticsearch [preauth]
Jan  4 16:58:53 host sshd[4690]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 16:58:53 host sshd[4690]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.111.23.22
Jan  4 16:58:55 host sshd[4690]: Failed password for invalid user elasticsearch from 103.111.23.22 port 48210 ssh2
Jan  4 16:58:55 host sshd[4690]: Received disconnect from 103.111.23.22 port 48210:11: Bye Bye [preauth]
Jan  4 16:58:55 host sshd[4690]: Disconnected from 103.111.23.22 port 48210 [preauth]
Jan  4 16:59:39 host sshd[4847]: Invalid user user1 from 161.49.215.46 port 5505
Jan  4 16:59:39 host sshd[4847]: input_userauth_request: invalid user user1 [preauth]
Jan  4 16:59:39 host sshd[4847]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 16:59:39 host sshd[4847]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.49.215.46
Jan  4 16:59:41 host sshd[4853]: Invalid user lj from 103.13.40.2 port 53284
Jan  4 16:59:41 host sshd[4853]: input_userauth_request: invalid user lj [preauth]
Jan  4 16:59:41 host sshd[4853]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 16:59:41 host sshd[4853]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2
Jan  4 16:59:42 host sshd[4847]: Failed password for invalid user user1 from 161.49.215.46 port 5505 ssh2
Jan  4 16:59:42 host sshd[4847]: Received disconnect from 161.49.215.46 port 5505:11: Bye Bye [preauth]
Jan  4 16:59:42 host sshd[4847]: Disconnected from 161.49.215.46 port 5505 [preauth]
Jan  4 16:59:43 host sshd[4853]: Failed password for invalid user lj from 103.13.40.2 port 53284 ssh2
Jan  4 16:59:43 host sshd[4853]: Connection closed by 103.13.40.2 port 53284 [preauth]
Jan  4 17:05:18 host sshd[5675]: Invalid user cacti from 104.131.178.211 port 47252
Jan  4 17:05:18 host sshd[5675]: input_userauth_request: invalid user cacti [preauth]
Jan  4 17:05:18 host sshd[5675]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 17:05:18 host sshd[5675]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.178.211
Jan  4 17:05:19 host sshd[5675]: Failed password for invalid user cacti from 104.131.178.211 port 47252 ssh2
Jan  4 17:05:20 host sshd[5675]: Received disconnect from 104.131.178.211 port 47252:11: Bye Bye [preauth]
Jan  4 17:05:20 host sshd[5675]: Disconnected from 104.131.178.211 port 47252 [preauth]
Jan  4 17:05:29 host sshd[5710]: User root from 211.193.31.52 not allowed because not listed in AllowUsers
Jan  4 17:05:29 host sshd[5710]: input_userauth_request: invalid user root [preauth]
Jan  4 17:05:29 host unix_chkpwd[5713]: password check failed for user (root)
Jan  4 17:05:29 host sshd[5710]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.193.31.52  user=root
Jan  4 17:05:29 host sshd[5710]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 17:05:30 host sshd[5710]: Failed password for invalid user root from 211.193.31.52 port 48268 ssh2
Jan  4 17:05:30 host sshd[5710]: Received disconnect from 211.193.31.52 port 48268:11: Bye Bye [preauth]
Jan  4 17:05:30 host sshd[5710]: Disconnected from 211.193.31.52 port 48268 [preauth]
Jan  4 17:06:06 host sshd[5790]: User root from 188.254.0.110 not allowed because not listed in AllowUsers
Jan  4 17:06:06 host sshd[5790]: input_userauth_request: invalid user root [preauth]
Jan  4 17:06:06 host unix_chkpwd[5793]: password check failed for user (root)
Jan  4 17:06:06 host sshd[5790]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.254.0.110  user=root
Jan  4 17:06:06 host sshd[5790]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 17:06:08 host sshd[5790]: Failed password for invalid user root from 188.254.0.110 port 41060 ssh2
Jan  4 17:06:08 host sshd[5790]: Received disconnect from 188.254.0.110 port 41060:11: Bye Bye [preauth]
Jan  4 17:06:08 host sshd[5790]: Disconnected from 188.254.0.110 port 41060 [preauth]
Jan  4 17:06:48 host sshd[5902]: Invalid user mailuser from 20.101.108.165 port 59436
Jan  4 17:06:48 host sshd[5902]: input_userauth_request: invalid user mailuser [preauth]
Jan  4 17:06:48 host sshd[5902]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 17:06:48 host sshd[5902]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.101.108.165
Jan  4 17:06:50 host sshd[5902]: Failed password for invalid user mailuser from 20.101.108.165 port 59436 ssh2
Jan  4 17:06:50 host sshd[5902]: Received disconnect from 20.101.108.165 port 59436:11: Bye Bye [preauth]
Jan  4 17:06:50 host sshd[5902]: Disconnected from 20.101.108.165 port 59436 [preauth]
Jan  4 17:07:07 host sshd[5962]: Invalid user zhanglei from 157.245.201.162 port 60284
Jan  4 17:07:07 host sshd[5962]: input_userauth_request: invalid user zhanglei [preauth]
Jan  4 17:07:07 host sshd[5962]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 17:07:07 host sshd[5962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.201.162
Jan  4 17:07:07 host sshd[5960]: Invalid user andrea from 192.99.70.166 port 57052
Jan  4 17:07:07 host sshd[5960]: input_userauth_request: invalid user andrea [preauth]
Jan  4 17:07:07 host sshd[5960]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 17:07:07 host sshd[5960]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.70.166
Jan  4 17:07:09 host sshd[5962]: Failed password for invalid user zhanglei from 157.245.201.162 port 60284 ssh2
Jan  4 17:07:10 host sshd[5962]: Received disconnect from 157.245.201.162 port 60284:11: Bye Bye [preauth]
Jan  4 17:07:10 host sshd[5962]: Disconnected from 157.245.201.162 port 60284 [preauth]
Jan  4 17:07:10 host sshd[5960]: Failed password for invalid user andrea from 192.99.70.166 port 57052 ssh2
Jan  4 17:07:10 host sshd[5960]: Received disconnect from 192.99.70.166 port 57052:11: Bye Bye [preauth]
Jan  4 17:07:10 host sshd[5960]: Disconnected from 192.99.70.166 port 57052 [preauth]
Jan  4 17:08:13 host sshd[6221]: Invalid user idempiere from 88.103.121.209 port 49908
Jan  4 17:08:13 host sshd[6221]: input_userauth_request: invalid user idempiere [preauth]
Jan  4 17:08:13 host sshd[6221]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 17:08:13 host sshd[6221]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.103.121.209
Jan  4 17:08:16 host sshd[6221]: Failed password for invalid user idempiere from 88.103.121.209 port 49908 ssh2
Jan  4 17:08:16 host sshd[6221]: Received disconnect from 88.103.121.209 port 49908:11: Bye Bye [preauth]
Jan  4 17:08:16 host sshd[6221]: Disconnected from 88.103.121.209 port 49908 [preauth]
Jan  4 17:10:07 host sshd[6456]: Invalid user lourdes from 165.232.92.56 port 46056
Jan  4 17:10:07 host sshd[6456]: input_userauth_request: invalid user lourdes [preauth]
Jan  4 17:10:07 host sshd[6456]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 17:10:07 host sshd[6456]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.92.56
Jan  4 17:10:09 host sshd[6456]: Failed password for invalid user lourdes from 165.232.92.56 port 46056 ssh2
Jan  4 17:10:09 host sshd[6456]: Received disconnect from 165.232.92.56 port 46056:11: Bye Bye [preauth]
Jan  4 17:10:09 host sshd[6456]: Disconnected from 165.232.92.56 port 46056 [preauth]
Jan  4 17:10:47 host sshd[6562]: User root from 20.101.108.165 not allowed because not listed in AllowUsers
Jan  4 17:10:47 host sshd[6562]: input_userauth_request: invalid user root [preauth]
Jan  4 17:10:47 host unix_chkpwd[6570]: password check failed for user (root)
Jan  4 17:10:47 host sshd[6562]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.101.108.165  user=root
Jan  4 17:10:47 host sshd[6562]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 17:10:49 host sshd[6562]: Failed password for invalid user root from 20.101.108.165 port 49434 ssh2
Jan  4 17:10:49 host sshd[6562]: Received disconnect from 20.101.108.165 port 49434:11: Bye Bye [preauth]
Jan  4 17:10:49 host sshd[6562]: Disconnected from 20.101.108.165 port 49434 [preauth]
Jan  4 17:11:01 host sshd[6616]: Invalid user bpoint from 195.74.72.76 port 51066
Jan  4 17:11:01 host sshd[6616]: input_userauth_request: invalid user bpoint [preauth]
Jan  4 17:11:01 host sshd[6616]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 17:11:01 host sshd[6616]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.74.72.76
Jan  4 17:11:03 host sshd[6616]: Failed password for invalid user bpoint from 195.74.72.76 port 51066 ssh2
Jan  4 17:11:03 host sshd[6616]: Received disconnect from 195.74.72.76 port 51066:11: Bye Bye [preauth]
Jan  4 17:11:03 host sshd[6616]: Disconnected from 195.74.72.76 port 51066 [preauth]
Jan  4 17:11:04 host sshd[6636]: Invalid user julius from 88.103.121.209 port 32852
Jan  4 17:11:04 host sshd[6636]: input_userauth_request: invalid user julius [preauth]
Jan  4 17:11:04 host sshd[6636]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 17:11:04 host sshd[6636]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.103.121.209
Jan  4 17:11:04 host sshd[6634]: User root from 187.49.223.80 not allowed because not listed in AllowUsers
Jan  4 17:11:04 host sshd[6634]: input_userauth_request: invalid user root [preauth]
Jan  4 17:11:04 host unix_chkpwd[6640]: password check failed for user (root)
Jan  4 17:11:04 host sshd[6634]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.49.223.80  user=root
Jan  4 17:11:04 host sshd[6634]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 17:11:05 host sshd[6636]: Failed password for invalid user julius from 88.103.121.209 port 32852 ssh2
Jan  4 17:11:05 host sshd[6636]: Received disconnect from 88.103.121.209 port 32852:11: Bye Bye [preauth]
Jan  4 17:11:05 host sshd[6636]: Disconnected from 88.103.121.209 port 32852 [preauth]
Jan  4 17:11:06 host sshd[6634]: Failed password for invalid user root from 187.49.223.80 port 55853 ssh2
Jan  4 17:11:06 host sshd[6634]: Received disconnect from 187.49.223.80 port 55853:11: Bye Bye [preauth]
Jan  4 17:11:06 host sshd[6634]: Disconnected from 187.49.223.80 port 55853 [preauth]
Jan  4 17:11:08 host sshd[6643]: User root from 139.59.46.89 not allowed because not listed in AllowUsers
Jan  4 17:11:08 host sshd[6643]: input_userauth_request: invalid user root [preauth]
Jan  4 17:11:08 host unix_chkpwd[6645]: password check failed for user (root)
Jan  4 17:11:08 host sshd[6643]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.46.89  user=root
Jan  4 17:11:08 host sshd[6643]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 17:11:09 host sshd[6643]: Failed password for invalid user root from 139.59.46.89 port 38122 ssh2
Jan  4 17:11:09 host sshd[6643]: Received disconnect from 139.59.46.89 port 38122:11: Bye Bye [preauth]
Jan  4 17:11:09 host sshd[6643]: Disconnected from 139.59.46.89 port 38122 [preauth]
Jan  4 17:11:17 host sshd[6653]: User root from 194.233.103.111 not allowed because not listed in AllowUsers
Jan  4 17:11:17 host sshd[6653]: input_userauth_request: invalid user root [preauth]
Jan  4 17:11:17 host unix_chkpwd[6659]: password check failed for user (root)
Jan  4 17:11:17 host sshd[6653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.233.103.111  user=root
Jan  4 17:11:17 host sshd[6653]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 17:11:19 host sshd[6653]: Failed password for invalid user root from 194.233.103.111 port 58032 ssh2
Jan  4 17:11:19 host sshd[6653]: Received disconnect from 194.233.103.111 port 58032:11: Bye Bye [preauth]
Jan  4 17:11:19 host sshd[6653]: Disconnected from 194.233.103.111 port 58032 [preauth]
Jan  4 17:11:31 host sshd[6694]: User root from 165.232.92.56 not allowed because not listed in AllowUsers
Jan  4 17:11:31 host sshd[6694]: input_userauth_request: invalid user root [preauth]
Jan  4 17:11:31 host unix_chkpwd[6697]: password check failed for user (root)
Jan  4 17:11:31 host sshd[6694]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.92.56  user=root
Jan  4 17:11:31 host sshd[6694]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 17:11:32 host sshd[6698]: Invalid user leandro from 211.193.31.52 port 46884
Jan  4 17:11:32 host sshd[6698]: input_userauth_request: invalid user leandro [preauth]
Jan  4 17:11:32 host sshd[6698]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 17:11:32 host sshd[6698]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.193.31.52
Jan  4 17:11:33 host sshd[6694]: Failed password for invalid user root from 165.232.92.56 port 59048 ssh2
Jan  4 17:11:33 host sshd[6694]: Received disconnect from 165.232.92.56 port 59048:11: Bye Bye [preauth]
Jan  4 17:11:33 host sshd[6694]: Disconnected from 165.232.92.56 port 59048 [preauth]
Jan  4 17:11:34 host sshd[6698]: Failed password for invalid user leandro from 211.193.31.52 port 46884 ssh2
Jan  4 17:11:34 host sshd[6698]: Received disconnect from 211.193.31.52 port 46884:11: Bye Bye [preauth]
Jan  4 17:11:34 host sshd[6698]: Disconnected from 211.193.31.52 port 46884 [preauth]
Jan  4 17:11:35 host sshd[6704]: Invalid user ubuntu from 104.131.178.211 port 52924
Jan  4 17:11:35 host sshd[6704]: input_userauth_request: invalid user ubuntu [preauth]
Jan  4 17:11:35 host sshd[6704]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 17:11:35 host sshd[6704]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.178.211
Jan  4 17:11:37 host sshd[6704]: Failed password for invalid user ubuntu from 104.131.178.211 port 52924 ssh2
Jan  4 17:11:37 host sshd[6704]: Received disconnect from 104.131.178.211 port 52924:11: Bye Bye [preauth]
Jan  4 17:11:37 host sshd[6704]: Disconnected from 104.131.178.211 port 52924 [preauth]
Jan  4 17:11:47 host sshd[6786]: Invalid user mailuser from 192.99.70.166 port 48204
Jan  4 17:11:47 host sshd[6786]: input_userauth_request: invalid user mailuser [preauth]
Jan  4 17:11:47 host sshd[6786]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 17:11:47 host sshd[6786]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.70.166
Jan  4 17:11:48 host sshd[6794]: User root from 188.254.0.110 not allowed because not listed in AllowUsers
Jan  4 17:11:48 host sshd[6794]: input_userauth_request: invalid user root [preauth]
Jan  4 17:11:48 host unix_chkpwd[6797]: password check failed for user (root)
Jan  4 17:11:48 host sshd[6794]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.254.0.110  user=root
Jan  4 17:11:48 host sshd[6794]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 17:11:49 host sshd[6786]: Failed password for invalid user mailuser from 192.99.70.166 port 48204 ssh2
Jan  4 17:11:49 host sshd[6786]: Received disconnect from 192.99.70.166 port 48204:11: Bye Bye [preauth]
Jan  4 17:11:49 host sshd[6786]: Disconnected from 192.99.70.166 port 48204 [preauth]
Jan  4 17:11:51 host sshd[6794]: Failed password for invalid user root from 188.254.0.110 port 36208 ssh2
Jan  4 17:11:51 host sshd[6794]: Received disconnect from 188.254.0.110 port 36208:11: Bye Bye [preauth]
Jan  4 17:11:51 host sshd[6794]: Disconnected from 188.254.0.110 port 36208 [preauth]
Jan  4 17:11:58 host sshd[6836]: User root from 157.245.201.162 not allowed because not listed in AllowUsers
Jan  4 17:11:58 host sshd[6836]: input_userauth_request: invalid user root [preauth]
Jan  4 17:11:58 host unix_chkpwd[6839]: password check failed for user (root)
Jan  4 17:11:58 host sshd[6836]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.201.162  user=root
Jan  4 17:11:58 host sshd[6836]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 17:12:00 host sshd[6836]: Failed password for invalid user root from 157.245.201.162 port 60484 ssh2
Jan  4 17:12:00 host sshd[6836]: Received disconnect from 157.245.201.162 port 60484:11: Bye Bye [preauth]
Jan  4 17:12:00 host sshd[6836]: Disconnected from 157.245.201.162 port 60484 [preauth]
Jan  4 17:12:23 host sshd[6913]: Invalid user eversec from 88.103.121.209 port 32872
Jan  4 17:12:23 host sshd[6913]: input_userauth_request: invalid user eversec [preauth]
Jan  4 17:12:23 host sshd[6913]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 17:12:23 host sshd[6913]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.103.121.209
Jan  4 17:12:25 host sshd[6913]: Failed password for invalid user eversec from 88.103.121.209 port 32872 ssh2
Jan  4 17:12:25 host sshd[6913]: Received disconnect from 88.103.121.209 port 32872:11: Bye Bye [preauth]
Jan  4 17:12:25 host sshd[6913]: Disconnected from 88.103.121.209 port 32872 [preauth]
Jan  4 17:12:41 host sshd[6988]: User root from 104.131.178.211 not allowed because not listed in AllowUsers
Jan  4 17:12:41 host sshd[6988]: input_userauth_request: invalid user root [preauth]
Jan  4 17:12:41 host unix_chkpwd[6991]: password check failed for user (root)
Jan  4 17:12:41 host sshd[6988]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.178.211  user=root
Jan  4 17:12:41 host sshd[6988]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 17:12:42 host sshd[6988]: Failed password for invalid user root from 104.131.178.211 port 38102 ssh2
Jan  4 17:12:51 host sshd[7037]: User root from 192.99.70.166 not allowed because not listed in AllowUsers
Jan  4 17:12:51 host sshd[7037]: input_userauth_request: invalid user root [preauth]
Jan  4 17:12:51 host unix_chkpwd[7040]: password check failed for user (root)
Jan  4 17:12:51 host sshd[7037]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.70.166  user=root
Jan  4 17:12:51 host sshd[7037]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 17:12:54 host sshd[7037]: Failed password for invalid user root from 192.99.70.166 port 56286 ssh2
Jan  4 17:13:04 host sshd[7100]: Invalid user console from 195.74.72.76 port 48972
Jan  4 17:13:04 host sshd[7100]: input_userauth_request: invalid user console [preauth]
Jan  4 17:13:04 host sshd[7100]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 17:13:04 host sshd[7100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.74.72.76
Jan  4 17:13:06 host sshd[7100]: Failed password for invalid user console from 195.74.72.76 port 48972 ssh2
Jan  4 17:13:06 host sshd[7100]: Received disconnect from 195.74.72.76 port 48972:11: Bye Bye [preauth]
Jan  4 17:13:06 host sshd[7100]: Disconnected from 195.74.72.76 port 48972 [preauth]
Jan  4 17:13:48 host sshd[7287]: User root from 187.95.144.110 not allowed because not listed in AllowUsers
Jan  4 17:13:48 host sshd[7287]: input_userauth_request: invalid user root [preauth]
Jan  4 17:13:48 host unix_chkpwd[7295]: password check failed for user (root)
Jan  4 17:13:48 host sshd[7287]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.95.144.110  user=root
Jan  4 17:13:48 host sshd[7287]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 17:13:50 host sshd[7287]: Failed password for invalid user root from 187.95.144.110 port 42476 ssh2
Jan  4 17:13:50 host sshd[7287]: Received disconnect from 187.95.144.110 port 42476:11: Bye Bye [preauth]
Jan  4 17:13:50 host sshd[7287]: Disconnected from 187.95.144.110 port 42476 [preauth]
Jan  4 17:14:02 host sshd[7313]: Invalid user service from 194.169.175.102 port 59683
Jan  4 17:14:02 host sshd[7313]: input_userauth_request: invalid user service [preauth]
Jan  4 17:14:02 host sshd[7313]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 17:14:02 host sshd[7313]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.169.175.102
Jan  4 17:14:05 host sshd[7313]: Failed password for invalid user service from 194.169.175.102 port 59683 ssh2
Jan  4 17:14:05 host sshd[7313]: Received disconnect from 194.169.175.102 port 59683:11: Client disconnecting normally [preauth]
Jan  4 17:14:05 host sshd[7313]: Disconnected from 194.169.175.102 port 59683 [preauth]
Jan  4 17:14:57 host sshd[7420]: Invalid user test from 195.74.72.76 port 43426
Jan  4 17:14:57 host sshd[7420]: input_userauth_request: invalid user test [preauth]
Jan  4 17:14:57 host sshd[7420]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 17:14:57 host sshd[7420]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.74.72.76
Jan  4 17:14:58 host sshd[7420]: Failed password for invalid user test from 195.74.72.76 port 43426 ssh2
Jan  4 17:14:59 host sshd[7420]: Received disconnect from 195.74.72.76 port 43426:11: Bye Bye [preauth]
Jan  4 17:14:59 host sshd[7420]: Disconnected from 195.74.72.76 port 43426 [preauth]
Jan  4 17:16:35 host sshd[7682]: Invalid user guillermo from 210.91.154.187 port 37384
Jan  4 17:16:35 host sshd[7682]: input_userauth_request: invalid user guillermo [preauth]
Jan  4 17:16:35 host sshd[7682]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 17:16:35 host sshd[7682]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.91.154.187
Jan  4 17:16:37 host sshd[7682]: Failed password for invalid user guillermo from 210.91.154.187 port 37384 ssh2
Jan  4 17:16:37 host sshd[7682]: Received disconnect from 210.91.154.187 port 37384:11: Bye Bye [preauth]
Jan  4 17:16:37 host sshd[7682]: Disconnected from 210.91.154.187 port 37384 [preauth]
Jan  4 17:16:48 host sshd[7703]: User root from 139.59.46.89 not allowed because not listed in AllowUsers
Jan  4 17:16:48 host sshd[7703]: input_userauth_request: invalid user root [preauth]
Jan  4 17:16:48 host unix_chkpwd[7705]: password check failed for user (root)
Jan  4 17:16:48 host sshd[7703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.46.89  user=root
Jan  4 17:16:48 host sshd[7703]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 17:16:50 host sshd[7703]: Failed password for invalid user root from 139.59.46.89 port 38672 ssh2
Jan  4 17:16:50 host sshd[7703]: Received disconnect from 139.59.46.89 port 38672:11: Bye Bye [preauth]
Jan  4 17:16:50 host sshd[7703]: Disconnected from 139.59.46.89 port 38672 [preauth]
Jan  4 17:17:27 host sshd[7820]: Invalid user webserver from 194.233.103.111 port 34272
Jan  4 17:17:27 host sshd[7820]: input_userauth_request: invalid user webserver [preauth]
Jan  4 17:17:27 host sshd[7820]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 17:17:27 host sshd[7820]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.233.103.111
Jan  4 17:17:29 host sshd[7820]: Failed password for invalid user webserver from 194.233.103.111 port 34272 ssh2
Jan  4 17:17:29 host sshd[7820]: Received disconnect from 194.233.103.111 port 34272:11: Bye Bye [preauth]
Jan  4 17:17:29 host sshd[7820]: Disconnected from 194.233.103.111 port 34272 [preauth]
Jan  4 17:18:03 host sshd[7926]: Invalid user user1 from 187.49.223.80 port 57243
Jan  4 17:18:03 host sshd[7926]: input_userauth_request: invalid user user1 [preauth]
Jan  4 17:18:03 host sshd[7926]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 17:18:03 host sshd[7926]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.49.223.80
Jan  4 17:18:05 host sshd[7926]: Failed password for invalid user user1 from 187.49.223.80 port 57243 ssh2
Jan  4 17:18:05 host sshd[7926]: Received disconnect from 187.49.223.80 port 57243:11: Bye Bye [preauth]
Jan  4 17:18:05 host sshd[7926]: Disconnected from 187.49.223.80 port 57243 [preauth]
Jan  4 17:18:20 host sshd[8076]: User root from 187.95.144.110 not allowed because not listed in AllowUsers
Jan  4 17:18:20 host sshd[8076]: input_userauth_request: invalid user root [preauth]
Jan  4 17:18:20 host unix_chkpwd[8079]: password check failed for user (root)
Jan  4 17:18:20 host sshd[8076]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.95.144.110  user=root
Jan  4 17:18:20 host sshd[8076]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 17:18:22 host sshd[8076]: Failed password for invalid user root from 187.95.144.110 port 49612 ssh2
Jan  4 17:18:22 host sshd[8076]: Received disconnect from 187.95.144.110 port 49612:11: Bye Bye [preauth]
Jan  4 17:18:22 host sshd[8076]: Disconnected from 187.95.144.110 port 49612 [preauth]
Jan  4 17:18:33 host sshd[8141]: User root from 210.91.154.187 not allowed because not listed in AllowUsers
Jan  4 17:18:33 host sshd[8141]: input_userauth_request: invalid user root [preauth]
Jan  4 17:18:33 host unix_chkpwd[8144]: password check failed for user (root)
Jan  4 17:18:33 host sshd[8141]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.91.154.187  user=root
Jan  4 17:18:33 host sshd[8141]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 17:18:36 host sshd[8141]: Failed password for invalid user root from 210.91.154.187 port 37048 ssh2
Jan  4 17:18:36 host sshd[8141]: Received disconnect from 210.91.154.187 port 37048:11: Bye Bye [preauth]
Jan  4 17:18:36 host sshd[8141]: Disconnected from 210.91.154.187 port 37048 [preauth]
Jan  4 17:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  4 17:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 17:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 17:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  4 17:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 17:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 17:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  4 17:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 17:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 17:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  4 17:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 17:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 17:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  4 17:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 17:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 17:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  4 17:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 17:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 17:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  4 17:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 17:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 17:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  4 17:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 17:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 17:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  4 17:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 17:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 17:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  4 17:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 17:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 17:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  4 17:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 17:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 17:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  4 17:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 17:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 17:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  4 17:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 17:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 17:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwletsstalkfood user-2=straightcurve user-3=bonifacegroup user-4=wwwevmhonda user-5=mrsclean user-6=wwwnexidigital user-7=gifterman user-8=palco123 user-9=phmetals user-10=kottayamcalldriv user-11=wwwkapin user-12=woodpeck user-13=disposeat user-14=wwwkmaorg user-15=remysagr user-16=pmcresources user-17=vfmassets user-18=wwwtestugo user-19=shalinijames user-20=wwwpmcresource user-21=wwwrmswll user-22=wwwresourcehunte user-23=keralaholi user-24=ugotscom user-25=travelboniface user-26=wwwkaretakers user-27=cochintaxi user-28=laundryboniface user-29=dartsimp user-30=a2zgroup feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  4 17:21:52 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  4 17:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 17:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 17:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  4 17:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 17:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 17:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ABSWj3bikXn2uLBi.~
Jan  4 17:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 17:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 17:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ABSWj3bikXn2uLBi.~'
Jan  4 17:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 17:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 17:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ABSWj3bikXn2uLBi.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  4 17:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 17:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 17:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  4 17:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 17:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 17:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  4 17:21:53 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 17:21:53 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 17:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  4 17:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 17:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 17:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  4 17:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 17:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 17:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  4 17:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 17:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 17:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  4 17:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 17:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 17:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  4 17:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 17:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 17:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  4 17:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  4 17:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  4 17:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  4 17:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  4 17:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  4 17:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  4 17:21:57 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  4 17:21:59 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  4 17:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  4 17:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 17:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 17:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  4 17:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 17:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 17:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  4 17:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 17:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 17:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  4 17:22:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 17:22:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 17:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  4 17:22:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 17:22:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 17:24:02 host sshd[9082]: Invalid user admin from 195.226.194.142 port 62304
Jan  4 17:24:02 host sshd[9082]: input_userauth_request: invalid user admin [preauth]
Jan  4 17:24:02 host sshd[9082]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 17:24:02 host sshd[9082]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.142
Jan  4 17:24:04 host sshd[9082]: Failed password for invalid user admin from 195.226.194.142 port 62304 ssh2
Jan  4 17:24:05 host sshd[9082]: Received disconnect from 195.226.194.142 port 62304:11: Bye Bye [preauth]
Jan  4 17:24:05 host sshd[9082]: Disconnected from 195.226.194.142 port 62304 [preauth]
Jan  4 17:26:52 host sshd[9484]: User root from 128.199.173.197 not allowed because not listed in AllowUsers
Jan  4 17:26:52 host sshd[9484]: input_userauth_request: invalid user root [preauth]
Jan  4 17:26:52 host unix_chkpwd[9488]: password check failed for user (root)
Jan  4 17:26:52 host sshd[9484]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.173.197  user=root
Jan  4 17:26:52 host sshd[9484]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 17:26:54 host sshd[9484]: Failed password for invalid user root from 128.199.173.197 port 43211 ssh2
Jan  4 17:26:54 host sshd[9484]: Received disconnect from 128.199.173.197 port 43211:11: Bye Bye [preauth]
Jan  4 17:26:54 host sshd[9484]: Disconnected from 128.199.173.197 port 43211 [preauth]
Jan  4 17:32:37 host sshd[10250]: Invalid user splunk from 128.199.173.197 port 41116
Jan  4 17:32:37 host sshd[10250]: input_userauth_request: invalid user splunk [preauth]
Jan  4 17:32:37 host sshd[10250]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 17:32:37 host sshd[10250]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.173.197
Jan  4 17:32:38 host sshd[10250]: Failed password for invalid user splunk from 128.199.173.197 port 41116 ssh2
Jan  4 17:32:38 host sshd[10250]: Received disconnect from 128.199.173.197 port 41116:11: Bye Bye [preauth]
Jan  4 17:32:38 host sshd[10250]: Disconnected from 128.199.173.197 port 41116 [preauth]
Jan  4 17:42:39 host sshd[11724]: Invalid user ceph from 38.54.112.237 port 33698
Jan  4 17:42:39 host sshd[11724]: input_userauth_request: invalid user ceph [preauth]
Jan  4 17:42:39 host sshd[11724]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 17:42:39 host sshd[11724]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=38.54.112.237
Jan  4 17:42:41 host sshd[11724]: Failed password for invalid user ceph from 38.54.112.237 port 33698 ssh2
Jan  4 17:42:41 host sshd[11724]: Received disconnect from 38.54.112.237 port 33698:11: Bye Bye [preauth]
Jan  4 17:42:41 host sshd[11724]: Disconnected from 38.54.112.237 port 33698 [preauth]
Jan  4 17:44:37 host sshd[12065]: User root from 200.105.183.118 not allowed because not listed in AllowUsers
Jan  4 17:44:37 host sshd[12065]: input_userauth_request: invalid user root [preauth]
Jan  4 17:44:37 host unix_chkpwd[12069]: password check failed for user (root)
Jan  4 17:44:37 host sshd[12065]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.105.183.118  user=root
Jan  4 17:44:37 host sshd[12065]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 17:44:39 host sshd[12065]: Failed password for invalid user root from 200.105.183.118 port 49697 ssh2
Jan  4 17:44:39 host sshd[12065]: Received disconnect from 200.105.183.118 port 49697:11: Bye Bye [preauth]
Jan  4 17:44:39 host sshd[12065]: Disconnected from 200.105.183.118 port 49697 [preauth]
Jan  4 17:47:40 host sshd[12407]: Invalid user admin from 31.41.244.124 port 37223
Jan  4 17:47:40 host sshd[12407]: input_userauth_request: invalid user admin [preauth]
Jan  4 17:47:40 host sshd[12407]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 17:47:40 host sshd[12407]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.41.244.124
Jan  4 17:47:40 host sshd[12409]: Invalid user ubuntu from 210.106.108.250 port 45468
Jan  4 17:47:40 host sshd[12409]: input_userauth_request: invalid user ubuntu [preauth]
Jan  4 17:47:40 host sshd[12409]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 17:47:40 host sshd[12409]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.106.108.250
Jan  4 17:47:42 host sshd[12407]: Failed password for invalid user admin from 31.41.244.124 port 37223 ssh2
Jan  4 17:47:42 host sshd[12409]: Failed password for invalid user ubuntu from 210.106.108.250 port 45468 ssh2
Jan  4 17:47:42 host sshd[12407]: Received disconnect from 31.41.244.124 port 37223:11: Client disconnecting normally [preauth]
Jan  4 17:47:42 host sshd[12407]: Disconnected from 31.41.244.124 port 37223 [preauth]
Jan  4 17:47:42 host sshd[12409]: Received disconnect from 210.106.108.250 port 45468:11: Bye Bye [preauth]
Jan  4 17:47:42 host sshd[12409]: Disconnected from 210.106.108.250 port 45468 [preauth]
Jan  4 17:47:43 host sshd[12414]: Invalid user monitor from 31.41.244.124 port 43334
Jan  4 17:47:43 host sshd[12414]: input_userauth_request: invalid user monitor [preauth]
Jan  4 17:47:44 host sshd[12414]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 17:47:44 host sshd[12414]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.41.244.124
Jan  4 17:47:45 host sshd[12414]: Failed password for invalid user monitor from 31.41.244.124 port 43334 ssh2
Jan  4 17:47:46 host sshd[12414]: Received disconnect from 31.41.244.124 port 43334:11: Client disconnecting normally [preauth]
Jan  4 17:47:46 host sshd[12414]: Disconnected from 31.41.244.124 port 43334 [preauth]
Jan  4 17:47:48 host sshd[12423]: Invalid user anonymous from 31.41.244.124 port 47868
Jan  4 17:47:48 host sshd[12423]: input_userauth_request: invalid user anonymous [preauth]
Jan  4 17:47:48 host sshd[12423]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 17:47:48 host sshd[12423]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.41.244.124
Jan  4 17:47:50 host sshd[12423]: Failed password for invalid user anonymous from 31.41.244.124 port 47868 ssh2
Jan  4 17:48:45 host sshd[12553]: User root from 103.185.239.10 not allowed because not listed in AllowUsers
Jan  4 17:48:45 host sshd[12553]: input_userauth_request: invalid user root [preauth]
Jan  4 17:48:45 host unix_chkpwd[12555]: password check failed for user (root)
Jan  4 17:48:45 host sshd[12553]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.185.239.10  user=root
Jan  4 17:48:45 host sshd[12553]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 17:48:47 host sshd[12553]: Failed password for invalid user root from 103.185.239.10 port 40395 ssh2
Jan  4 17:48:47 host sshd[12553]: Received disconnect from 103.185.239.10 port 40395:11: Bye Bye [preauth]
Jan  4 17:48:47 host sshd[12553]: Disconnected from 103.185.239.10 port 40395 [preauth]
Jan  4 17:49:19 host sshd[12603]: Invalid user ts3 from 38.54.112.237 port 36600
Jan  4 17:49:19 host sshd[12603]: input_userauth_request: invalid user ts3 [preauth]
Jan  4 17:49:19 host sshd[12603]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 17:49:19 host sshd[12603]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=38.54.112.237
Jan  4 17:49:21 host sshd[12603]: Failed password for invalid user ts3 from 38.54.112.237 port 36600 ssh2
Jan  4 17:49:21 host sshd[12603]: Received disconnect from 38.54.112.237 port 36600:11: Bye Bye [preauth]
Jan  4 17:49:21 host sshd[12603]: Disconnected from 38.54.112.237 port 36600 [preauth]
Jan  4 17:49:58 host sshd[12670]: User root from 210.106.108.250 not allowed because not listed in AllowUsers
Jan  4 17:49:58 host sshd[12670]: input_userauth_request: invalid user root [preauth]
Jan  4 17:49:58 host unix_chkpwd[12674]: password check failed for user (root)
Jan  4 17:49:58 host sshd[12670]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.106.108.250  user=root
Jan  4 17:49:58 host sshd[12670]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 17:49:58 host sshd[12668]: Invalid user alexis from 200.105.183.118 port 15745
Jan  4 17:49:58 host sshd[12668]: input_userauth_request: invalid user alexis [preauth]
Jan  4 17:49:58 host sshd[12668]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 17:49:58 host sshd[12668]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.105.183.118
Jan  4 17:49:59 host sshd[12670]: Failed password for invalid user root from 210.106.108.250 port 35674 ssh2
Jan  4 17:49:59 host sshd[12670]: Received disconnect from 210.106.108.250 port 35674:11: Bye Bye [preauth]
Jan  4 17:49:59 host sshd[12670]: Disconnected from 210.106.108.250 port 35674 [preauth]
Jan  4 17:50:00 host sshd[12668]: Failed password for invalid user alexis from 200.105.183.118 port 15745 ssh2
Jan  4 17:50:00 host sshd[12668]: Received disconnect from 200.105.183.118 port 15745:11: Bye Bye [preauth]
Jan  4 17:50:00 host sshd[12668]: Disconnected from 200.105.183.118 port 15745 [preauth]
Jan  4 17:50:21 host sshd[12893]: User root from 38.54.112.237 not allowed because not listed in AllowUsers
Jan  4 17:50:21 host sshd[12893]: input_userauth_request: invalid user root [preauth]
Jan  4 17:50:21 host unix_chkpwd[12897]: password check failed for user (root)
Jan  4 17:50:21 host sshd[12893]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=38.54.112.237  user=root
Jan  4 17:50:21 host sshd[12893]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 17:50:23 host sshd[12893]: Failed password for invalid user root from 38.54.112.237 port 50498 ssh2
Jan  4 17:50:23 host sshd[12893]: Received disconnect from 38.54.112.237 port 50498:11: Bye Bye [preauth]
Jan  4 17:50:23 host sshd[12893]: Disconnected from 38.54.112.237 port 50498 [preauth]
Jan  4 17:50:56 host sshd[13015]: Invalid user mark from 103.185.239.10 port 56394
Jan  4 17:50:56 host sshd[13015]: input_userauth_request: invalid user mark [preauth]
Jan  4 17:50:56 host sshd[13015]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 17:50:56 host sshd[13015]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.185.239.10
Jan  4 17:50:59 host sshd[13015]: Failed password for invalid user mark from 103.185.239.10 port 56394 ssh2
Jan  4 17:50:59 host sshd[13015]: Received disconnect from 103.185.239.10 port 56394:11: Bye Bye [preauth]
Jan  4 17:50:59 host sshd[13015]: Disconnected from 103.185.239.10 port 56394 [preauth]
Jan  4 17:54:49 host sshd[13516]: User root from 195.226.194.142 not allowed because not listed in AllowUsers
Jan  4 17:54:49 host sshd[13516]: input_userauth_request: invalid user root [preauth]
Jan  4 17:54:49 host unix_chkpwd[13520]: password check failed for user (root)
Jan  4 17:54:49 host sshd[13516]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.142  user=root
Jan  4 17:54:49 host sshd[13516]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 17:54:51 host sshd[13516]: Failed password for invalid user root from 195.226.194.142 port 39132 ssh2
Jan  4 17:54:52 host sshd[13516]: Received disconnect from 195.226.194.142 port 39132:11: Bye Bye [preauth]
Jan  4 17:54:52 host sshd[13516]: Disconnected from 195.226.194.142 port 39132 [preauth]
Jan  4 17:57:49 host sshd[13981]: Invalid user user from 41.197.31.178 port 33390
Jan  4 17:57:49 host sshd[13981]: input_userauth_request: invalid user user [preauth]
Jan  4 17:57:49 host sshd[13981]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 17:57:49 host sshd[13981]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178
Jan  4 17:57:51 host sshd[13981]: Failed password for invalid user user from 41.197.31.178 port 33390 ssh2
Jan  4 17:57:52 host sshd[13981]: Connection closed by 41.197.31.178 port 33390 [preauth]
Jan  4 18:14:29 host sshd[16301]: Did not receive identification string from 45.79.181.104 port 53550
Jan  4 18:14:32 host sshd[16303]: Connection closed by 45.79.181.104 port 53554 [preauth]
Jan  4 18:14:33 host sshd[16307]: Did not receive identification string from 45.79.181.104 port 53568
Jan  4 18:18:53 host sshd[16963]: Invalid user kthrp from 103.13.40.2 port 57164
Jan  4 18:18:53 host sshd[16963]: input_userauth_request: invalid user kthrp [preauth]
Jan  4 18:18:53 host sshd[16963]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 18:18:53 host sshd[16963]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2
Jan  4 18:18:55 host sshd[16963]: Failed password for invalid user kthrp from 103.13.40.2 port 57164 ssh2
Jan  4 18:18:55 host sshd[16963]: Connection closed by 103.13.40.2 port 57164 [preauth]
Jan  4 18:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  4 18:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 18:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 18:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  4 18:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 18:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 18:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  4 18:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 18:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 18:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  4 18:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 18:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 18:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  4 18:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 18:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 18:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  4 18:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 18:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 18:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  4 18:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 18:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 18:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  4 18:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 18:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 18:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  4 18:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 18:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 18:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  4 18:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 18:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 18:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  4 18:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 18:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 18:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  4 18:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 18:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 18:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  4 18:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 18:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 18:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=travelboniface user-3=wwwrmswll user-4=keralaholi user-5=wwwresourcehunte user-6=ugotscom user-7=wwwkaretakers user-8=cochintaxi user-9=dartsimp user-10=a2zgroup user-11=laundryboniface user-12=bonifacegroup user-13=wwwevmhonda user-14=straightcurve user-15=wwwletsstalkfood user-16=gifterman user-17=palco123 user-18=kottayamcalldriv user-19=phmetals user-20=mrsclean user-21=wwwnexidigital user-22=wwwkmaorg user-23=disposeat user-24=remysagr user-25=woodpeck user-26=wwwkapin user-27=vfmassets user-28=wwwtestugo user-29=shalinijames user-30=pmcresources feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  4 18:21:53 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  4 18:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 18:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 18:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  4 18:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 18:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 18:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-GVgWcKkNWMp4zfXh.~
Jan  4 18:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 18:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 18:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-GVgWcKkNWMp4zfXh.~'
Jan  4 18:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 18:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 18:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-GVgWcKkNWMp4zfXh.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  4 18:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 18:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 18:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  4 18:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 18:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 18:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  4 18:21:57 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 18:21:57 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 18:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  4 18:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 18:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 18:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  4 18:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 18:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 18:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  4 18:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 18:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 18:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  4 18:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 18:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 18:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  4 18:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 18:21:59 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 18:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  4 18:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  4 18:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  4 18:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  4 18:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  4 18:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  4 18:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  4 18:22:02 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  4 18:22:04 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  4 18:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  4 18:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 18:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 18:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  4 18:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 18:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 18:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  4 18:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 18:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 18:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  4 18:22:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 18:22:10 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 18:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  4 18:22:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 18:22:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 18:39:02 host sshd[19964]: User root from 137.184.11.238 not allowed because not listed in AllowUsers
Jan  4 18:39:02 host sshd[19964]: input_userauth_request: invalid user root [preauth]
Jan  4 18:39:02 host unix_chkpwd[19986]: password check failed for user (root)
Jan  4 18:39:02 host sshd[19964]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.11.238  user=root
Jan  4 18:39:02 host sshd[19964]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 18:39:05 host sshd[19964]: Failed password for invalid user root from 137.184.11.238 port 54452 ssh2
Jan  4 18:39:05 host sshd[19964]: Received disconnect from 137.184.11.238 port 54452:11: Bye Bye [preauth]
Jan  4 18:39:05 host sshd[19964]: Disconnected from 137.184.11.238 port 54452 [preauth]
Jan  4 18:39:07 host sshd[19991]: User root from 137.184.11.238 not allowed because not listed in AllowUsers
Jan  4 18:39:07 host sshd[19991]: input_userauth_request: invalid user root [preauth]
Jan  4 18:39:07 host unix_chkpwd[19994]: password check failed for user (root)
Jan  4 18:39:07 host sshd[19991]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.11.238  user=root
Jan  4 18:39:07 host sshd[19991]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 18:39:08 host sshd[19991]: Failed password for invalid user root from 137.184.11.238 port 32830 ssh2
Jan  4 18:39:09 host sshd[19991]: Received disconnect from 137.184.11.238 port 32830:11: Bye Bye [preauth]
Jan  4 18:39:09 host sshd[19991]: Disconnected from 137.184.11.238 port 32830 [preauth]
Jan  4 19:01:31 host sshd[23067]: User root from 92.46.108.20 not allowed because not listed in AllowUsers
Jan  4 19:01:31 host sshd[23067]: input_userauth_request: invalid user root [preauth]
Jan  4 19:01:32 host unix_chkpwd[23073]: password check failed for user (root)
Jan  4 19:01:32 host sshd[23067]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20  user=root
Jan  4 19:01:32 host sshd[23067]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 19:01:33 host sshd[23067]: Failed password for invalid user root from 92.46.108.20 port 38580 ssh2
Jan  4 19:01:34 host sshd[23067]: Connection closed by 92.46.108.20 port 38580 [preauth]
Jan  4 19:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  4 19:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 19:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 19:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  4 19:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 19:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 19:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  4 19:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 19:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 19:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  4 19:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 19:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 19:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  4 19:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 19:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 19:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  4 19:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 19:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 19:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  4 19:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 19:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 19:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  4 19:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 19:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 19:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  4 19:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 19:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 19:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  4 19:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 19:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 19:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  4 19:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 19:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 19:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  4 19:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 19:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 19:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  4 19:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 19:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 19:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=straightcurve user-2=wwwletsstalkfood user-3=wwwevmhonda user-4=bonifacegroup user-5=mrsclean user-6=wwwnexidigital user-7=kottayamcalldriv user-8=phmetals user-9=gifterman user-10=palco123 user-11=wwwkapin user-12=woodpeck user-13=disposeat user-14=wwwkmaorg user-15=remysagr user-16=pmcresources user-17=wwwtestugo user-18=shalinijames user-19=vfmassets user-20=wwwpmcresource user-21=ugotscom user-22=wwwrmswll user-23=wwwresourcehunte user-24=keralaholi user-25=travelboniface user-26=wwwkaretakers user-27=cochintaxi user-28=laundryboniface user-29=dartsimp user-30=a2zgroup feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  4 19:21:52 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  4 19:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 19:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 19:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  4 19:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 19:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 19:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-CiXqaqiH0Lleqstd.~
Jan  4 19:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 19:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 19:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-CiXqaqiH0Lleqstd.~'
Jan  4 19:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 19:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 19:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-CiXqaqiH0Lleqstd.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  4 19:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 19:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 19:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  4 19:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 19:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 19:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  4 19:21:56 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 19:21:56 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 19:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  4 19:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 19:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 19:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  4 19:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 19:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 19:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  4 19:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 19:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 19:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  4 19:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 19:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 19:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  4 19:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 19:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 19:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  4 19:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  4 19:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  4 19:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  4 19:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  4 19:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  4 19:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  4 19:22:01 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  4 19:22:02 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  4 19:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  4 19:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 19:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 19:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  4 19:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 19:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 19:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  4 19:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 19:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 19:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  4 19:22:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 19:22:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 19:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  4 19:22:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 19:22:10 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 19:26:01 host sshd[26693]: Invalid user anonymous from 195.226.194.242 port 17508
Jan  4 19:26:01 host sshd[26693]: input_userauth_request: invalid user anonymous [preauth]
Jan  4 19:26:01 host sshd[26693]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 19:26:01 host sshd[26693]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.242
Jan  4 19:26:03 host sshd[26693]: Failed password for invalid user anonymous from 195.226.194.242 port 17508 ssh2
Jan  4 19:26:03 host sshd[26693]: Received disconnect from 195.226.194.242 port 17508:11: Bye Bye [preauth]
Jan  4 19:26:03 host sshd[26693]: Disconnected from 195.226.194.242 port 17508 [preauth]
Jan  4 19:27:12 host sshd[26828]: Invalid user es from 41.197.31.178 port 37544
Jan  4 19:27:12 host sshd[26828]: input_userauth_request: invalid user es [preauth]
Jan  4 19:27:12 host sshd[26828]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 19:27:12 host sshd[26828]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178
Jan  4 19:27:14 host sshd[26828]: Failed password for invalid user es from 41.197.31.178 port 37544 ssh2
Jan  4 19:27:15 host sshd[26828]: Connection closed by 41.197.31.178 port 37544 [preauth]
Jan  4 19:36:28 host sshd[28106]: User root from 103.159.206.244 not allowed because not listed in AllowUsers
Jan  4 19:36:28 host sshd[28106]: input_userauth_request: invalid user root [preauth]
Jan  4 19:36:28 host unix_chkpwd[28109]: password check failed for user (root)
Jan  4 19:36:28 host sshd[28106]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.159.206.244  user=root
Jan  4 19:36:28 host sshd[28106]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 19:36:30 host sshd[28106]: Failed password for invalid user root from 103.159.206.244 port 39200 ssh2
Jan  4 19:36:30 host sshd[28106]: Received disconnect from 103.159.206.244 port 39200:11: Bye Bye [preauth]
Jan  4 19:36:30 host sshd[28106]: Disconnected from 103.159.206.244 port 39200 [preauth]
Jan  4 19:36:38 host sshd[28117]: User root from 133.125.50.153 not allowed because not listed in AllowUsers
Jan  4 19:36:38 host sshd[28117]: input_userauth_request: invalid user root [preauth]
Jan  4 19:36:38 host unix_chkpwd[28119]: password check failed for user (root)
Jan  4 19:36:38 host sshd[28117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.125.50.153  user=root
Jan  4 19:36:38 host sshd[28117]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 19:36:39 host sshd[28117]: Failed password for invalid user root from 133.125.50.153 port 44772 ssh2
Jan  4 19:37:20 host sshd[28188]: User root from 141.145.193.96 not allowed because not listed in AllowUsers
Jan  4 19:37:20 host sshd[28188]: input_userauth_request: invalid user root [preauth]
Jan  4 19:37:20 host unix_chkpwd[28196]: password check failed for user (root)
Jan  4 19:37:20 host sshd[28188]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.145.193.96  user=root
Jan  4 19:37:20 host sshd[28188]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 19:37:20 host sshd[28197]: User root from 103.13.40.2 not allowed because not listed in AllowUsers
Jan  4 19:37:20 host sshd[28197]: input_userauth_request: invalid user root [preauth]
Jan  4 19:37:20 host unix_chkpwd[28199]: password check failed for user (root)
Jan  4 19:37:20 host sshd[28197]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2  user=root
Jan  4 19:37:20 host sshd[28197]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 19:37:22 host sshd[28188]: Failed password for invalid user root from 141.145.193.96 port 58958 ssh2
Jan  4 19:37:22 host sshd[28197]: Failed password for invalid user root from 103.13.40.2 port 46444 ssh2
Jan  4 19:37:22 host sshd[28197]: Connection closed by 103.13.40.2 port 46444 [preauth]
Jan  4 19:37:22 host sshd[28188]: Received disconnect from 141.145.193.96 port 58958:11: Bye Bye [preauth]
Jan  4 19:37:22 host sshd[28188]: Disconnected from 141.145.193.96 port 58958 [preauth]
Jan  4 19:38:03 host sshd[28274]: User root from 187.218.23.85 not allowed because not listed in AllowUsers
Jan  4 19:38:03 host sshd[28274]: input_userauth_request: invalid user root [preauth]
Jan  4 19:38:03 host unix_chkpwd[28279]: password check failed for user (root)
Jan  4 19:38:03 host sshd[28274]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.218.23.85  user=root
Jan  4 19:38:03 host sshd[28274]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 19:38:05 host sshd[28274]: Failed password for invalid user root from 187.218.23.85 port 57978 ssh2
Jan  4 19:38:05 host sshd[28274]: Received disconnect from 187.218.23.85 port 57978:11: Bye Bye [preauth]
Jan  4 19:38:05 host sshd[28274]: Disconnected from 187.218.23.85 port 57978 [preauth]
Jan  4 19:38:49 host sshd[28451]: User root from 51.38.237.164 not allowed because not listed in AllowUsers
Jan  4 19:38:49 host sshd[28451]: input_userauth_request: invalid user root [preauth]
Jan  4 19:38:49 host unix_chkpwd[28453]: password check failed for user (root)
Jan  4 19:38:49 host sshd[28451]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.237.164  user=root
Jan  4 19:38:49 host sshd[28451]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 19:38:51 host sshd[28451]: Failed password for invalid user root from 51.38.237.164 port 37902 ssh2
Jan  4 19:38:51 host sshd[28451]: Received disconnect from 51.38.237.164 port 37902:11: Bye Bye [preauth]
Jan  4 19:38:51 host sshd[28451]: Disconnected from 51.38.237.164 port 37902 [preauth]
Jan  4 19:40:08 host sshd[28615]: Invalid user common from 69.49.230.238 port 48504
Jan  4 19:40:08 host sshd[28615]: input_userauth_request: invalid user common [preauth]
Jan  4 19:40:08 host sshd[28615]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 19:40:08 host sshd[28615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.49.230.238
Jan  4 19:40:11 host sshd[28615]: Failed password for invalid user common from 69.49.230.238 port 48504 ssh2
Jan  4 19:40:11 host sshd[28615]: Received disconnect from 69.49.230.238 port 48504:11: Bye Bye [preauth]
Jan  4 19:40:11 host sshd[28615]: Disconnected from 69.49.230.238 port 48504 [preauth]
Jan  4 19:41:17 host sshd[28736]: User root from 64.227.138.7 not allowed because not listed in AllowUsers
Jan  4 19:41:17 host sshd[28736]: input_userauth_request: invalid user root [preauth]
Jan  4 19:41:17 host unix_chkpwd[28738]: password check failed for user (root)
Jan  4 19:41:17 host sshd[28736]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.138.7  user=root
Jan  4 19:41:17 host sshd[28736]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 19:41:20 host sshd[28736]: Failed password for invalid user root from 64.227.138.7 port 38634 ssh2
Jan  4 19:41:20 host sshd[28736]: Received disconnect from 64.227.138.7 port 38634:11: Bye Bye [preauth]
Jan  4 19:41:20 host sshd[28736]: Disconnected from 64.227.138.7 port 38634 [preauth]
Jan  4 19:41:25 host sshd[28747]: User root from 161.35.237.213 not allowed because not listed in AllowUsers
Jan  4 19:41:25 host sshd[28747]: input_userauth_request: invalid user root [preauth]
Jan  4 19:41:25 host unix_chkpwd[28771]: password check failed for user (root)
Jan  4 19:41:25 host sshd[28747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.237.213  user=root
Jan  4 19:41:25 host sshd[28747]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 19:41:27 host sshd[28747]: Failed password for invalid user root from 161.35.237.213 port 50432 ssh2
Jan  4 19:41:27 host sshd[28747]: Received disconnect from 161.35.237.213 port 50432:11: Bye Bye [preauth]
Jan  4 19:41:27 host sshd[28747]: Disconnected from 161.35.237.213 port 50432 [preauth]
Jan  4 19:41:57 host sshd[28805]: User root from 141.145.193.96 not allowed because not listed in AllowUsers
Jan  4 19:41:57 host sshd[28805]: input_userauth_request: invalid user root [preauth]
Jan  4 19:41:57 host unix_chkpwd[28808]: password check failed for user (root)
Jan  4 19:41:57 host sshd[28805]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.145.193.96  user=root
Jan  4 19:41:57 host sshd[28805]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 19:41:59 host sshd[28805]: Failed password for invalid user root from 141.145.193.96 port 41352 ssh2
Jan  4 19:41:59 host sshd[28805]: Received disconnect from 141.145.193.96 port 41352:11: Bye Bye [preauth]
Jan  4 19:41:59 host sshd[28805]: Disconnected from 141.145.193.96 port 41352 [preauth]
Jan  4 19:42:35 host sshd[28915]: User mysql from 187.218.23.85 not allowed because not listed in AllowUsers
Jan  4 19:42:35 host sshd[28915]: input_userauth_request: invalid user mysql [preauth]
Jan  4 19:42:35 host unix_chkpwd[28918]: password check failed for user (mysql)
Jan  4 19:42:35 host sshd[28915]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.218.23.85  user=mysql
Jan  4 19:42:35 host sshd[28915]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "mysql"
Jan  4 19:42:37 host sshd[28915]: Failed password for invalid user mysql from 187.218.23.85 port 43122 ssh2
Jan  4 19:42:37 host sshd[28915]: Received disconnect from 187.218.23.85 port 43122:11: Bye Bye [preauth]
Jan  4 19:42:37 host sshd[28915]: Disconnected from 187.218.23.85 port 43122 [preauth]
Jan  4 19:42:44 host sshd[28955]: User root from 103.159.206.244 not allowed because not listed in AllowUsers
Jan  4 19:42:44 host sshd[28955]: input_userauth_request: invalid user root [preauth]
Jan  4 19:42:44 host unix_chkpwd[28958]: password check failed for user (root)
Jan  4 19:42:44 host sshd[28955]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.159.206.244  user=root
Jan  4 19:42:44 host sshd[28955]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 19:42:46 host sshd[28955]: Failed password for invalid user root from 103.159.206.244 port 42352 ssh2
Jan  4 19:42:46 host sshd[28955]: Received disconnect from 103.159.206.244 port 42352:11: Bye Bye [preauth]
Jan  4 19:42:46 host sshd[28955]: Disconnected from 103.159.206.244 port 42352 [preauth]
Jan  4 19:42:47 host sshd[28961]: User root from 69.49.230.238 not allowed because not listed in AllowUsers
Jan  4 19:42:47 host sshd[28961]: input_userauth_request: invalid user root [preauth]
Jan  4 19:42:47 host unix_chkpwd[28970]: password check failed for user (root)
Jan  4 19:42:47 host sshd[28961]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.49.230.238  user=root
Jan  4 19:42:47 host sshd[28961]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 19:42:49 host sshd[28961]: Failed password for invalid user root from 69.49.230.238 port 54586 ssh2
Jan  4 19:42:49 host sshd[28961]: Received disconnect from 69.49.230.238 port 54586:11: Bye Bye [preauth]
Jan  4 19:42:49 host sshd[28961]: Disconnected from 69.49.230.238 port 54586 [preauth]
Jan  4 19:42:50 host sshd[28997]: Invalid user admin from 51.38.237.164 port 52454
Jan  4 19:42:50 host sshd[28997]: input_userauth_request: invalid user admin [preauth]
Jan  4 19:42:50 host sshd[28997]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 19:42:50 host sshd[28997]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.237.164
Jan  4 19:42:52 host sshd[28997]: Failed password for invalid user admin from 51.38.237.164 port 52454 ssh2
Jan  4 19:42:52 host sshd[28997]: Received disconnect from 51.38.237.164 port 52454:11: Bye Bye [preauth]
Jan  4 19:42:52 host sshd[28997]: Disconnected from 51.38.237.164 port 52454 [preauth]
Jan  4 19:43:38 host sshd[29225]: Invalid user xxx from 64.227.138.7 port 38764
Jan  4 19:43:38 host sshd[29225]: input_userauth_request: invalid user xxx [preauth]
Jan  4 19:43:38 host sshd[29225]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 19:43:38 host sshd[29225]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.138.7
Jan  4 19:43:40 host sshd[29225]: Failed password for invalid user xxx from 64.227.138.7 port 38764 ssh2
Jan  4 19:43:40 host sshd[29225]: Received disconnect from 64.227.138.7 port 38764:11: Bye Bye [preauth]
Jan  4 19:43:40 host sshd[29225]: Disconnected from 64.227.138.7 port 38764 [preauth]
Jan  4 19:43:50 host sshd[29332]: Invalid user temp from 161.35.237.213 port 57842
Jan  4 19:43:50 host sshd[29332]: input_userauth_request: invalid user temp [preauth]
Jan  4 19:43:50 host sshd[29332]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 19:43:50 host sshd[29332]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.237.213
Jan  4 19:43:52 host sshd[29332]: Failed password for invalid user temp from 161.35.237.213 port 57842 ssh2
Jan  4 19:43:52 host sshd[29332]: Received disconnect from 161.35.237.213 port 57842:11: Bye Bye [preauth]
Jan  4 19:43:52 host sshd[29332]: Disconnected from 161.35.237.213 port 57842 [preauth]
Jan  4 20:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  4 20:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 20:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 20:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  4 20:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 20:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 20:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  4 20:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 20:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 20:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  4 20:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 20:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 20:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  4 20:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 20:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 20:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  4 20:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 20:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 20:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  4 20:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 20:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 20:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  4 20:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 20:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 20:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  4 20:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 20:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 20:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  4 20:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 20:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 20:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  4 20:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 20:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 20:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  4 20:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 20:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 20:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  4 20:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 20:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 20:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=travelboniface user-3=ugotscom user-4=wwwrmswll user-5=keralaholi user-6=wwwresourcehunte user-7=cochintaxi user-8=wwwkaretakers user-9=dartsimp user-10=a2zgroup user-11=laundryboniface user-12=wwwevmhonda user-13=bonifacegroup user-14=straightcurve user-15=wwwletsstalkfood user-16=kottayamcalldriv user-17=phmetals user-18=gifterman user-19=palco123 user-20=wwwnexidigital user-21=mrsclean user-22=remysagr user-23=disposeat user-24=wwwkmaorg user-25=woodpeck user-26=wwwkapin user-27=wwwtestugo user-28=shalinijames user-29=vfmassets user-30=pmcresources feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  4 20:21:57 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  4 20:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 20:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 20:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  4 20:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 20:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 20:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-M27dLAXK7SHZrXyV.~
Jan  4 20:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 20:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 20:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-M27dLAXK7SHZrXyV.~'
Jan  4 20:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 20:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 20:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-M27dLAXK7SHZrXyV.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  4 20:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 20:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 20:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  4 20:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 20:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 20:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  4 20:21:57 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 20:21:57 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 20:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  4 20:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 20:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 20:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  4 20:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 20:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 20:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  4 20:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 20:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 20:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  4 20:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 20:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 20:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  4 20:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 20:21:59 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 20:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  4 20:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  4 20:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  4 20:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  4 20:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  4 20:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  4 20:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  4 20:22:02 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  4 20:22:04 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  4 20:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  4 20:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 20:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 20:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  4 20:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 20:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 20:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  4 20:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 20:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 20:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  4 20:22:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 20:22:10 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 20:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  4 20:22:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 20:22:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 20:26:00 host sshd[3436]: Invalid user user from 195.226.194.242 port 54122
Jan  4 20:26:00 host sshd[3436]: input_userauth_request: invalid user user [preauth]
Jan  4 20:26:00 host sshd[3436]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 20:26:00 host sshd[3436]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.242
Jan  4 20:26:02 host sshd[3436]: Failed password for invalid user user from 195.226.194.242 port 54122 ssh2
Jan  4 20:26:02 host sshd[3436]: Received disconnect from 195.226.194.242 port 54122:11: Bye Bye [preauth]
Jan  4 20:26:02 host sshd[3436]: Disconnected from 195.226.194.242 port 54122 [preauth]
Jan  4 20:55:23 host sshd[7469]: Invalid user user from 103.13.40.2 port 40726
Jan  4 20:55:23 host sshd[7469]: input_userauth_request: invalid user user [preauth]
Jan  4 20:55:23 host sshd[7469]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 20:55:23 host sshd[7469]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2
Jan  4 20:55:25 host sshd[7469]: Failed password for invalid user user from 103.13.40.2 port 40726 ssh2
Jan  4 20:55:25 host sshd[7469]: Connection closed by 103.13.40.2 port 40726 [preauth]
Jan  4 21:00:56 host sshd[8249]: User root from 41.197.31.178 not allowed because not listed in AllowUsers
Jan  4 21:00:56 host sshd[8249]: input_userauth_request: invalid user root [preauth]
Jan  4 21:00:56 host unix_chkpwd[8257]: password check failed for user (root)
Jan  4 21:00:56 host sshd[8249]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178  user=root
Jan  4 21:00:56 host sshd[8249]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 21:00:58 host sshd[8249]: Failed password for invalid user root from 41.197.31.178 port 59716 ssh2
Jan  4 21:00:58 host sshd[8249]: Connection closed by 41.197.31.178 port 59716 [preauth]
Jan  4 21:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  4 21:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 21:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 21:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  4 21:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 21:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 21:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  4 21:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 21:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 21:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  4 21:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 21:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 21:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  4 21:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 21:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 21:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  4 21:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 21:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 21:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  4 21:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 21:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 21:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  4 21:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 21:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 21:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  4 21:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 21:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 21:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  4 21:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 21:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 21:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  4 21:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 21:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 21:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  4 21:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 21:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 21:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  4 21:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 21:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 21:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=mrsclean user-2=wwwnexidigital user-3=phmetals user-4=kottayamcalldriv user-5=palco123 user-6=gifterman user-7=straightcurve user-8=wwwletsstalkfood user-9=wwwevmhonda user-10=bonifacegroup user-11=pmcresources user-12=shalinijames user-13=wwwtestugo user-14=vfmassets user-15=wwwkapin user-16=woodpeck user-17=disposeat user-18=remysagr user-19=wwwkmaorg user-20=ugotscom user-21=wwwresourcehunte user-22=keralaholi user-23=wwwrmswll user-24=travelboniface user-25=wwwpmcresource user-26=laundryboniface user-27=a2zgroup user-28=dartsimp user-29=wwwkaretakers user-30=cochintaxi feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  4 21:21:52 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  4 21:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 21:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 21:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  4 21:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 21:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 21:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Hf0j26rLiMIUvhRP.~
Jan  4 21:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 21:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 21:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Hf0j26rLiMIUvhRP.~'
Jan  4 21:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 21:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 21:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Hf0j26rLiMIUvhRP.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  4 21:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 21:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 21:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  4 21:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 21:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 21:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  4 21:21:53 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 21:21:53 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 21:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  4 21:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 21:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 21:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  4 21:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 21:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 21:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  4 21:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 21:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 21:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  4 21:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 21:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 21:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  4 21:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 21:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 21:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  4 21:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  4 21:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  4 21:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  4 21:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  4 21:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  4 21:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  4 21:21:57 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  4 21:21:59 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  4 21:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  4 21:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 21:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 21:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  4 21:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 21:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 21:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  4 21:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 21:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 21:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  4 21:22:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 21:22:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 21:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  4 21:22:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 21:22:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 21:28:17 host sshd[12168]: Invalid user it.support from 195.226.194.242 port 30216
Jan  4 21:28:17 host sshd[12168]: input_userauth_request: invalid user it.support [preauth]
Jan  4 21:28:17 host sshd[12168]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 21:28:17 host sshd[12168]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.242
Jan  4 21:28:18 host sshd[12168]: Failed password for invalid user it.support from 195.226.194.242 port 30216 ssh2
Jan  4 21:28:19 host sshd[12168]: Received disconnect from 195.226.194.242 port 30216:11: Bye Bye [preauth]
Jan  4 21:28:19 host sshd[12168]: Disconnected from 195.226.194.242 port 30216 [preauth]
Jan  4 21:30:06 host sshd[12384]: Did not receive identification string from 57.128.11.39 port 44264
Jan  4 21:30:07 host sshd[12387]: User mysql from 57.128.11.39 not allowed because not listed in AllowUsers
Jan  4 21:30:07 host sshd[12388]: Invalid user ftpuser from 57.128.11.39 port 47400
Jan  4 21:30:07 host sshd[12387]: input_userauth_request: invalid user mysql [preauth]
Jan  4 21:30:07 host sshd[12388]: input_userauth_request: invalid user ftpuser [preauth]
Jan  4 21:30:07 host sshd[12385]: User centos from 57.128.11.39 not allowed because not listed in AllowUsers
Jan  4 21:30:07 host sshd[12385]: input_userauth_request: invalid user centos [preauth]
Jan  4 21:30:07 host sshd[12386]: Invalid user user from 57.128.11.39 port 47390
Jan  4 21:30:07 host sshd[12386]: input_userauth_request: invalid user user [preauth]
Jan  4 21:30:07 host sshd[12391]: Invalid user postgres from 57.128.11.39 port 47374
Jan  4 21:30:07 host sshd[12391]: input_userauth_request: invalid user postgres [preauth]
Jan  4 21:30:07 host sshd[12394]: Invalid user ansadmin from 57.128.11.39 port 47426
Jan  4 21:30:07 host sshd[12394]: input_userauth_request: invalid user ansadmin [preauth]
Jan  4 21:30:07 host sshd[12389]: Invalid user ansible from 57.128.11.39 port 47380
Jan  4 21:30:07 host sshd[12389]: input_userauth_request: invalid user ansible [preauth]
Jan  4 21:30:07 host sshd[12393]: User mysql from 57.128.11.39 not allowed because not listed in AllowUsers
Jan  4 21:30:07 host sshd[12393]: input_userauth_request: invalid user mysql [preauth]
Jan  4 21:30:07 host sshd[12397]: Invalid user ts3server from 57.128.11.39 port 47362
Jan  4 21:30:07 host sshd[12397]: input_userauth_request: invalid user ts3server [preauth]
Jan  4 21:30:07 host sshd[12398]: Invalid user discord from 57.128.11.39 port 47388
Jan  4 21:30:07 host sshd[12398]: input_userauth_request: invalid user discord [preauth]
Jan  4 21:30:07 host sshd[12396]: Invalid user ansadmin from 57.128.11.39 port 47414
Jan  4 21:30:07 host sshd[12396]: input_userauth_request: invalid user ansadmin [preauth]
Jan  4 21:30:07 host sshd[12395]: Invalid user teamspeak3 from 57.128.11.39 port 47392
Jan  4 21:30:07 host sshd[12395]: input_userauth_request: invalid user teamspeak3 [preauth]
Jan  4 21:30:07 host sshd[12392]: Invalid user q from 57.128.11.39 port 47396
Jan  4 21:30:07 host sshd[12392]: input_userauth_request: invalid user q [preauth]
Jan  4 21:30:07 host sshd[12411]: Invalid user es from 57.128.11.39 port 47412
Jan  4 21:30:07 host sshd[12411]: input_userauth_request: invalid user es [preauth]
Jan  4 21:30:07 host sshd[12399]: Invalid user ubuntu from 57.128.11.39 port 47436
Jan  4 21:30:07 host sshd[12399]: input_userauth_request: invalid user ubuntu [preauth]
Jan  4 21:30:07 host sshd[12404]: Invalid user guest from 57.128.11.39 port 47434
Jan  4 21:30:07 host sshd[12404]: input_userauth_request: invalid user guest [preauth]
Jan  4 21:30:07 host sshd[12408]: Invalid user guest from 57.128.11.39 port 47410
Jan  4 21:30:07 host sshd[12400]: Invalid user elastic from 57.128.11.39 port 47402
Jan  4 21:30:07 host sshd[12408]: input_userauth_request: invalid user guest [preauth]
Jan  4 21:30:07 host sshd[12400]: input_userauth_request: invalid user elastic [preauth]
Jan  4 21:30:07 host sshd[12401]: Invalid user esuser from 57.128.11.39 port 47366
Jan  4 21:30:07 host sshd[12401]: input_userauth_request: invalid user esuser [preauth]
Jan  4 21:30:07 host sshd[12412]: Invalid user user from 57.128.11.39 port 47384
Jan  4 21:30:07 host sshd[12412]: input_userauth_request: invalid user user [preauth]
Jan  4 21:30:07 host sshd[12406]: Invalid user linux from 57.128.11.39 port 47416
Jan  4 21:30:07 host sshd[12407]: Invalid user oracle from 57.128.11.39 port 47404
Jan  4 21:30:07 host sshd[12407]: input_userauth_request: invalid user oracle [preauth]
Jan  4 21:30:07 host sshd[12406]: input_userauth_request: invalid user linux [preauth]
Jan  4 21:30:07 host sshd[12415]: Invalid user admin from 57.128.11.39 port 47424
Jan  4 21:30:07 host sshd[12415]: input_userauth_request: invalid user admin [preauth]
Jan  4 21:30:07 host sshd[12403]: Invalid user oracle from 57.128.11.39 port 47430
Jan  4 21:30:07 host sshd[12403]: input_userauth_request: invalid user oracle [preauth]
Jan  4 21:30:07 host sshd[12409]: User centos from 57.128.11.39 not allowed because not listed in AllowUsers
Jan  4 21:30:07 host sshd[12409]: input_userauth_request: invalid user centos [preauth]
Jan  4 21:30:07 host sshd[12402]: Invalid user q from 57.128.11.39 port 47432
Jan  4 21:30:07 host sshd[12402]: input_userauth_request: invalid user q [preauth]
Jan  4 21:30:07 host sshd[12405]: Invalid user www from 57.128.11.39 port 47440
Jan  4 21:30:07 host sshd[12405]: input_userauth_request: invalid user www [preauth]
Jan  4 21:30:07 host sshd[12413]: Invalid user ftpuser from 57.128.11.39 port 47422
Jan  4 21:30:07 host sshd[12413]: input_userauth_request: invalid user ftpuser [preauth]
Jan  4 21:30:07 host sshd[12410]: Invalid user 1 from 57.128.11.39 port 47368
Jan  4 21:30:07 host sshd[12410]: input_userauth_request: invalid user 1 [preauth]
Jan  4 21:30:07 host sshd[12414]: Invalid user guest from 57.128.11.39 port 47420
Jan  4 21:30:07 host sshd[12416]: Invalid user bitrix from 57.128.11.39 port 47398
Jan  4 21:30:07 host sshd[12414]: input_userauth_request: invalid user guest [preauth]
Jan  4 21:30:07 host sshd[12416]: input_userauth_request: invalid user bitrix [preauth]
Jan  4 21:30:07 host sshd[12388]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 21:30:07 host sshd[12386]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 21:30:07 host sshd[12388]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=57.128.11.39
Jan  4 21:30:07 host sshd[12386]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=57.128.11.39
Jan  4 21:30:07 host unix_chkpwd[12451]: password check failed for user (centos)
Jan  4 21:30:07 host sshd[12385]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=57.128.11.39  user=centos
Jan  4 21:30:07 host unix_chkpwd[12450]: password check failed for user (mysql)
Jan  4 21:30:07 host sshd[12387]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=57.128.11.39  user=mysql
Jan  4 21:30:07 host sshd[12387]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "mysql"
Jan  4 21:30:07 host sshd[12391]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 21:30:07 host sshd[12391]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=57.128.11.39
Jan  4 21:30:07 host sshd[12394]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 21:30:07 host sshd[12394]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=57.128.11.39
Jan  4 21:30:07 host sshd[12389]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 21:30:07 host sshd[12389]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=57.128.11.39
Jan  4 21:30:07 host unix_chkpwd[12452]: password check failed for user (mysql)
Jan  4 21:30:07 host sshd[12393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=57.128.11.39  user=mysql
Jan  4 21:30:07 host sshd[12393]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "mysql"
Jan  4 21:30:07 host sshd[12398]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 21:30:07 host sshd[12397]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 21:30:07 host sshd[12398]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=57.128.11.39
Jan  4 21:30:07 host sshd[12397]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=57.128.11.39
Jan  4 21:30:07 host sshd[12396]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 21:30:07 host sshd[12396]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=57.128.11.39
Jan  4 21:30:07 host sshd[12392]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 21:30:07 host sshd[12392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=57.128.11.39
Jan  4 21:30:07 host sshd[12395]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 21:30:07 host sshd[12395]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=57.128.11.39
Jan  4 21:30:07 host sshd[12411]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 21:30:07 host sshd[12411]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=57.128.11.39
Jan  4 21:30:07 host sshd[12399]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 21:30:07 host sshd[12399]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=57.128.11.39
Jan  4 21:30:07 host sshd[12404]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 21:30:07 host sshd[12404]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=57.128.11.39
Jan  4 21:30:07 host sshd[12401]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 21:30:07 host sshd[12400]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 21:30:07 host sshd[12401]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=57.128.11.39
Jan  4 21:30:07 host sshd[12400]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=57.128.11.39
Jan  4 21:30:07 host sshd[12406]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 21:30:07 host sshd[12406]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=57.128.11.39
Jan  4 21:30:07 host sshd[12407]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 21:30:07 host sshd[12407]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=57.128.11.39
Jan  4 21:30:07 host sshd[12408]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 21:30:07 host sshd[12412]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 21:30:07 host sshd[12408]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=57.128.11.39
Jan  4 21:30:07 host sshd[12412]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=57.128.11.39
Jan  4 21:30:07 host sshd[12402]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 21:30:07 host sshd[12402]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=57.128.11.39
Jan  4 21:30:07 host sshd[12415]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 21:30:07 host sshd[12415]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=57.128.11.39
Jan  4 21:30:07 host sshd[12403]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 21:30:07 host sshd[12403]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=57.128.11.39
Jan  4 21:30:07 host sshd[12414]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 21:30:07 host sshd[12414]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=57.128.11.39
Jan  4 21:30:07 host sshd[12405]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 21:30:07 host sshd[12405]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=57.128.11.39
Jan  4 21:30:07 host sshd[12413]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 21:30:07 host sshd[12413]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=57.128.11.39
Jan  4 21:30:07 host unix_chkpwd[12453]: password check failed for user (centos)
Jan  4 21:30:07 host sshd[12410]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 21:30:07 host sshd[12410]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=57.128.11.39
Jan  4 21:30:07 host sshd[12409]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=57.128.11.39  user=centos
Jan  4 21:30:07 host sshd[12416]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 21:30:07 host sshd[12416]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=57.128.11.39
Jan  4 21:30:07 host sshd[12390]: User centos from 57.128.11.39 not allowed because not listed in AllowUsers
Jan  4 21:30:07 host sshd[12390]: input_userauth_request: invalid user centos [preauth]
Jan  4 21:30:07 host unix_chkpwd[12454]: password check failed for user (centos)
Jan  4 21:30:07 host sshd[12390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=57.128.11.39  user=centos
Jan  4 21:30:08 host sshd[12388]: Failed password for invalid user ftpuser from 57.128.11.39 port 47400 ssh2
Jan  4 21:30:08 host sshd[12386]: Failed password for invalid user user from 57.128.11.39 port 47390 ssh2
Jan  4 21:30:08 host sshd[12385]: Failed password for invalid user centos from 57.128.11.39 port 47372 ssh2
Jan  4 21:30:08 host sshd[12387]: Failed password for invalid user mysql from 57.128.11.39 port 47376 ssh2
Jan  4 21:30:09 host sshd[12391]: Failed password for invalid user postgres from 57.128.11.39 port 47374 ssh2
Jan  4 21:30:09 host sshd[12394]: Failed password for invalid user ansadmin from 57.128.11.39 port 47426 ssh2
Jan  4 21:30:09 host sshd[12389]: Failed password for invalid user ansible from 57.128.11.39 port 47380 ssh2
Jan  4 21:30:09 host sshd[12393]: Failed password for invalid user mysql from 57.128.11.39 port 47438 ssh2
Jan  4 21:30:09 host sshd[12398]: Failed password for invalid user discord from 57.128.11.39 port 47388 ssh2
Jan  4 21:30:09 host sshd[12396]: Failed password for invalid user ansadmin from 57.128.11.39 port 47414 ssh2
Jan  4 21:30:09 host sshd[12397]: Failed password for invalid user ts3server from 57.128.11.39 port 47362 ssh2
Jan  4 21:30:09 host sshd[12392]: Failed password for invalid user q from 57.128.11.39 port 47396 ssh2
Jan  4 21:30:09 host sshd[12395]: Failed password for invalid user teamspeak3 from 57.128.11.39 port 47392 ssh2
Jan  4 21:30:09 host sshd[12411]: Failed password for invalid user es from 57.128.11.39 port 47412 ssh2
Jan  4 21:30:09 host sshd[12399]: Failed password for invalid user ubuntu from 57.128.11.39 port 47436 ssh2
Jan  4 21:30:09 host sshd[12404]: Failed password for invalid user guest from 57.128.11.39 port 47434 ssh2
Jan  4 21:30:09 host sshd[12400]: Failed password for invalid user elastic from 57.128.11.39 port 47402 ssh2
Jan  4 21:30:09 host sshd[12401]: Failed password for invalid user esuser from 57.128.11.39 port 47366 ssh2
Jan  4 21:30:09 host sshd[12406]: Failed password for invalid user linux from 57.128.11.39 port 47416 ssh2
Jan  4 21:30:09 host sshd[12407]: Failed password for invalid user oracle from 57.128.11.39 port 47404 ssh2
Jan  4 21:30:09 host sshd[12408]: Failed password for invalid user guest from 57.128.11.39 port 47410 ssh2
Jan  4 21:30:09 host sshd[12412]: Failed password for invalid user user from 57.128.11.39 port 47384 ssh2
Jan  4 21:30:09 host sshd[12402]: Failed password for invalid user q from 57.128.11.39 port 47432 ssh2
Jan  4 21:30:09 host sshd[12415]: Failed password for invalid user admin from 57.128.11.39 port 47424 ssh2
Jan  4 21:30:09 host sshd[12403]: Failed password for invalid user oracle from 57.128.11.39 port 47430 ssh2
Jan  4 21:30:09 host sshd[12414]: Failed password for invalid user guest from 57.128.11.39 port 47420 ssh2
Jan  4 21:30:09 host sshd[12405]: Failed password for invalid user www from 57.128.11.39 port 47440 ssh2
Jan  4 21:30:09 host sshd[12413]: Failed password for invalid user ftpuser from 57.128.11.39 port 47422 ssh2
Jan  4 21:30:09 host sshd[12410]: Failed password for invalid user 1 from 57.128.11.39 port 47368 ssh2
Jan  4 21:30:09 host sshd[12409]: Failed password for invalid user centos from 57.128.11.39 port 47408 ssh2
Jan  4 21:30:09 host sshd[12386]: Connection closed by 57.128.11.39 port 47390 [preauth]
Jan  4 21:30:09 host sshd[12388]: Connection closed by 57.128.11.39 port 47400 [preauth]
Jan  4 21:30:09 host sshd[12387]: Connection closed by 57.128.11.39 port 47376 [preauth]
Jan  4 21:30:09 host sshd[12385]: Connection closed by 57.128.11.39 port 47372 [preauth]
Jan  4 21:30:09 host sshd[12391]: Connection closed by 57.128.11.39 port 47374 [preauth]
Jan  4 21:30:09 host sshd[12389]: Connection closed by 57.128.11.39 port 47380 [preauth]
Jan  4 21:30:09 host sshd[12394]: Connection closed by 57.128.11.39 port 47426 [preauth]
Jan  4 21:30:09 host sshd[12393]: Connection closed by 57.128.11.39 port 47438 [preauth]
Jan  4 21:30:09 host sshd[12396]: Connection closed by 57.128.11.39 port 47414 [preauth]
Jan  4 21:30:09 host sshd[12392]: Connection closed by 57.128.11.39 port 47396 [preauth]
Jan  4 21:30:09 host sshd[12397]: Connection closed by 57.128.11.39 port 47362 [preauth]
Jan  4 21:30:09 host sshd[12398]: Connection closed by 57.128.11.39 port 47388 [preauth]
Jan  4 21:30:09 host sshd[12395]: Connection closed by 57.128.11.39 port 47392 [preauth]
Jan  4 21:30:09 host sshd[12411]: Connection closed by 57.128.11.39 port 47412 [preauth]
Jan  4 21:30:09 host sshd[12399]: Connection closed by 57.128.11.39 port 47436 [preauth]
Jan  4 21:30:09 host sshd[12404]: Connection closed by 57.128.11.39 port 47434 [preauth]
Jan  4 21:30:09 host sshd[12400]: Connection closed by 57.128.11.39 port 47402 [preauth]
Jan  4 21:30:09 host sshd[12401]: Connection closed by 57.128.11.39 port 47366 [preauth]
Jan  4 21:30:09 host sshd[12406]: Connection closed by 57.128.11.39 port 47416 [preauth]
Jan  4 21:30:09 host sshd[12407]: Connection closed by 57.128.11.39 port 47404 [preauth]
Jan  4 21:30:09 host sshd[12408]: Connection closed by 57.128.11.39 port 47410 [preauth]
Jan  4 21:30:09 host sshd[12412]: Connection closed by 57.128.11.39 port 47384 [preauth]
Jan  4 21:30:09 host sshd[12402]: Connection closed by 57.128.11.39 port 47432 [preauth]
Jan  4 21:30:09 host sshd[12415]: Connection closed by 57.128.11.39 port 47424 [preauth]
Jan  4 21:30:09 host sshd[12403]: Connection closed by 57.128.11.39 port 47430 [preauth]
Jan  4 21:30:09 host sshd[12405]: Connection closed by 57.128.11.39 port 47440 [preauth]
Jan  4 21:30:09 host sshd[12414]: Connection closed by 57.128.11.39 port 47420 [preauth]
Jan  4 21:30:09 host sshd[12409]: Connection closed by 57.128.11.39 port 47408 [preauth]
Jan  4 21:30:09 host sshd[12410]: Connection closed by 57.128.11.39 port 47368 [preauth]
Jan  4 21:30:09 host sshd[12413]: Connection closed by 57.128.11.39 port 47422 [preauth]
Jan  4 21:30:09 host sshd[12416]: Failed password for invalid user bitrix from 57.128.11.39 port 47398 ssh2
Jan  4 21:30:09 host sshd[12416]: Connection closed by 57.128.11.39 port 47398 [preauth]
Jan  4 21:30:09 host sshd[12390]: Failed password for invalid user centos from 57.128.11.39 port 47378 ssh2
Jan  4 21:30:09 host sshd[12390]: Connection closed by 57.128.11.39 port 47378 [preauth]
Jan  4 21:36:12 host sshd[13343]: Invalid user user from 92.46.108.20 port 51324
Jan  4 21:36:12 host sshd[13343]: input_userauth_request: invalid user user [preauth]
Jan  4 21:36:13 host sshd[13343]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 21:36:13 host sshd[13343]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20
Jan  4 21:36:14 host sshd[13343]: Failed password for invalid user user from 92.46.108.20 port 51324 ssh2
Jan  4 21:36:15 host sshd[13343]: Connection closed by 92.46.108.20 port 51324 [preauth]
Jan  4 21:43:02 host sshd[14319]: Invalid user joe from 107.189.30.59 port 39204
Jan  4 21:43:02 host sshd[14319]: input_userauth_request: invalid user joe [preauth]
Jan  4 21:43:02 host sshd[14319]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 21:43:02 host sshd[14319]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59
Jan  4 21:43:03 host sshd[14319]: Failed password for invalid user joe from 107.189.30.59 port 39204 ssh2
Jan  4 21:43:04 host sshd[14319]: Connection closed by 107.189.30.59 port 39204 [preauth]
Jan  4 21:49:11 host sshd[15143]: Did not receive identification string from 149.129.220.104 port 61000
Jan  4 22:02:41 host sshd[16951]: Did not receive identification string from 92.255.85.115 port 10814
Jan  4 22:11:45 host sshd[18159]: Invalid user bzrx1098ui from 92.255.85.115 port 45794
Jan  4 22:11:45 host sshd[18159]: input_userauth_request: invalid user bzrx1098ui [preauth]
Jan  4 22:11:45 host sshd[18159]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 22:11:45 host sshd[18159]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.255.85.115
Jan  4 22:11:48 host sshd[18159]: Failed password for invalid user bzrx1098ui from 92.255.85.115 port 45794 ssh2
Jan  4 22:11:48 host sshd[18159]: Connection reset by 92.255.85.115 port 45794 [preauth]
Jan  4 22:13:20 host sshd[18322]: User root from 103.13.40.2 not allowed because not listed in AllowUsers
Jan  4 22:13:20 host sshd[18322]: input_userauth_request: invalid user root [preauth]
Jan  4 22:13:20 host unix_chkpwd[18324]: password check failed for user (root)
Jan  4 22:13:20 host sshd[18322]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2  user=root
Jan  4 22:13:20 host sshd[18322]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 22:13:22 host sshd[18322]: Failed password for invalid user root from 103.13.40.2 port 44864 ssh2
Jan  4 22:13:22 host sshd[18322]: Connection closed by 103.13.40.2 port 44864 [preauth]
Jan  4 22:18:21 host sshd[19032]: Invalid user admin from 92.255.85.115 port 62144
Jan  4 22:18:21 host sshd[19032]: input_userauth_request: invalid user admin [preauth]
Jan  4 22:18:21 host sshd[19032]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 22:18:21 host sshd[19032]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.255.85.115
Jan  4 22:18:24 host sshd[19032]: Failed password for invalid user admin from 92.255.85.115 port 62144 ssh2
Jan  4 22:18:24 host sshd[19032]: Connection reset by 92.255.85.115 port 62144 [preauth]
Jan  4 22:18:48 host sshd[19104]: Connection closed by 174.138.61.44 port 41716 [preauth]
Jan  4 22:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  4 22:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 22:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 22:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  4 22:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 22:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 22:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  4 22:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 22:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 22:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  4 22:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 22:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 22:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  4 22:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 22:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 22:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  4 22:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 22:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 22:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  4 22:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 22:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 22:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  4 22:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 22:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 22:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  4 22:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 22:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 22:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  4 22:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 22:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 22:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  4 22:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 22:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 22:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  4 22:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 22:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 22:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  4 22:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 22:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 22:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=woodpeck user-2=wwwkapin user-3=remysagr user-4=disposeat user-5=wwwkmaorg user-6=pmcresources user-7=shalinijames user-8=wwwtestugo user-9=vfmassets user-10=straightcurve user-11=wwwletsstalkfood user-12=wwwevmhonda user-13=bonifacegroup user-14=wwwnexidigital user-15=mrsclean user-16=kottayamcalldriv user-17=phmetals user-18=palco123 user-19=gifterman user-20=cochintaxi user-21=wwwkaretakers user-22=laundryboniface user-23=a2zgroup user-24=dartsimp user-25=wwwpmcresource user-26=ugotscom user-27=wwwresourcehunte user-28=keralaholi user-29=wwwrmswll user-30=travelboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  4 22:21:52 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  4 22:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 22:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 22:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  4 22:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 22:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 22:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-CMlJhNH1dwIXuEdp.~
Jan  4 22:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 22:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 22:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-CMlJhNH1dwIXuEdp.~'
Jan  4 22:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 22:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 22:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-CMlJhNH1dwIXuEdp.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  4 22:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 22:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 22:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  4 22:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 22:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 22:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  4 22:21:53 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 22:21:53 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 22:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  4 22:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 22:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 22:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  4 22:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 22:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 22:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  4 22:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 22:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 22:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  4 22:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 22:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 22:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  4 22:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 22:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 22:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  4 22:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  4 22:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  4 22:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  4 22:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  4 22:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  4 22:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  4 22:21:57 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  4 22:21:59 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  4 22:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  4 22:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 22:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 22:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  4 22:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 22:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 22:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  4 22:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 22:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 22:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  4 22:22:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 22:22:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 22:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  4 22:22:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 22:22:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 22:26:57 host sshd[20443]: Invalid user Sujan from 195.226.194.242 port 23600
Jan  4 22:26:57 host sshd[20443]: input_userauth_request: invalid user Sujan [preauth]
Jan  4 22:26:57 host sshd[20443]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 22:26:57 host sshd[20443]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.242
Jan  4 22:26:59 host sshd[20443]: Failed password for invalid user Sujan from 195.226.194.242 port 23600 ssh2
Jan  4 22:26:59 host sshd[20443]: Received disconnect from 195.226.194.242 port 23600:11: Bye Bye [preauth]
Jan  4 22:26:59 host sshd[20443]: Disconnected from 195.226.194.242 port 23600 [preauth]
Jan  4 22:29:10 host sshd[20710]: Invalid user nagios from 41.197.31.178 port 47962
Jan  4 22:29:10 host sshd[20710]: input_userauth_request: invalid user nagios [preauth]
Jan  4 22:29:10 host sshd[20710]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 22:29:10 host sshd[20710]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178
Jan  4 22:29:12 host sshd[20710]: Failed password for invalid user nagios from 41.197.31.178 port 47962 ssh2
Jan  4 22:29:13 host sshd[20710]: Connection closed by 41.197.31.178 port 47962 [preauth]
Jan  4 23:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  4 23:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 23:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 23:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  4 23:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 23:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 23:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  4 23:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 23:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 23:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  4 23:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 23:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 23:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  4 23:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 23:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 23:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  4 23:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 23:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 23:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  4 23:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 23:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 23:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  4 23:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 23:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 23:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  4 23:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 23:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 23:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  4 23:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 23:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 23:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  4 23:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 23:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 23:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  4 23:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 23:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 23:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  4 23:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 23:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 23:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkaretakers user-2=cochintaxi user-3=laundryboniface user-4=dartsimp user-5=a2zgroup user-6=wwwpmcresource user-7=ugotscom user-8=wwwrmswll user-9=wwwresourcehunte user-10=keralaholi user-11=travelboniface user-12=wwwkapin user-13=woodpeck user-14=disposeat user-15=wwwkmaorg user-16=remysagr user-17=pmcresources user-18=wwwtestugo user-19=shalinijames user-20=vfmassets user-21=wwwletsstalkfood user-22=straightcurve user-23=wwwevmhonda user-24=bonifacegroup user-25=wwwnexidigital user-26=mrsclean user-27=kottayamcalldriv user-28=phmetals user-29=gifterman user-30=palco123 feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  4 23:21:52 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  4 23:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 23:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 23:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  4 23:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 23:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 23:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ygpTdBUsIoAWaibY.~
Jan  4 23:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 23:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 23:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ygpTdBUsIoAWaibY.~'
Jan  4 23:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 23:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 23:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ygpTdBUsIoAWaibY.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  4 23:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 23:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 23:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  4 23:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 23:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 23:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  4 23:21:53 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 23:21:53 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 23:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  4 23:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 23:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 23:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  4 23:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 23:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 23:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  4 23:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 23:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 23:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  4 23:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 23:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 23:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  4 23:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  4 23:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  4 23:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  4 23:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  4 23:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  4 23:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  4 23:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  4 23:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  4 23:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  4 23:21:58 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  4 23:21:59 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  4 23:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  4 23:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 23:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 23:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  4 23:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 23:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 23:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  4 23:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  4 23:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  4 23:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  4 23:22:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 23:22:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 23:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  4 23:22:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  4 23:22:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  4 23:31:10 host sshd[29329]: Invalid user share from 103.13.40.2 port 48190
Jan  4 23:31:10 host sshd[29329]: input_userauth_request: invalid user share [preauth]
Jan  4 23:31:10 host sshd[29329]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 23:31:10 host sshd[29329]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2
Jan  4 23:31:13 host sshd[29329]: Failed password for invalid user share from 103.13.40.2 port 48190 ssh2
Jan  4 23:31:13 host sshd[29329]: Connection closed by 103.13.40.2 port 48190 [preauth]
Jan  4 23:53:59 host sshd[32491]: Invalid user jackie from 190.128.239.54 port 33388
Jan  4 23:53:59 host sshd[32491]: input_userauth_request: invalid user jackie [preauth]
Jan  4 23:53:59 host sshd[32491]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 23:53:59 host sshd[32491]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.128.239.54
Jan  4 23:54:01 host sshd[32491]: Failed password for invalid user jackie from 190.128.239.54 port 33388 ssh2
Jan  4 23:54:01 host sshd[32491]: Received disconnect from 190.128.239.54 port 33388:11: Bye Bye [preauth]
Jan  4 23:54:01 host sshd[32491]: Disconnected from 190.128.239.54 port 33388 [preauth]
Jan  4 23:54:30 host sshd[32563]: Invalid user rg from 97.74.95.243 port 47930
Jan  4 23:54:30 host sshd[32563]: input_userauth_request: invalid user rg [preauth]
Jan  4 23:54:30 host sshd[32563]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 23:54:30 host sshd[32563]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=97.74.95.243
Jan  4 23:54:32 host sshd[32563]: Failed password for invalid user rg from 97.74.95.243 port 47930 ssh2
Jan  4 23:54:32 host sshd[32563]: Received disconnect from 97.74.95.243 port 47930:11: Bye Bye [preauth]
Jan  4 23:54:32 host sshd[32563]: Disconnected from 97.74.95.243 port 47930 [preauth]
Jan  4 23:56:57 host sshd[479]: Invalid user user1 from 41.197.31.178 port 43562
Jan  4 23:56:57 host sshd[479]: input_userauth_request: invalid user user1 [preauth]
Jan  4 23:56:58 host sshd[479]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 23:56:58 host sshd[479]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178
Jan  4 23:57:00 host sshd[479]: Failed password for invalid user user1 from 41.197.31.178 port 43562 ssh2
Jan  4 23:57:00 host sshd[479]: Connection closed by 41.197.31.178 port 43562 [preauth]
Jan  4 23:57:53 host sshd[587]: User root from 213.108.128.68 not allowed because not listed in AllowUsers
Jan  4 23:57:53 host sshd[587]: input_userauth_request: invalid user root [preauth]
Jan  4 23:57:53 host unix_chkpwd[590]: password check failed for user (root)
Jan  4 23:57:53 host sshd[587]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.108.128.68  user=root
Jan  4 23:57:53 host sshd[587]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 23:57:55 host sshd[587]: Failed password for invalid user root from 213.108.128.68 port 60074 ssh2
Jan  4 23:57:55 host sshd[587]: Received disconnect from 213.108.128.68 port 60074:11: Bye Bye [preauth]
Jan  4 23:57:55 host sshd[587]: Disconnected from 213.108.128.68 port 60074 [preauth]
Jan  4 23:58:17 host sshd[668]: User root from 161.35.211.137 not allowed because not listed in AllowUsers
Jan  4 23:58:17 host sshd[668]: input_userauth_request: invalid user root [preauth]
Jan  4 23:58:17 host unix_chkpwd[671]: password check failed for user (root)
Jan  4 23:58:17 host sshd[668]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.211.137  user=root
Jan  4 23:58:17 host sshd[668]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  4 23:58:19 host sshd[668]: Failed password for invalid user root from 161.35.211.137 port 53666 ssh2
Jan  4 23:58:19 host sshd[668]: Received disconnect from 161.35.211.137 port 53666:11: Bye Bye [preauth]
Jan  4 23:58:19 host sshd[668]: Disconnected from 161.35.211.137 port 53666 [preauth]
Jan  4 23:58:27 host sshd[701]: Invalid user furukawa from 157.245.137.143 port 42258
Jan  4 23:58:27 host sshd[701]: input_userauth_request: invalid user furukawa [preauth]
Jan  4 23:58:27 host sshd[701]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 23:58:27 host sshd[701]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.137.143
Jan  4 23:58:29 host sshd[701]: Failed password for invalid user furukawa from 157.245.137.143 port 42258 ssh2
Jan  4 23:58:29 host sshd[701]: Received disconnect from 157.245.137.143 port 42258:11: Bye Bye [preauth]
Jan  4 23:58:29 host sshd[701]: Disconnected from 157.245.137.143 port 42258 [preauth]
Jan  4 23:59:46 host sshd[851]: Invalid user admin from 195.226.194.242 port 45574
Jan  4 23:59:46 host sshd[851]: input_userauth_request: invalid user admin [preauth]
Jan  4 23:59:47 host sshd[851]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 23:59:47 host sshd[851]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.242
Jan  4 23:59:49 host sshd[851]: Failed password for invalid user admin from 195.226.194.242 port 45574 ssh2
Jan  4 23:59:49 host sshd[851]: Received disconnect from 195.226.194.242 port 45574:11: Bye Bye [preauth]
Jan  4 23:59:49 host sshd[851]: Disconnected from 195.226.194.242 port 45574 [preauth]
Jan  4 23:59:53 host sshd[859]: Invalid user sispac from 161.35.211.137 port 40766
Jan  4 23:59:53 host sshd[859]: input_userauth_request: invalid user sispac [preauth]
Jan  4 23:59:53 host sshd[859]: pam_unix(sshd:auth): check pass; user unknown
Jan  4 23:59:53 host sshd[859]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.211.137
Jan  4 23:59:55 host sshd[859]: Failed password for invalid user sispac from 161.35.211.137 port 40766 ssh2
Jan  4 23:59:55 host sshd[859]: Received disconnect from 161.35.211.137 port 40766:11: Bye Bye [preauth]
Jan  4 23:59:55 host sshd[859]: Disconnected from 161.35.211.137 port 40766 [preauth]
Jan  5 00:00:21 host sshd[1006]: Invalid user test2 from 157.245.137.143 port 34626
Jan  5 00:00:21 host sshd[1006]: input_userauth_request: invalid user test2 [preauth]
Jan  5 00:00:21 host sshd[1006]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 00:00:21 host sshd[1006]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.137.143
Jan  5 00:00:23 host sshd[1006]: Failed password for invalid user test2 from 157.245.137.143 port 34626 ssh2
Jan  5 00:00:23 host sshd[1006]: Received disconnect from 157.245.137.143 port 34626:11: Bye Bye [preauth]
Jan  5 00:00:23 host sshd[1006]: Disconnected from 157.245.137.143 port 34626 [preauth]
Jan  5 00:00:23 host sshd[1011]: User root from 97.74.95.243 not allowed because not listed in AllowUsers
Jan  5 00:00:23 host sshd[1011]: input_userauth_request: invalid user root [preauth]
Jan  5 00:00:23 host unix_chkpwd[1013]: password check failed for user (root)
Jan  5 00:00:23 host sshd[1011]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=97.74.95.243  user=root
Jan  5 00:00:23 host sshd[1011]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 00:00:25 host sshd[1011]: Failed password for invalid user root from 97.74.95.243 port 46312 ssh2
Jan  5 00:00:25 host sshd[1011]: Received disconnect from 97.74.95.243 port 46312:11: Bye Bye [preauth]
Jan  5 00:00:25 host sshd[1011]: Disconnected from 97.74.95.243 port 46312 [preauth]
Jan  5 00:00:27 host sshd[1037]: Invalid user linux from 213.108.128.68 port 39218
Jan  5 00:00:27 host sshd[1037]: input_userauth_request: invalid user linux [preauth]
Jan  5 00:00:27 host sshd[1037]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 00:00:27 host sshd[1037]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.108.128.68
Jan  5 00:00:29 host sshd[1037]: Failed password for invalid user linux from 213.108.128.68 port 39218 ssh2
Jan  5 00:00:29 host sshd[1037]: Received disconnect from 213.108.128.68 port 39218:11: Bye Bye [preauth]
Jan  5 00:00:29 host sshd[1037]: Disconnected from 213.108.128.68 port 39218 [preauth]
Jan  5 00:00:46 host sshd[1057]: Invalid user linux from 190.128.239.54 port 35636
Jan  5 00:00:46 host sshd[1057]: input_userauth_request: invalid user linux [preauth]
Jan  5 00:00:46 host sshd[1057]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 00:00:46 host sshd[1057]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.128.239.54
Jan  5 00:00:48 host sshd[1057]: Failed password for invalid user linux from 190.128.239.54 port 35636 ssh2
Jan  5 00:00:48 host sshd[1057]: Received disconnect from 190.128.239.54 port 35636:11: Bye Bye [preauth]
Jan  5 00:00:48 host sshd[1057]: Disconnected from 190.128.239.54 port 35636 [preauth]
Jan  5 00:01:06 host sshd[1121]: User root from 177.103.177.24 not allowed because not listed in AllowUsers
Jan  5 00:01:06 host sshd[1121]: input_userauth_request: invalid user root [preauth]
Jan  5 00:01:06 host unix_chkpwd[1182]: password check failed for user (root)
Jan  5 00:01:06 host sshd[1121]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.103.177.24  user=root
Jan  5 00:01:06 host sshd[1121]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 00:01:08 host sshd[1121]: Failed password for invalid user root from 177.103.177.24 port 49360 ssh2
Jan  5 00:01:08 host sshd[1121]: Received disconnect from 177.103.177.24 port 49360:11: Bye Bye [preauth]
Jan  5 00:01:08 host sshd[1121]: Disconnected from 177.103.177.24 port 49360 [preauth]
Jan  5 00:01:30 host sshd[1277]: Invalid user mm from 157.245.137.143 port 40848
Jan  5 00:01:30 host sshd[1277]: input_userauth_request: invalid user mm [preauth]
Jan  5 00:01:30 host sshd[1277]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 00:01:30 host sshd[1277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.137.143
Jan  5 00:01:33 host sshd[1277]: Failed password for invalid user mm from 157.245.137.143 port 40848 ssh2
Jan  5 00:01:33 host sshd[1277]: Received disconnect from 157.245.137.143 port 40848:11: Bye Bye [preauth]
Jan  5 00:01:33 host sshd[1277]: Disconnected from 157.245.137.143 port 40848 [preauth]
Jan  5 00:01:43 host sshd[1298]: Invalid user odoo11 from 97.74.95.243 port 42640
Jan  5 00:01:43 host sshd[1298]: input_userauth_request: invalid user odoo11 [preauth]
Jan  5 00:01:43 host sshd[1298]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 00:01:43 host sshd[1298]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=97.74.95.243
Jan  5 00:01:44 host sshd[1301]: Invalid user nelson from 213.108.128.68 port 38460
Jan  5 00:01:44 host sshd[1301]: input_userauth_request: invalid user nelson [preauth]
Jan  5 00:01:44 host sshd[1301]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 00:01:44 host sshd[1301]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.108.128.68
Jan  5 00:01:45 host sshd[1298]: Failed password for invalid user odoo11 from 97.74.95.243 port 42640 ssh2
Jan  5 00:01:45 host sshd[1298]: Received disconnect from 97.74.95.243 port 42640:11: Bye Bye [preauth]
Jan  5 00:01:45 host sshd[1298]: Disconnected from 97.74.95.243 port 42640 [preauth]
Jan  5 00:01:45 host sshd[1301]: Failed password for invalid user nelson from 213.108.128.68 port 38460 ssh2
Jan  5 00:01:45 host sshd[1301]: Received disconnect from 213.108.128.68 port 38460:11: Bye Bye [preauth]
Jan  5 00:01:45 host sshd[1301]: Disconnected from 213.108.128.68 port 38460 [preauth]
Jan  5 00:02:13 host sshd[1400]: Invalid user oracle from 190.128.239.54 port 58926
Jan  5 00:02:13 host sshd[1400]: input_userauth_request: invalid user oracle [preauth]
Jan  5 00:02:13 host sshd[1400]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 00:02:13 host sshd[1400]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.128.239.54
Jan  5 00:02:16 host sshd[1400]: Failed password for invalid user oracle from 190.128.239.54 port 58926 ssh2
Jan  5 00:02:16 host sshd[1400]: Received disconnect from 190.128.239.54 port 58926:11: Bye Bye [preauth]
Jan  5 00:02:16 host sshd[1400]: Disconnected from 190.128.239.54 port 58926 [preauth]
Jan  5 00:02:36 host sshd[1453]: Invalid user sispac from 157.245.137.143 port 55386
Jan  5 00:02:36 host sshd[1453]: input_userauth_request: invalid user sispac [preauth]
Jan  5 00:02:36 host sshd[1453]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 00:02:36 host sshd[1453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.137.143
Jan  5 00:02:38 host sshd[1453]: Failed password for invalid user sispac from 157.245.137.143 port 55386 ssh2
Jan  5 00:02:59 host sshd[1508]: Invalid user test1 from 213.108.128.68 port 37700
Jan  5 00:02:59 host sshd[1508]: input_userauth_request: invalid user test1 [preauth]
Jan  5 00:02:59 host sshd[1508]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 00:02:59 host sshd[1508]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.108.128.68
Jan  5 00:03:02 host sshd[1508]: Failed password for invalid user test1 from 213.108.128.68 port 37700 ssh2
Jan  5 00:03:02 host sshd[1508]: Received disconnect from 213.108.128.68 port 37700:11: Bye Bye [preauth]
Jan  5 00:03:02 host sshd[1508]: Disconnected from 213.108.128.68 port 37700 [preauth]
Jan  5 00:03:37 host sshd[1616]: User root from 190.128.239.54 not allowed because not listed in AllowUsers
Jan  5 00:03:37 host sshd[1616]: input_userauth_request: invalid user root [preauth]
Jan  5 00:03:37 host unix_chkpwd[1619]: password check failed for user (root)
Jan  5 00:03:37 host sshd[1616]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.128.239.54  user=root
Jan  5 00:03:37 host sshd[1616]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 00:03:39 host sshd[1616]: Failed password for invalid user root from 190.128.239.54 port 54022 ssh2
Jan  5 00:09:45 host sshd[2480]: Invalid user user1 from 92.46.108.20 port 48546
Jan  5 00:09:45 host sshd[2480]: input_userauth_request: invalid user user1 [preauth]
Jan  5 00:09:46 host sshd[2480]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 00:09:46 host sshd[2480]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20
Jan  5 00:09:48 host sshd[2480]: Failed password for invalid user user1 from 92.46.108.20 port 48546 ssh2
Jan  5 00:09:49 host sshd[2480]: Connection closed by 92.46.108.20 port 48546 [preauth]
Jan  5 00:11:48 host sshd[2739]: Invalid user tmax from 177.103.177.24 port 33926
Jan  5 00:11:48 host sshd[2739]: input_userauth_request: invalid user tmax [preauth]
Jan  5 00:11:48 host sshd[2739]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 00:11:48 host sshd[2739]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.103.177.24
Jan  5 00:11:51 host sshd[2739]: Failed password for invalid user tmax from 177.103.177.24 port 33926 ssh2
Jan  5 00:11:51 host sshd[2739]: Received disconnect from 177.103.177.24 port 33926:11: Bye Bye [preauth]
Jan  5 00:11:51 host sshd[2739]: Disconnected from 177.103.177.24 port 33926 [preauth]
Jan  5 00:12:11 host sshd[2914]: Connection closed by 66.175.213.4 port 53670 [preauth]
Jan  5 00:12:13 host sshd[2917]: Connection closed by 66.175.213.4 port 53686 [preauth]
Jan  5 00:12:15 host sshd[2920]: Connection closed by 66.175.213.4 port 53694 [preauth]
Jan  5 00:15:49 host sshd[4131]: Invalid user y from 208.109.38.20 port 59602
Jan  5 00:15:49 host sshd[4131]: input_userauth_request: invalid user y [preauth]
Jan  5 00:15:49 host sshd[4131]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 00:15:49 host sshd[4131]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=208.109.38.20
Jan  5 00:15:51 host sshd[4131]: Failed password for invalid user y from 208.109.38.20 port 59602 ssh2
Jan  5 00:15:52 host sshd[4131]: Received disconnect from 208.109.38.20 port 59602:11: Bye Bye [preauth]
Jan  5 00:15:52 host sshd[4131]: Disconnected from 208.109.38.20 port 59602 [preauth]
Jan  5 00:17:45 host sshd[4494]: User root from 212.129.63.165 not allowed because not listed in AllowUsers
Jan  5 00:17:45 host sshd[4494]: input_userauth_request: invalid user root [preauth]
Jan  5 00:17:46 host unix_chkpwd[4497]: password check failed for user (root)
Jan  5 00:17:46 host sshd[4494]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.129.63.165  user=root
Jan  5 00:17:46 host sshd[4494]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 00:17:47 host sshd[4494]: Failed password for invalid user root from 212.129.63.165 port 40624 ssh2
Jan  5 00:17:48 host sshd[4494]: Received disconnect from 212.129.63.165 port 40624:11: Bye Bye [preauth]
Jan  5 00:17:48 host sshd[4494]: Disconnected from 212.129.63.165 port 40624 [preauth]
Jan  5 00:18:42 host sshd[4597]: Invalid user praveen from 202.137.26.5 port 39374
Jan  5 00:18:42 host sshd[4597]: input_userauth_request: invalid user praveen [preauth]
Jan  5 00:18:42 host sshd[4597]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 00:18:42 host sshd[4597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.137.26.5
Jan  5 00:18:44 host sshd[4597]: Failed password for invalid user praveen from 202.137.26.5 port 39374 ssh2
Jan  5 00:18:44 host sshd[4597]: Received disconnect from 202.137.26.5 port 39374:11: Bye Bye [preauth]
Jan  5 00:18:44 host sshd[4597]: Disconnected from 202.137.26.5 port 39374 [preauth]
Jan  5 00:19:29 host sshd[4692]: Invalid user els from 195.19.96.101 port 45264
Jan  5 00:19:29 host sshd[4692]: input_userauth_request: invalid user els [preauth]
Jan  5 00:19:29 host sshd[4692]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 00:19:29 host sshd[4692]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.19.96.101
Jan  5 00:19:31 host sshd[4692]: Failed password for invalid user els from 195.19.96.101 port 45264 ssh2
Jan  5 00:19:32 host sshd[4692]: Received disconnect from 195.19.96.101 port 45264:11: Bye Bye [preauth]
Jan  5 00:19:32 host sshd[4692]: Disconnected from 195.19.96.101 port 45264 [preauth]
Jan  5 00:20:39 host sshd[4942]: Invalid user ubuntu from 45.191.91.61 port 35554
Jan  5 00:20:39 host sshd[4942]: input_userauth_request: invalid user ubuntu [preauth]
Jan  5 00:20:39 host sshd[4942]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 00:20:39 host sshd[4942]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.191.91.61
Jan  5 00:20:41 host sshd[4942]: Failed password for invalid user ubuntu from 45.191.91.61 port 35554 ssh2
Jan  5 00:20:41 host sshd[4942]: Received disconnect from 45.191.91.61 port 35554:11: Bye Bye [preauth]
Jan  5 00:20:41 host sshd[4942]: Disconnected from 45.191.91.61 port 35554 [preauth]
Jan  5 00:21:03 host sshd[4989]: User root from 103.72.6.149 not allowed because not listed in AllowUsers
Jan  5 00:21:03 host sshd[4989]: input_userauth_request: invalid user root [preauth]
Jan  5 00:21:03 host unix_chkpwd[4992]: password check failed for user (root)
Jan  5 00:21:03 host sshd[4989]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.72.6.149  user=root
Jan  5 00:21:03 host sshd[4989]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 00:21:05 host sshd[4989]: Failed password for invalid user root from 103.72.6.149 port 57136 ssh2
Jan  5 00:21:05 host sshd[4989]: Received disconnect from 103.72.6.149 port 57136:11: Bye Bye [preauth]
Jan  5 00:21:05 host sshd[4989]: Disconnected from 103.72.6.149 port 57136 [preauth]
Jan  5 00:21:09 host sshd[5004]: User root from 208.109.38.20 not allowed because not listed in AllowUsers
Jan  5 00:21:09 host sshd[5004]: input_userauth_request: invalid user root [preauth]
Jan  5 00:21:09 host unix_chkpwd[5008]: password check failed for user (root)
Jan  5 00:21:09 host sshd[5004]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=208.109.38.20  user=root
Jan  5 00:21:09 host sshd[5004]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 00:21:10 host sshd[5004]: Failed password for invalid user root from 208.109.38.20 port 45596 ssh2
Jan  5 00:21:11 host sshd[5004]: Received disconnect from 208.109.38.20 port 45596:11: Bye Bye [preauth]
Jan  5 00:21:11 host sshd[5004]: Disconnected from 208.109.38.20 port 45596 [preauth]
Jan  5 00:21:22 host sshd[5058]: Invalid user user from 175.126.232.120 port 44194
Jan  5 00:21:22 host sshd[5058]: input_userauth_request: invalid user user [preauth]
Jan  5 00:21:22 host sshd[5058]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 00:21:22 host sshd[5058]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.126.232.120
Jan  5 00:21:24 host sshd[5058]: Failed password for invalid user user from 175.126.232.120 port 44194 ssh2
Jan  5 00:21:24 host sshd[5058]: Received disconnect from 175.126.232.120 port 44194:11: Bye Bye [preauth]
Jan  5 00:21:24 host sshd[5058]: Disconnected from 175.126.232.120 port 44194 [preauth]
Jan  5 00:21:39 host sshd[5110]: User root from 194.180.176.198 not allowed because not listed in AllowUsers
Jan  5 00:21:39 host sshd[5110]: input_userauth_request: invalid user root [preauth]
Jan  5 00:21:39 host unix_chkpwd[5116]: password check failed for user (root)
Jan  5 00:21:39 host sshd[5110]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.180.176.198  user=root
Jan  5 00:21:39 host sshd[5110]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 00:21:41 host sshd[5110]: Failed password for invalid user root from 194.180.176.198 port 60984 ssh2
Jan  5 00:21:41 host sshd[5110]: Received disconnect from 194.180.176.198 port 60984:11: Bye Bye [preauth]
Jan  5 00:21:41 host sshd[5110]: Disconnected from 194.180.176.198 port 60984 [preauth]
Jan  5 00:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  5 00:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 00:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 00:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  5 00:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 00:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 00:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  5 00:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 00:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 00:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  5 00:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 00:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 00:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  5 00:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 00:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 00:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  5 00:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 00:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 00:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  5 00:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 00:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 00:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  5 00:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 00:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 00:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  5 00:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 00:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 00:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  5 00:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 00:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 00:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  5 00:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 00:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 00:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  5 00:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 00:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 00:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  5 00:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 00:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 00:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=vfmassets user-2=shalinijames user-3=wwwtestugo user-4=pmcresources user-5=disposeat user-6=wwwkmaorg user-7=remysagr user-8=wwwkapin user-9=woodpeck user-10=palco123 user-11=gifterman user-12=phmetals user-13=kottayamcalldriv user-14=mrsclean user-15=wwwnexidigital user-16=bonifacegroup user-17=wwwevmhonda user-18=wwwletsstalkfood user-19=straightcurve user-20=a2zgroup user-21=dartsimp user-22=laundryboniface user-23=cochintaxi user-24=wwwkaretakers user-25=travelboniface user-26=keralaholi user-27=wwwresourcehunte user-28=wwwrmswll user-29=ugotscom user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  5 00:21:52 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  5 00:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 00:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 00:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  5 00:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 00:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 00:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-KMGsedmynW63ZZsX.~
Jan  5 00:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 00:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 00:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-KMGsedmynW63ZZsX.~'
Jan  5 00:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 00:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 00:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-KMGsedmynW63ZZsX.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  5 00:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 00:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 00:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  5 00:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 00:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 00:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  5 00:21:53 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 00:21:53 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 00:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  5 00:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 00:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 00:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  5 00:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 00:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 00:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  5 00:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 00:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 00:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  5 00:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 00:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 00:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  5 00:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 00:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 00:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  5 00:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  5 00:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  5 00:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  5 00:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  5 00:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  5 00:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  5 00:22:05 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  5 00:22:12 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  5 00:22:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  5 00:22:12 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 00:22:15 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 00:22:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  5 00:22:15 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 00:22:15 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 00:22:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  5 00:22:15 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 00:22:17 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 00:22:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  5 00:22:18 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 00:22:19 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 00:22:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  5 00:22:19 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 00:22:20 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 00:22:22 host sshd[5395]: Invalid user tom from 103.112.54.22 port 46338
Jan  5 00:22:22 host sshd[5395]: input_userauth_request: invalid user tom [preauth]
Jan  5 00:22:22 host sshd[5395]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 00:22:22 host sshd[5395]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.112.54.22
Jan  5 00:22:24 host sshd[5395]: Failed password for invalid user tom from 103.112.54.22 port 46338 ssh2
Jan  5 00:22:24 host sshd[5395]: Received disconnect from 103.112.54.22 port 46338:11: Bye Bye [preauth]
Jan  5 00:22:24 host sshd[5395]: Disconnected from 103.112.54.22 port 46338 [preauth]
Jan  5 00:22:29 host sshd[5442]: Invalid user helen from 103.119.254.134 port 51546
Jan  5 00:22:29 host sshd[5442]: input_userauth_request: invalid user helen [preauth]
Jan  5 00:22:29 host sshd[5442]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 00:22:29 host sshd[5442]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.119.254.134
Jan  5 00:22:31 host sshd[5442]: Failed password for invalid user helen from 103.119.254.134 port 51546 ssh2
Jan  5 00:22:31 host sshd[5442]: Received disconnect from 103.119.254.134 port 51546:11: Bye Bye [preauth]
Jan  5 00:22:31 host sshd[5442]: Disconnected from 103.119.254.134 port 51546 [preauth]
Jan  5 00:22:34 host sshd[5451]: User root from 202.137.26.5 not allowed because not listed in AllowUsers
Jan  5 00:22:34 host sshd[5451]: input_userauth_request: invalid user root [preauth]
Jan  5 00:22:34 host unix_chkpwd[5453]: password check failed for user (root)
Jan  5 00:22:34 host sshd[5451]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.137.26.5  user=root
Jan  5 00:22:34 host sshd[5451]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 00:22:36 host sshd[5451]: Failed password for invalid user root from 202.137.26.5 port 50924 ssh2
Jan  5 00:22:36 host sshd[5451]: Received disconnect from 202.137.26.5 port 50924:11: Bye Bye [preauth]
Jan  5 00:22:36 host sshd[5451]: Disconnected from 202.137.26.5 port 50924 [preauth]
Jan  5 00:24:06 host sshd[5652]: Invalid user myftp from 101.32.206.243 port 39996
Jan  5 00:24:06 host sshd[5652]: input_userauth_request: invalid user myftp [preauth]
Jan  5 00:24:06 host sshd[5652]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 00:24:06 host sshd[5652]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.32.206.243
Jan  5 00:24:07 host sshd[5652]: Failed password for invalid user myftp from 101.32.206.243 port 39996 ssh2
Jan  5 00:24:07 host sshd[5652]: Received disconnect from 101.32.206.243 port 39996:11: Bye Bye [preauth]
Jan  5 00:24:07 host sshd[5652]: Disconnected from 101.32.206.243 port 39996 [preauth]
Jan  5 00:24:33 host sshd[5700]: User root from 212.129.63.165 not allowed because not listed in AllowUsers
Jan  5 00:24:33 host sshd[5700]: input_userauth_request: invalid user root [preauth]
Jan  5 00:24:33 host unix_chkpwd[5703]: password check failed for user (root)
Jan  5 00:24:33 host sshd[5700]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.129.63.165  user=root
Jan  5 00:24:33 host sshd[5700]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 00:24:35 host sshd[5700]: Failed password for invalid user root from 212.129.63.165 port 40742 ssh2
Jan  5 00:25:05 host sshd[5873]: User root from 175.126.176.18 not allowed because not listed in AllowUsers
Jan  5 00:25:05 host sshd[5873]: input_userauth_request: invalid user root [preauth]
Jan  5 00:25:05 host unix_chkpwd[5876]: password check failed for user (root)
Jan  5 00:25:05 host sshd[5873]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.126.176.18  user=root
Jan  5 00:25:05 host sshd[5873]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 00:25:08 host sshd[5873]: Failed password for invalid user root from 175.126.176.18 port 39346 ssh2
Jan  5 00:25:08 host sshd[5873]: Received disconnect from 175.126.176.18 port 39346:11: Bye Bye [preauth]
Jan  5 00:25:08 host sshd[5873]: Disconnected from 175.126.176.18 port 39346 [preauth]
Jan  5 00:25:17 host sshd[5943]: User root from 195.19.96.101 not allowed because not listed in AllowUsers
Jan  5 00:25:17 host sshd[5943]: input_userauth_request: invalid user root [preauth]
Jan  5 00:25:17 host unix_chkpwd[5946]: password check failed for user (root)
Jan  5 00:25:17 host sshd[5943]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.19.96.101  user=root
Jan  5 00:25:17 host sshd[5943]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 00:25:19 host sshd[5943]: Failed password for invalid user root from 195.19.96.101 port 48000 ssh2
Jan  5 00:25:19 host sshd[5943]: Received disconnect from 195.19.96.101 port 48000:11: Bye Bye [preauth]
Jan  5 00:25:19 host sshd[5943]: Disconnected from 195.19.96.101 port 48000 [preauth]
Jan  5 00:25:49 host sshd[6037]: User root from 20.74.238.71 not allowed because not listed in AllowUsers
Jan  5 00:25:49 host sshd[6037]: input_userauth_request: invalid user root [preauth]
Jan  5 00:25:49 host unix_chkpwd[6039]: password check failed for user (root)
Jan  5 00:25:49 host sshd[6037]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.74.238.71  user=root
Jan  5 00:25:49 host sshd[6037]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 00:25:51 host sshd[6037]: Failed password for invalid user root from 20.74.238.71 port 25280 ssh2
Jan  5 00:25:51 host sshd[6037]: Received disconnect from 20.74.238.71 port 25280:11: Bye Bye [preauth]
Jan  5 00:25:51 host sshd[6037]: Disconnected from 20.74.238.71 port 25280 [preauth]
Jan  5 00:26:23 host sshd[6096]: User root from 45.191.91.61 not allowed because not listed in AllowUsers
Jan  5 00:26:23 host sshd[6096]: input_userauth_request: invalid user root [preauth]
Jan  5 00:26:23 host unix_chkpwd[6102]: password check failed for user (root)
Jan  5 00:26:23 host sshd[6096]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.191.91.61  user=root
Jan  5 00:26:23 host sshd[6096]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 00:26:25 host sshd[6096]: Failed password for invalid user root from 45.191.91.61 port 60530 ssh2
Jan  5 00:26:26 host sshd[6096]: Received disconnect from 45.191.91.61 port 60530:11: Bye Bye [preauth]
Jan  5 00:26:26 host sshd[6096]: Disconnected from 45.191.91.61 port 60530 [preauth]
Jan  5 00:26:28 host sshd[6130]: Invalid user devops from 103.112.54.22 port 37822
Jan  5 00:26:28 host sshd[6130]: input_userauth_request: invalid user devops [preauth]
Jan  5 00:26:28 host sshd[6130]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 00:26:28 host sshd[6130]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.112.54.22
Jan  5 00:26:30 host sshd[6130]: Failed password for invalid user devops from 103.112.54.22 port 37822 ssh2
Jan  5 00:26:30 host sshd[6130]: Received disconnect from 103.112.54.22 port 37822:11: Bye Bye [preauth]
Jan  5 00:26:30 host sshd[6130]: Disconnected from 103.112.54.22 port 37822 [preauth]
Jan  5 00:26:33 host sshd[6173]: Invalid user user5 from 194.180.176.198 port 55608
Jan  5 00:26:33 host sshd[6173]: input_userauth_request: invalid user user5 [preauth]
Jan  5 00:26:33 host sshd[6173]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 00:26:33 host sshd[6173]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.180.176.198
Jan  5 00:26:35 host sshd[6173]: Failed password for invalid user user5 from 194.180.176.198 port 55608 ssh2
Jan  5 00:26:35 host sshd[6173]: Received disconnect from 194.180.176.198 port 55608:11: Bye Bye [preauth]
Jan  5 00:26:35 host sshd[6173]: Disconnected from 194.180.176.198 port 55608 [preauth]
Jan  5 00:26:38 host sshd[6182]: User root from 175.126.176.18 not allowed because not listed in AllowUsers
Jan  5 00:26:38 host sshd[6182]: input_userauth_request: invalid user root [preauth]
Jan  5 00:26:38 host unix_chkpwd[6185]: password check failed for user (root)
Jan  5 00:26:38 host sshd[6182]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.126.176.18  user=root
Jan  5 00:26:38 host sshd[6182]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 00:26:38 host sshd[6186]: Invalid user pzserver from 101.32.206.243 port 48278
Jan  5 00:26:38 host sshd[6186]: input_userauth_request: invalid user pzserver [preauth]
Jan  5 00:26:38 host sshd[6186]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 00:26:38 host sshd[6186]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.32.206.243
Jan  5 00:26:39 host sshd[6215]: User root from 175.126.232.120 not allowed because not listed in AllowUsers
Jan  5 00:26:39 host sshd[6215]: input_userauth_request: invalid user root [preauth]
Jan  5 00:26:39 host unix_chkpwd[6251]: password check failed for user (root)
Jan  5 00:26:39 host sshd[6215]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.126.232.120  user=root
Jan  5 00:26:39 host sshd[6215]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 00:26:40 host sshd[6182]: Failed password for invalid user root from 175.126.176.18 port 40110 ssh2
Jan  5 00:26:40 host sshd[6186]: Failed password for invalid user pzserver from 101.32.206.243 port 48278 ssh2
Jan  5 00:26:41 host sshd[6186]: Received disconnect from 101.32.206.243 port 48278:11: Bye Bye [preauth]
Jan  5 00:26:41 host sshd[6186]: Disconnected from 101.32.206.243 port 48278 [preauth]
Jan  5 00:26:41 host sshd[6215]: Failed password for invalid user root from 175.126.232.120 port 39186 ssh2
Jan  5 00:26:41 host sshd[6215]: Received disconnect from 175.126.232.120 port 39186:11: Bye Bye [preauth]
Jan  5 00:26:41 host sshd[6215]: Disconnected from 175.126.232.120 port 39186 [preauth]
Jan  5 00:26:52 host sshd[6295]: User root from 103.119.254.134 not allowed because not listed in AllowUsers
Jan  5 00:26:52 host sshd[6295]: input_userauth_request: invalid user root [preauth]
Jan  5 00:26:52 host unix_chkpwd[6298]: password check failed for user (root)
Jan  5 00:26:52 host sshd[6295]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.119.254.134  user=root
Jan  5 00:26:52 host sshd[6295]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 00:26:55 host sshd[6295]: Failed password for invalid user root from 103.119.254.134 port 39330 ssh2
Jan  5 00:26:55 host sshd[6295]: Received disconnect from 103.119.254.134 port 39330:11: Bye Bye [preauth]
Jan  5 00:26:55 host sshd[6295]: Disconnected from 103.119.254.134 port 39330 [preauth]
Jan  5 00:27:08 host sshd[6357]: Invalid user user5 from 103.72.6.149 port 47850
Jan  5 00:27:08 host sshd[6357]: input_userauth_request: invalid user user5 [preauth]
Jan  5 00:27:08 host sshd[6357]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 00:27:08 host sshd[6357]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.72.6.149
Jan  5 00:27:10 host sshd[6357]: Failed password for invalid user user5 from 103.72.6.149 port 47850 ssh2
Jan  5 00:27:10 host sshd[6357]: Received disconnect from 103.72.6.149 port 47850:11: Bye Bye [preauth]
Jan  5 00:27:10 host sshd[6357]: Disconnected from 103.72.6.149 port 47850 [preauth]
Jan  5 00:27:28 host sshd[6436]: User root from 20.74.238.71 not allowed because not listed in AllowUsers
Jan  5 00:27:28 host sshd[6436]: input_userauth_request: invalid user root [preauth]
Jan  5 00:27:28 host unix_chkpwd[6439]: password check failed for user (root)
Jan  5 00:27:28 host sshd[6436]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.74.238.71  user=root
Jan  5 00:27:28 host sshd[6436]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 00:27:30 host sshd[6436]: Failed password for invalid user root from 20.74.238.71 port 21260 ssh2
Jan  5 00:27:37 host sshd[6480]: Invalid user admin from 195.226.194.242 port 54048
Jan  5 00:27:37 host sshd[6480]: input_userauth_request: invalid user admin [preauth]
Jan  5 00:27:37 host sshd[6480]: Failed none for invalid user admin from 195.226.194.242 port 54048 ssh2
Jan  5 00:27:37 host sshd[6480]: Received disconnect from 195.226.194.242 port 54048:11: Bye Bye [preauth]
Jan  5 00:27:37 host sshd[6480]: Disconnected from 195.226.194.242 port 54048 [preauth]
Jan  5 00:28:01 host sshd[6508]: User root from 103.112.54.22 not allowed because not listed in AllowUsers
Jan  5 00:28:01 host sshd[6508]: input_userauth_request: invalid user root [preauth]
Jan  5 00:28:01 host unix_chkpwd[6510]: password check failed for user (root)
Jan  5 00:28:01 host sshd[6508]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.112.54.22  user=root
Jan  5 00:28:01 host sshd[6508]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 00:28:03 host sshd[6508]: Failed password for invalid user root from 103.112.54.22 port 38588 ssh2
Jan  5 00:28:03 host sshd[6508]: Received disconnect from 103.112.54.22 port 38588:11: Bye Bye [preauth]
Jan  5 00:28:03 host sshd[6508]: Disconnected from 103.112.54.22 port 38588 [preauth]
Jan  5 00:28:03 host sshd[6529]: Invalid user user from 101.32.206.243 port 48878
Jan  5 00:28:03 host sshd[6529]: input_userauth_request: invalid user user [preauth]
Jan  5 00:28:03 host sshd[6529]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 00:28:03 host sshd[6529]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.32.206.243
Jan  5 00:28:05 host sshd[6529]: Failed password for invalid user user from 101.32.206.243 port 48878 ssh2
Jan  5 00:30:48 host sshd[7010]: Did not receive identification string from 104.244.72.248 port 59034
Jan  5 00:31:06 host sshd[7053]: Did not receive identification string from 104.244.72.248 port 36682
Jan  5 00:32:54 host sshd[7235]: Did not receive identification string from 104.244.72.248 port 37994
Jan  5 00:34:04 host sshd[7369]: User root from 117.240.62.113 not allowed because not listed in AllowUsers
Jan  5 00:34:04 host sshd[7369]: input_userauth_request: invalid user root [preauth]
Jan  5 00:34:04 host unix_chkpwd[7376]: password check failed for user (root)
Jan  5 00:34:04 host sshd[7369]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.240.62.113  user=root
Jan  5 00:34:04 host sshd[7369]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 00:34:06 host sshd[7369]: Failed password for invalid user root from 117.240.62.113 port 48784 ssh2
Jan  5 00:34:06 host sshd[7369]: Received disconnect from 117.240.62.113 port 48784:11: Bye Bye [preauth]
Jan  5 00:34:06 host sshd[7369]: Disconnected from 117.240.62.113 port 48784 [preauth]
Jan  5 00:35:27 host sshd[7673]: Invalid user p from 117.240.62.113 port 45030
Jan  5 00:35:27 host sshd[7673]: input_userauth_request: invalid user p [preauth]
Jan  5 00:35:27 host sshd[7673]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 00:35:27 host sshd[7673]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.240.62.113
Jan  5 00:35:29 host sshd[7673]: Failed password for invalid user p from 117.240.62.113 port 45030 ssh2
Jan  5 00:35:29 host sshd[7673]: Received disconnect from 117.240.62.113 port 45030:11: Bye Bye [preauth]
Jan  5 00:35:29 host sshd[7673]: Disconnected from 117.240.62.113 port 45030 [preauth]
Jan  5 00:35:37 host sshd[7722]: Did not receive identification string from 104.244.72.248 port 53042
Jan  5 00:44:18 host sshd[8755]: Did not receive identification string from 43.142.186.34 port 39118
Jan  5 00:44:20 host sshd[8770]: Invalid user testuser from 43.142.186.34 port 40208
Jan  5 00:44:20 host sshd[8776]: Invalid user test from 43.142.186.34 port 40282
Jan  5 00:44:20 host sshd[8770]: input_userauth_request: invalid user testuser [preauth]
Jan  5 00:44:20 host sshd[8776]: input_userauth_request: invalid user test [preauth]
Jan  5 00:44:20 host sshd[8773]: Invalid user jenkins from 43.142.186.34 port 40242
Jan  5 00:44:20 host sshd[8773]: input_userauth_request: invalid user jenkins [preauth]
Jan  5 00:44:21 host sshd[8777]: Invalid user admin from 43.142.186.34 port 40246
Jan  5 00:44:21 host sshd[8777]: input_userauth_request: invalid user admin [preauth]
Jan  5 00:44:21 host sshd[8770]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 00:44:21 host sshd[8770]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.142.186.34
Jan  5 00:44:21 host sshd[8775]: Invalid user test from 43.142.186.34 port 40214
Jan  5 00:44:21 host sshd[8773]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 00:44:21 host sshd[8773]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.142.186.34
Jan  5 00:44:21 host sshd[8775]: input_userauth_request: invalid user test [preauth]
Jan  5 00:44:21 host sshd[8776]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 00:44:21 host sshd[8776]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.142.186.34
Jan  5 00:44:21 host sshd[8777]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 00:44:21 host sshd[8777]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.142.186.34
Jan  5 00:44:21 host sshd[8779]: Invalid user web from 43.142.186.34 port 40216
Jan  5 00:44:21 host sshd[8779]: input_userauth_request: invalid user web [preauth]
Jan  5 00:44:21 host sshd[8756]: Invalid user postgres from 43.142.186.34 port 40230
Jan  5 00:44:21 host sshd[8756]: input_userauth_request: invalid user postgres [preauth]
Jan  5 00:44:21 host sshd[8757]: Invalid user mcserver from 43.142.186.34 port 40244
Jan  5 00:44:21 host sshd[8757]: input_userauth_request: invalid user mcserver [preauth]
Jan  5 00:44:21 host sshd[8758]: Invalid user devops from 43.142.186.34 port 40266
Jan  5 00:44:21 host sshd[8758]: input_userauth_request: invalid user devops [preauth]
Jan  5 00:44:21 host sshd[8759]: Invalid user steam from 43.142.186.34 port 40206
Jan  5 00:44:21 host sshd[8759]: input_userauth_request: invalid user steam [preauth]
Jan  5 00:44:21 host sshd[8774]: Invalid user ftpuser from 43.142.186.34 port 40240
Jan  5 00:44:21 host sshd[8774]: input_userauth_request: invalid user ftpuser [preauth]
Jan  5 00:44:21 host sshd[8803]: Invalid user user from 43.142.186.34 port 40264
Jan  5 00:44:21 host sshd[8803]: input_userauth_request: invalid user user [preauth]
Jan  5 00:44:21 host sshd[8771]: Invalid user ec2-user from 43.142.186.34 port 40262
Jan  5 00:44:21 host sshd[8771]: input_userauth_request: invalid user ec2-user [preauth]
Jan  5 00:44:21 host sshd[8782]: Invalid user git from 43.142.186.34 port 40237
Jan  5 00:44:21 host sshd[8782]: input_userauth_request: invalid user git [preauth]
Jan  5 00:44:21 host sshd[8775]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 00:44:21 host sshd[8775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.142.186.34
Jan  5 00:44:21 host sshd[8756]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 00:44:21 host sshd[8756]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.142.186.34
Jan  5 00:44:21 host sshd[8757]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 00:44:21 host sshd[8757]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.142.186.34
Jan  5 00:44:21 host sshd[8758]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 00:44:21 host sshd[8758]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.142.186.34
Jan  5 00:44:21 host sshd[8762]: Invalid user hello from 43.142.186.34 port 40276
Jan  5 00:44:21 host sshd[8762]: input_userauth_request: invalid user hello [preauth]
Jan  5 00:44:21 host sshd[8759]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 00:44:21 host sshd[8759]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.142.186.34
Jan  5 00:44:21 host sshd[8774]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 00:44:21 host sshd[8774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.142.186.34
Jan  5 00:44:21 host sshd[8772]: Invalid user ftpuser from 43.142.186.34 port 40220
Jan  5 00:44:21 host sshd[8772]: input_userauth_request: invalid user ftpuser [preauth]
Jan  5 00:44:21 host sshd[8803]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 00:44:21 host sshd[8803]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.142.186.34
Jan  5 00:44:21 host sshd[8760]: Invalid user tester from 43.142.186.34 port 40226
Jan  5 00:44:21 host sshd[8760]: input_userauth_request: invalid user tester [preauth]
Jan  5 00:44:22 host sshd[8771]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 00:44:22 host sshd[8771]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.142.186.34
Jan  5 00:44:22 host sshd[8782]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 00:44:22 host sshd[8782]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.142.186.34
Jan  5 00:44:22 host sshd[8778]: Invalid user pi from 43.142.186.34 port 40284
Jan  5 00:44:22 host sshd[8778]: input_userauth_request: invalid user pi [preauth]
Jan  5 00:44:22 host sshd[8801]: Invalid user emqx from 43.142.186.34 port 40252
Jan  5 00:44:22 host sshd[8801]: input_userauth_request: invalid user emqx [preauth]
Jan  5 00:44:22 host sshd[8760]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 00:44:22 host sshd[8760]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.142.186.34
Jan  5 00:44:22 host sshd[8779]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 00:44:22 host sshd[8779]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.142.186.34
Jan  5 00:44:22 host sshd[8801]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 00:44:22 host sshd[8801]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.142.186.34
Jan  5 00:44:22 host sshd[8764]: Invalid user test from 43.142.186.34 port 40248
Jan  5 00:44:22 host sshd[8764]: input_userauth_request: invalid user test [preauth]
Jan  5 00:44:22 host sshd[8796]: Invalid user linaro from 43.142.186.34 port 40268
Jan  5 00:44:22 host sshd[8796]: input_userauth_request: invalid user linaro [preauth]
Jan  5 00:44:22 host sshd[8797]: Invalid user odoo15 from 43.142.186.34 port 40250
Jan  5 00:44:22 host sshd[8797]: input_userauth_request: invalid user odoo15 [preauth]
Jan  5 00:44:23 host sshd[8762]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 00:44:23 host sshd[8762]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.142.186.34
Jan  5 00:44:23 host sshd[8770]: Failed password for invalid user testuser from 43.142.186.34 port 40208 ssh2
Jan  5 00:44:23 host sshd[8773]: Failed password for invalid user jenkins from 43.142.186.34 port 40242 ssh2
Jan  5 00:44:23 host sshd[8776]: Failed password for invalid user test from 43.142.186.34 port 40282 ssh2
Jan  5 00:44:23 host sshd[8777]: Failed password for invalid user admin from 43.142.186.34 port 40246 ssh2
Jan  5 00:44:23 host sshd[8809]: Invalid user q from 43.142.186.34 port 40210
Jan  5 00:44:23 host sshd[8809]: input_userauth_request: invalid user q [preauth]
Jan  5 00:44:23 host sshd[8764]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 00:44:23 host sshd[8764]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.142.186.34
Jan  5 00:44:23 host sshd[8761]: Invalid user guest from 43.142.186.34 port 40278
Jan  5 00:44:23 host sshd[8761]: input_userauth_request: invalid user guest [preauth]
Jan  5 00:44:23 host sshd[8796]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 00:44:23 host sshd[8796]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.142.186.34
Jan  5 00:44:23 host sshd[8775]: Failed password for invalid user test from 43.142.186.34 port 40214 ssh2
Jan  5 00:44:23 host sshd[8777]: Connection closed by 43.142.186.34 port 40246 [preauth]
Jan  5 00:44:23 host sshd[8756]: Failed password for invalid user postgres from 43.142.186.34 port 40230 ssh2
Jan  5 00:44:23 host sshd[8757]: Failed password for invalid user mcserver from 43.142.186.34 port 40244 ssh2
Jan  5 00:44:23 host sshd[8758]: Failed password for invalid user devops from 43.142.186.34 port 40266 ssh2
Jan  5 00:44:23 host sshd[8759]: Failed password for invalid user steam from 43.142.186.34 port 40206 ssh2
Jan  5 00:44:23 host sshd[8774]: Failed password for invalid user ftpuser from 43.142.186.34 port 40240 ssh2
Jan  5 00:44:23 host sshd[8803]: Failed password for invalid user user from 43.142.186.34 port 40264 ssh2
Jan  5 00:44:23 host sshd[8809]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 00:44:23 host sshd[8809]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.142.186.34
Jan  5 00:44:23 host sshd[8761]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 00:44:23 host sshd[8761]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.142.186.34
Jan  5 00:44:23 host sshd[8768]: Invalid user bitrix from 43.142.186.34 port 40233
Jan  5 00:44:23 host sshd[8768]: input_userauth_request: invalid user bitrix [preauth]
Jan  5 00:44:23 host sshd[8775]: Connection closed by 43.142.186.34 port 40214 [preauth]
Jan  5 00:44:23 host sshd[8756]: Connection closed by 43.142.186.34 port 40230 [preauth]
Jan  5 00:44:23 host sshd[8757]: Connection closed by 43.142.186.34 port 40244 [preauth]
Jan  5 00:44:23 host sshd[8758]: Connection closed by 43.142.186.34 port 40266 [preauth]
Jan  5 00:44:23 host sshd[8772]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 00:44:23 host sshd[8772]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.142.186.34
Jan  5 00:44:23 host sshd[8795]: User ftp from 43.142.186.34 not allowed because not listed in AllowUsers
Jan  5 00:44:23 host sshd[8795]: input_userauth_request: invalid user ftp [preauth]
Jan  5 00:44:23 host sshd[8759]: Connection closed by 43.142.186.34 port 40206 [preauth]
Jan  5 00:44:23 host sshd[8774]: Connection closed by 43.142.186.34 port 40240 [preauth]
Jan  5 00:44:24 host sshd[8803]: Connection closed by 43.142.186.34 port 40264 [preauth]
Jan  5 00:44:24 host sshd[8768]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 00:44:24 host sshd[8768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.142.186.34
Jan  5 00:44:24 host sshd[8770]: Connection closed by 43.142.186.34 port 40208 [preauth]
Jan  5 00:44:24 host sshd[8778]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 00:44:24 host sshd[8778]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.142.186.34
Jan  5 00:44:24 host sshd[8773]: Connection closed by 43.142.186.34 port 40242 [preauth]
Jan  5 00:44:24 host sshd[8771]: Failed password for invalid user ec2-user from 43.142.186.34 port 40262 ssh2
Jan  5 00:44:24 host sshd[8776]: Connection closed by 43.142.186.34 port 40282 [preauth]
Jan  5 00:44:24 host sshd[8782]: Failed password for invalid user git from 43.142.186.34 port 40237 ssh2
Jan  5 00:44:24 host unix_chkpwd[8820]: password check failed for user (ftp)
Jan  5 00:44:24 host sshd[8795]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.142.186.34  user=ftp
Jan  5 00:44:24 host sshd[8795]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp"
Jan  5 00:44:24 host sshd[8760]: Failed password for invalid user tester from 43.142.186.34 port 40226 ssh2
Jan  5 00:44:24 host sshd[8782]: Connection closed by 43.142.186.34 port 40237 [preauth]
Jan  5 00:44:24 host sshd[8779]: Failed password for invalid user web from 43.142.186.34 port 40216 ssh2
Jan  5 00:44:24 host sshd[8801]: Failed password for invalid user emqx from 43.142.186.34 port 40252 ssh2
Jan  5 00:44:24 host sshd[8760]: Connection closed by 43.142.186.34 port 40226 [preauth]
Jan  5 00:44:24 host sshd[8797]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 00:44:24 host sshd[8797]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.142.186.34
Jan  5 00:44:24 host sshd[8765]: Invalid user postgres from 43.142.186.34 port 40218
Jan  5 00:44:24 host sshd[8765]: input_userauth_request: invalid user postgres [preauth]
Jan  5 00:44:25 host sshd[8779]: Connection closed by 43.142.186.34 port 40216 [preauth]
Jan  5 00:44:25 host sshd[8801]: Connection closed by 43.142.186.34 port 40252 [preauth]
Jan  5 00:44:25 host sshd[8762]: Failed password for invalid user hello from 43.142.186.34 port 40276 ssh2
Jan  5 00:44:25 host sshd[8764]: Failed password for invalid user test from 43.142.186.34 port 40248 ssh2
Jan  5 00:44:25 host sshd[8796]: Failed password for invalid user linaro from 43.142.186.34 port 40268 ssh2
Jan  5 00:44:25 host sshd[8809]: Failed password for invalid user q from 43.142.186.34 port 40210 ssh2
Jan  5 00:44:25 host sshd[8761]: Failed password for invalid user guest from 43.142.186.34 port 40278 ssh2
Jan  5 00:44:26 host sshd[8768]: Failed password for invalid user bitrix from 43.142.186.34 port 40233 ssh2
Jan  5 00:44:26 host sshd[8772]: Failed password for invalid user ftpuser from 43.142.186.34 port 40220 ssh2
Jan  5 00:44:26 host sshd[8778]: Failed password for invalid user pi from 43.142.186.34 port 40284 ssh2
Jan  5 00:44:26 host sshd[8795]: Failed password for invalid user ftp from 43.142.186.34 port 40274 ssh2
Jan  5 00:44:27 host sshd[8797]: Failed password for invalid user odoo15 from 43.142.186.34 port 40250 ssh2
Jan  5 00:49:00 host sshd[9529]: User root from 103.13.40.2 not allowed because not listed in AllowUsers
Jan  5 00:49:00 host sshd[9529]: input_userauth_request: invalid user root [preauth]
Jan  5 00:49:00 host unix_chkpwd[9531]: password check failed for user (root)
Jan  5 00:49:00 host sshd[9529]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2  user=root
Jan  5 00:49:00 host sshd[9529]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 00:49:02 host sshd[9529]: Failed password for invalid user root from 103.13.40.2 port 35030 ssh2
Jan  5 00:49:02 host sshd[9529]: Connection closed by 103.13.40.2 port 35030 [preauth]
Jan  5 00:58:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  5 00:58:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 00:58:06 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 01:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  5 01:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 01:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 01:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  5 01:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 01:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 01:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  5 01:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 01:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 01:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  5 01:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 01:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 01:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  5 01:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 01:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 01:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  5 01:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 01:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 01:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  5 01:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 01:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 01:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  5 01:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 01:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 01:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  5 01:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 01:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 01:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  5 01:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 01:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 01:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  5 01:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 01:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 01:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  5 01:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 01:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 01:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  5 01:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 01:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 01:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=a2zgroup user-2=dartsimp user-3=laundryboniface user-4=cochintaxi user-5=wwwkaretakers user-6=travelboniface user-7=keralaholi user-8=wwwresourcehunte user-9=wwwrmswll user-10=ugotscom user-11=wwwpmcresource user-12=vfmassets user-13=shalinijames user-14=wwwtestugo user-15=pmcresources user-16=remysagr user-17=disposeat user-18=wwwkmaorg user-19=wwwkapin user-20=woodpeck user-21=palco123 user-22=gifterman user-23=kottayamcalldriv user-24=phmetals user-25=wwwnexidigital user-26=mrsclean user-27=bonifacegroup user-28=wwwevmhonda user-29=straightcurve user-30=wwwletsstalkfood feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  5 01:21:53 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  5 01:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 01:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 01:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  5 01:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 01:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 01:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-GUYPrdzoJZ48SHA3.~
Jan  5 01:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 01:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 01:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-GUYPrdzoJZ48SHA3.~'
Jan  5 01:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 01:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 01:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-GUYPrdzoJZ48SHA3.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  5 01:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 01:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 01:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  5 01:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 01:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 01:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  5 01:21:54 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 01:21:54 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 01:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  5 01:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 01:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 01:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  5 01:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 01:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 01:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  5 01:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 01:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 01:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  5 01:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 01:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 01:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  5 01:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 01:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 01:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  5 01:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  5 01:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  5 01:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  5 01:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  5 01:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  5 01:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  5 01:21:58 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  5 01:22:00 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  5 01:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  5 01:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 01:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 01:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  5 01:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 01:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 01:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  5 01:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 01:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 01:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  5 01:22:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 01:22:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 01:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  5 01:22:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 01:22:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 01:24:42 host sshd[14531]: User root from 41.197.31.178 not allowed because not listed in AllowUsers
Jan  5 01:24:42 host sshd[14531]: input_userauth_request: invalid user root [preauth]
Jan  5 01:24:43 host unix_chkpwd[14535]: password check failed for user (root)
Jan  5 01:24:43 host sshd[14531]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178  user=root
Jan  5 01:24:43 host sshd[14531]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 01:24:45 host sshd[14531]: Failed password for invalid user root from 41.197.31.178 port 42454 ssh2
Jan  5 01:24:45 host sshd[14531]: Connection closed by 41.197.31.178 port 42454 [preauth]
Jan  5 01:26:06 host sshd[14719]: User root from 195.226.194.242 not allowed because not listed in AllowUsers
Jan  5 01:26:06 host sshd[14719]: input_userauth_request: invalid user root [preauth]
Jan  5 01:26:06 host unix_chkpwd[14727]: password check failed for user (root)
Jan  5 01:26:06 host sshd[14719]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.242  user=root
Jan  5 01:26:06 host sshd[14719]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 01:26:08 host sshd[14719]: Failed password for invalid user root from 195.226.194.242 port 38692 ssh2
Jan  5 01:26:08 host sshd[14719]: Received disconnect from 195.226.194.242 port 38692:11: Bye Bye [preauth]
Jan  5 01:26:08 host sshd[14719]: Disconnected from 195.226.194.242 port 38692 [preauth]
Jan  5 01:46:12 host sshd[17800]: Invalid user admin from 209.141.55.27 port 34528
Jan  5 01:46:12 host sshd[17800]: input_userauth_request: invalid user admin [preauth]
Jan  5 01:46:12 host sshd[17800]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 01:46:12 host sshd[17800]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.55.27
Jan  5 01:46:15 host sshd[17800]: Failed password for invalid user admin from 209.141.55.27 port 34528 ssh2
Jan  5 01:46:15 host sshd[17800]: Received disconnect from 209.141.55.27 port 34528:11: Normal Shutdown, Thank you for playing [preauth]
Jan  5 01:46:15 host sshd[17800]: Disconnected from 209.141.55.27 port 34528 [preauth]
Jan  5 01:58:33 host sshd[19592]: User root from 195.226.194.242 not allowed because not listed in AllowUsers
Jan  5 01:58:33 host sshd[19592]: input_userauth_request: invalid user root [preauth]
Jan  5 01:58:33 host unix_chkpwd[19595]: password check failed for user (root)
Jan  5 01:58:33 host sshd[19592]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.242  user=root
Jan  5 01:58:33 host sshd[19592]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 01:58:35 host sshd[19592]: Failed password for invalid user root from 195.226.194.242 port 62462 ssh2
Jan  5 01:58:35 host sshd[19592]: Received disconnect from 195.226.194.242 port 62462:11: Bye Bye [preauth]
Jan  5 01:58:35 host sshd[19592]: Disconnected from 195.226.194.242 port 62462 [preauth]
Jan  5 02:07:31 host sshd[21104]: Invalid user chenly from 103.13.40.2 port 47230
Jan  5 02:07:31 host sshd[21104]: input_userauth_request: invalid user chenly [preauth]
Jan  5 02:07:31 host sshd[21104]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 02:07:31 host sshd[21104]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2
Jan  5 02:07:33 host sshd[21104]: Failed password for invalid user chenly from 103.13.40.2 port 47230 ssh2
Jan  5 02:07:33 host sshd[21104]: Connection closed by 103.13.40.2 port 47230 [preauth]
Jan  5 02:16:36 host sshd[22471]: Connection closed by 107.170.250.18 port 33060 [preauth]
Jan  5 02:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  5 02:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  5 02:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  5 02:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  5 02:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  5 02:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  5 02:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  5 02:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  5 02:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  5 02:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  5 02:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  5 02:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  5 02:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  5 02:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=laundryboniface user-2=dartsimp user-3=a2zgroup user-4=wwwkaretakers user-5=cochintaxi user-6=ugotscom user-7=wwwrmswll user-8=keralaholi user-9=wwwresourcehunte user-10=travelboniface user-11=wwwpmcresource user-12=pmcresources user-13=wwwtestugo user-14=shalinijames user-15=vfmassets user-16=woodpeck user-17=wwwkapin user-18=disposeat user-19=wwwkmaorg user-20=remysagr user-21=mrsclean user-22=wwwnexidigital user-23=phmetals user-24=kottayamcalldriv user-25=gifterman user-26=palco123 user-27=wwwletsstalkfood user-28=straightcurve user-29=wwwevmhonda user-30=bonifacegroup feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  5 02:21:52 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  5 02:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  5 02:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-OCZKxkdyRUUMPyYP.~
Jan  5 02:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-OCZKxkdyRUUMPyYP.~'
Jan  5 02:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-OCZKxkdyRUUMPyYP.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  5 02:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  5 02:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  5 02:21:53 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 02:21:53 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 02:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  5 02:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  5 02:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  5 02:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  5 02:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  5 02:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  5 02:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  5 02:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  5 02:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  5 02:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  5 02:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  5 02:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  5 02:21:58 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  5 02:22:00 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  5 02:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  5 02:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  5 02:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  5 02:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  5 02:22:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 02:22:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 02:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  5 02:22:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 02:22:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 02:29:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  5 02:29:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:29:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:29:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  5 02:29:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:29:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:29:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  5 02:29:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:29:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:29:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  5 02:29:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:29:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:29:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  5 02:29:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:29:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:29:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=phmetals user-2=kottayamcalldriv user-3=palco123 user-4=gifterman user-5=mrsclean user-6=wwwnexidigital user-7=wwwevmhonda user-8=bonifacegroup user-9=straightcurve user-10=wwwletsstalkfood user-11=shalinijames user-12=wwwtestugo user-13=vfmassets user-14=pmcresources user-15=remysagr user-16=disposeat user-17=wwwkmaorg user-18=wwwkapin user-19=woodpeck user-20=travelboniface user-21=ugotscom user-22=keralaholi user-23=wwwresourcehunte user-24=wwwrmswll user-25=wwwpmcresource user-26=a2zgroup user-27=dartsimp user-28=laundryboniface user-29=wwwkaretakers user-30=cochintaxi feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  5 02:29:51 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  5 02:29:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:29:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:29:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwevmhonda --output=json
Jan  5 02:29:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:29:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:29:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color instance info --format=json --check-updates=true
Jan  5 02:29:51 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  5 02:29:54 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  5 02:29:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false
Jan  5 02:29:54 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  5 02:29:55 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  5 02:29:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false
Jan  5 02:29:56 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  5 02:29:58 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  5 02:29:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  5 02:29:58 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  5 02:29:58 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  5 02:29:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwevmhonda LangPHP php_get_vhost_versions --output=json
Jan  5 02:29:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:29:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:29:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 package_manager_get_package_info package-0=ea-php72 --output=json
Jan  5 02:29:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:29:59 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:29:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color instance login-url --skip-plugins=false --format=json
Jan  5 02:29:59 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  5 02:30:00 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  5 02:30:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwletsstalkfood --output=json
Jan  5 02:30:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:30:00 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:30:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color instance info --format=json --check-updates=true
Jan  5 02:30:00 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  5 02:30:07 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  5 02:30:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false
Jan  5 02:30:07 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  5 02:30:08 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  5 02:30:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false
Jan  5 02:30:08 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  5 02:30:13 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  5 02:30:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  5 02:30:14 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  5 02:30:14 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  5 02:30:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood LangPHP php_get_vhost_versions --output=json
Jan  5 02:30:14 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:30:14 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:30:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color instance login-url --skip-plugins=false --format=json
Jan  5 02:30:14 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  5 02:30:14 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  5 02:30:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood DomainInfo single_domain_data domain=letsstalkfood.com return_https_redirect_status=1 --output=json
Jan  5 02:30:14 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:30:15 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:30:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 fetch_vhost_ssl_components --output=json
Jan  5 02:30:15 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:30:15 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:30:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 fetch_ssl_vhosts --output=json
Jan  5 02:30:15 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:30:15 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:30:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood Mime list_redirects --output=json
Jan  5 02:30:15 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:30:15 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:30:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  5 02:30:15 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  5 02:30:17 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  5 02:30:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false
Jan  5 02:30:17 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  5 02:30:18 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  5 02:30:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  5 02:30:18 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  5 02:30:24 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  5 02:30:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false
Jan  5 02:30:24 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  5 02:30:29 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  5 02:30:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/public_html/wp-config.php
Jan  5 02:30:30 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  5 02:30:30 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  5 02:30:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  5 02:30:30 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  5 02:30:30 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  5 02:30:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/public_html/.maintenance
Jan  5 02:30:30 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  5 02:30:30 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  5 02:30:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color db-prefix get
Jan  5 02:30:30 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  5 02:30:30 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  5 02:30:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood DirectoryPrivacy is_directory_protected dir=/home/wwwletsstalkfood/public_html --output=json
Jan  5 02:30:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:30:31 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:30:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  5 02:30:31 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  5 02:30:31 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  5 02:30:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color wpt-cron event reschedule wp_version_check '+2 day'
Jan  5 02:30:31 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  5 02:30:32 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  5 02:30:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day'
Jan  5 02:30:32 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  5 02:30:32 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  5 02:30:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  5 02:30:32 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  5 02:30:33 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  5 02:30:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  5 02:30:33 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  5 02:30:33 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  5 02:30:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color admin-username is-secure
Jan  5 02:30:33 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  5 02:30:34 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  5 02:30:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  5 02:30:34 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  5 02:30:34 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  5 02:30:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/public_html/wp-config.php
Jan  5 02:30:34 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  5 02:30:34 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  5 02:30:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/stat -c %a /home/wwwletsstalkfood/public_html/wp-config.php
Jan  5 02:30:34 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  5 02:30:34 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  5 02:30:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color pingbacks is_disabled
Jan  5 02:30:34 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  5 02:30:35 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  5 02:30:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  5 02:30:35 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  5 02:30:35 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  5 02:30:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color security-keys are_keys_correct
Jan  5 02:30:35 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  5 02:30:35 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  5 02:30:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=mrsclean --output=json
Jan  5 02:30:35 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:30:36 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:30:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/backup && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/mrsclean/public_html/backup --no-color instance info --format=json --check-updates=true
Jan  5 02:30:36 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  5 02:30:36 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  5 02:30:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean DomainInfo single_domain_data domain=mrsclean.co.in return_https_redirect_status=1 --output=json
Jan  5 02:30:36 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:30:36 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:30:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean Mime list_redirects --output=json
Jan  5 02:30:36 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:30:36 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:30:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/public_html/backup/wp-includes/version.php
Jan  5 02:30:36 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  5 02:30:36 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  5 02:30:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/cat /home/mrsclean/public_html/backup/wp-includes/version.php
Jan  5 02:30:36 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  5 02:30:36 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  5 02:30:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  5 02:30:36 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  5 02:30:36 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  5 02:30:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean LangPHP php_get_vhost_versions --output=json
Jan  5 02:30:36 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:30:36 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:30:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  5 02:30:37 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 02:30:37 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 02:30:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/blog && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/mrsclean/public_html/blog --no-color instance info --format=json --check-updates=true
Jan  5 02:30:37 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  5 02:30:37 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  5 02:30:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/public_html/blog/wp-includes/version.php
Jan  5 02:30:37 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  5 02:30:37 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  5 02:30:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/cat /home/mrsclean/public_html/blog/wp-includes/version.php
Jan  5 02:30:37 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  5 02:30:37 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  5 02:30:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  5 02:30:37 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  5 02:30:37 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  5 02:30:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=shalinijames --output=json
Jan  5 02:30:37 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:30:37 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:30:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color instance info --format=json --check-updates=true
Jan  5 02:30:37 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  5 02:30:44 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  5 02:30:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option get auto_update_plugins --format=json
Jan  5 02:30:45 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  5 02:30:45 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  5 02:30:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option get auto_update_themes --format=json
Jan  5 02:30:45 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  5 02:30:45 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  5 02:30:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  5 02:30:45 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  5 02:30:45 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  5 02:30:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames LangPHP php_get_vhost_versions --output=json
Jan  5 02:30:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:30:46 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:30:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color instance login-url --skip-plugins=false --format=json
Jan  5 02:30:46 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  5 02:30:46 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  5 02:30:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames DomainInfo single_domain_data domain=shalinijames.com return_https_redirect_status=1 --output=json
Jan  5 02:30:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:30:46 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:30:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames Mime list_redirects --output=json
Jan  5 02:30:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:30:47 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:30:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  5 02:30:47 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  5 02:30:48 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  5 02:30:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option get auto_update_plugins --format=json
Jan  5 02:30:48 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  5 02:30:49 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  5 02:30:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  5 02:30:49 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  5 02:30:53 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  5 02:30:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option get auto_update_themes --format=json
Jan  5 02:30:53 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  5 02:30:54 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  5 02:30:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/public_html/wp-config.php
Jan  5 02:30:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  5 02:30:54 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  5 02:30:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  5 02:30:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  5 02:30:54 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  5 02:30:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/public_html/.maintenance
Jan  5 02:30:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  5 02:30:54 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  5 02:30:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color db-prefix get
Jan  5 02:30:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  5 02:30:55 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  5 02:30:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames DirectoryPrivacy is_directory_protected dir=/home/shalinijames/public_html --output=json
Jan  5 02:30:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:30:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:30:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  5 02:30:55 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  5 02:30:55 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  5 02:30:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color wpt-cron event reschedule wp_version_check '+2 day'
Jan  5 02:30:56 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  5 02:30:56 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  5 02:30:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day'
Jan  5 02:30:56 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  5 02:30:56 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  5 02:30:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  5 02:30:56 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  5 02:30:57 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  5 02:30:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  5 02:30:57 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  5 02:30:57 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  5 02:30:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color admin-username is-secure
Jan  5 02:30:57 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  5 02:30:58 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  5 02:30:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  5 02:30:58 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  5 02:30:58 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  5 02:30:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/public_html/wp-config.php
Jan  5 02:30:58 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  5 02:30:58 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  5 02:30:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/stat -c %a /home/shalinijames/public_html/wp-config.php
Jan  5 02:30:58 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  5 02:30:58 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  5 02:30:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color pingbacks is_disabled
Jan  5 02:30:58 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  5 02:30:59 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  5 02:30:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  5 02:30:59 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  5 02:30:59 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  5 02:30:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color security-keys are_keys_correct
Jan  5 02:30:59 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  5 02:30:59 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  5 02:30:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwtestugo --output=json
Jan  5 02:30:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:31:00 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:31:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color instance info --format=json --check-updates=true
Jan  5 02:31:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option get auto_update_plugins --format=json
Jan  5 02:31:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option get auto_update_themes --format=json
Jan  5 02:31:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  5 02:31:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo LangPHP php_get_vhost_versions --output=json
Jan  5 02:31:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:31:07 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:31:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color instance login-url --skip-plugins=false --format=json
Jan  5 02:31:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DomainInfo single_domain_data domain=testugo.in return_https_redirect_status=1 --output=json
Jan  5 02:31:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:31:08 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:31:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo Mime list_redirects --output=json
Jan  5 02:31:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:31:08 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:31:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  5 02:31:08 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option get auto_update_plugins --format=json
Jan  5 02:31:09 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  5 02:31:09 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:13 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option get auto_update_themes --format=json
Jan  5 02:31:13 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:13 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt1/wp-config.php
Jan  5 02:31:14 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:14 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  5 02:31:14 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:14 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt1/.maintenance
Jan  5 02:31:14 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:14 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color db-prefix get
Jan  5 02:31:14 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:14 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/tt1 --output=json
Jan  5 02:31:14 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:31:14 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:31:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  5 02:31:15 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:15 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color wpt-cron event reschedule wp_version_check '+2 day'
Jan  5 02:31:15 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:16 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day'
Jan  5 02:31:16 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:16 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  5 02:31:16 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:16 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  5 02:31:16 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:17 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color admin-username is-secure
Jan  5 02:31:17 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:17 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  5 02:31:17 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:18 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt1/wp-config.php
Jan  5 02:31:18 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:18 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/stat -c %a /home/wwwtestugo/public_html/tt1/wp-config.php
Jan  5 02:31:18 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:18 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color pingbacks is_disabled
Jan  5 02:31:18 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:18 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  5 02:31:18 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:19 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color security-keys are_keys_correct
Jan  5 02:31:19 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:19 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color instance info --format=json --check-updates=true
Jan  5 02:31:19 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:24 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option get auto_update_plugins --format=json
Jan  5 02:31:24 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:24 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option get auto_update_themes --format=json
Jan  5 02:31:24 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:24 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  5 02:31:24 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:24 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color instance login-url --skip-plugins=false --format=json
Jan  5 02:31:25 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:25 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  5 02:31:25 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:26 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option get auto_update_plugins --format=json
Jan  5 02:31:26 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:26 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  5 02:31:26 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:30 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option get auto_update_themes --format=json
Jan  5 02:31:30 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:30 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt/wp-config.php
Jan  5 02:31:30 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:30 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  5 02:31:30 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:31 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt/.maintenance
Jan  5 02:31:31 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:31 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color db-prefix get
Jan  5 02:31:31 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:31 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/tt --output=json
Jan  5 02:31:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:31:31 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:31:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  5 02:31:31 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:32 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color wpt-cron event reschedule wp_version_check '+2 day'
Jan  5 02:31:32 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:32 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day'
Jan  5 02:31:32 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:33 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  5 02:31:33 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:33 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  5 02:31:33 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:34 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color admin-username is-secure
Jan  5 02:31:34 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:34 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  5 02:31:34 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:34 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt/wp-config.php
Jan  5 02:31:34 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:34 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/stat -c %a /home/wwwtestugo/public_html/tt/wp-config.php
Jan  5 02:31:34 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:34 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color pingbacks is_disabled
Jan  5 02:31:34 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:35 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  5 02:31:35 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:35 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color security-keys are_keys_correct
Jan  5 02:31:35 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:36 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color instance info --format=json --check-updates=true
Jan  5 02:31:36 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:41 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option get auto_update_plugins --format=json
Jan  5 02:31:41 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:41 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option get auto_update_themes --format=json
Jan  5 02:31:42 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:42 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  5 02:31:42 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:42 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color instance login-url --skip-plugins=false --format=json
Jan  5 02:31:42 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:44 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  5 02:31:44 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:44 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option get auto_update_plugins --format=json
Jan  5 02:31:44 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:45 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  5 02:31:45 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:48 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option get auto_update_themes --format=json
Jan  5 02:31:49 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:49 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/HYPE/wp-config.php
Jan  5 02:31:49 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:49 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  5 02:31:49 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:49 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/HYPE/.maintenance
Jan  5 02:31:49 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:49 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color db-prefix get
Jan  5 02:31:49 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:50 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/HYPE --output=json
Jan  5 02:31:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:31:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:31:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  5 02:31:50 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:50 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color wpt-cron event reschedule wp_version_check '+2 day'
Jan  5 02:31:50 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:51 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day'
Jan  5 02:31:51 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:51 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  5 02:31:51 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:52 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  5 02:31:52 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:52 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color admin-username is-secure
Jan  5 02:31:52 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:52 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  5 02:31:52 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:53 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/HYPE/wp-config.php
Jan  5 02:31:53 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:53 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/stat -c %a /home/wwwtestugo/public_html/HYPE/wp-config.php
Jan  5 02:31:53 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:53 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color pingbacks is_disabled
Jan  5 02:31:53 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:53 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  5 02:31:53 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:54 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color security-keys are_keys_correct
Jan  5 02:31:54 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:31:54 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:31:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=ugotscom --output=json
Jan  5 02:31:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:31:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:31:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/boniface/blog && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/boniface/blog --no-color instance info --format=json --check-updates=true
Jan  5 02:31:54 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 02:31:55 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 02:31:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DomainInfo single_domain_data domain=ugotechnologies.com return_https_redirect_status=1 --output=json
Jan  5 02:31:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:31:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:31:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom Mime list_redirects --output=json
Jan  5 02:31:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:31:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:31:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/boniface/blog/wp-includes/version.php
Jan  5 02:31:55 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 02:31:55 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 02:31:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/public_html/boniface/blog/wp-includes/version.php
Jan  5 02:31:55 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 02:31:55 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 02:31:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  5 02:31:55 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 02:31:55 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 02:31:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom LangPHP php_get_vhost_versions --output=json
Jan  5 02:31:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:31:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:31:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color instance info --format=json --check-updates=true
Jan  5 02:31:55 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 02:32:18 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 02:32:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option get auto_update_plugins --format=json
Jan  5 02:32:18 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 02:32:18 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 02:32:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option get auto_update_themes --format=json
Jan  5 02:32:18 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 02:32:18 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 02:32:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  5 02:32:18 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 02:32:18 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 02:32:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color instance login-url --skip-plugins=false --format=json
Jan  5 02:32:19 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 02:32:19 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 02:32:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  5 02:32:19 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 02:32:23 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 02:32:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option get auto_update_plugins --format=json
Jan  5 02:32:23 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 02:32:23 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 02:32:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  5 02:32:23 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 02:33:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 02:33:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option get auto_update_themes --format=json
Jan  5 02:33:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 02:33:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 02:33:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/UGOCRM/ugo_blg/wp-config.php
Jan  5 02:33:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 02:33:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 02:33:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  5 02:33:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 02:33:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 02:33:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/UGOCRM/ugo_blg/.maintenance
Jan  5 02:33:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 02:33:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 02:33:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color db-prefix get
Jan  5 02:33:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 02:33:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 02:33:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DirectoryPrivacy is_directory_protected dir=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --output=json
Jan  5 02:33:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:33:08 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:33:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  5 02:33:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 02:33:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 02:33:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color wpt-cron event reschedule wp_version_check '+2 day'
Jan  5 02:33:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 02:33:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 02:33:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day'
Jan  5 02:33:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 02:33:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 02:33:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  5 02:33:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 02:33:10 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 02:33:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  5 02:33:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 02:33:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 02:33:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color admin-username is-secure
Jan  5 02:33:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 02:33:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 02:33:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  5 02:33:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 02:33:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 02:33:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/UGOCRM/ugo_blg/wp-config.php
Jan  5 02:33:12 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 02:33:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 02:33:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/stat -c %a /home/ugotscom/public_html/old/UGOCRM/ugo_blg/wp-config.php
Jan  5 02:33:12 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 02:33:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 02:33:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color pingbacks is_disabled
Jan  5 02:33:12 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 02:33:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 02:33:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  5 02:33:12 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 02:33:13 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 02:33:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color security-keys are_keys_correct
Jan  5 02:33:13 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 02:33:13 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 02:33:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color instance info --format=json --check-updates=true
Jan  5 02:33:13 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 02:33:27 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 02:33:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option get auto_update_plugins --format=json
Jan  5 02:33:27 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 02:33:27 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 02:33:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option get auto_update_themes --format=json
Jan  5 02:33:27 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 02:33:27 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 02:33:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  5 02:33:27 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 02:33:27 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 02:33:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color instance login-url --skip-plugins=false --format=json
Jan  5 02:33:27 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 02:33:28 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 02:33:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  5 02:33:28 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 02:33:30 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 02:33:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option get auto_update_plugins --format=json
Jan  5 02:33:30 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 02:33:30 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 02:33:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  5 02:33:30 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 02:33:31 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 02:33:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option get auto_update_themes --format=json
Jan  5 02:33:31 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 02:33:32 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 02:33:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/site/wp-config.php
Jan  5 02:33:32 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 02:33:32 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 02:33:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  5 02:33:32 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 02:33:32 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 02:33:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/site/.maintenance
Jan  5 02:33:32 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 02:33:32 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 02:33:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color db-prefix get
Jan  5 02:33:32 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 02:33:33 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 02:33:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DirectoryPrivacy is_directory_protected dir=/home/ugotscom/public_html/old/site --output=json
Jan  5 02:33:33 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:33:33 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:33:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  5 02:33:33 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 02:33:33 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 02:33:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color wpt-cron event reschedule wp_version_check '+2 day'
Jan  5 02:33:33 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 02:33:34 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 02:33:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day'
Jan  5 02:33:34 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 02:33:34 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 02:33:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  5 02:33:34 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 02:33:34 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 02:33:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  5 02:33:34 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 02:33:35 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 02:33:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color admin-username is-secure
Jan  5 02:33:35 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 02:33:35 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 02:33:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  5 02:33:35 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 02:33:36 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 02:33:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/site/wp-config.php
Jan  5 02:33:36 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 02:33:36 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 02:33:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/stat -c %a /home/ugotscom/public_html/old/site/wp-config.php
Jan  5 02:33:36 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 02:33:36 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 02:33:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color pingbacks is_disabled
Jan  5 02:33:36 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 02:33:36 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 02:33:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  5 02:33:36 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 02:33:36 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 02:33:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color security-keys are_keys_correct
Jan  5 02:33:36 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 02:33:37 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 02:33:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=woodpeck --output=json
Jan  5 02:33:37 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:33:37 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:33:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html/wp && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/woodpeck/public_html/wp --no-color instance info --format=json --check-updates=true
Jan  5 02:33:37 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0)
Jan  5 02:33:37 host sudo: pam_unix(sudo:session): session closed for user woodpeck
Jan  5 02:33:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck DomainInfo single_domain_data domain=woodpeckerindia.com return_https_redirect_status=1 --output=json
Jan  5 02:33:37 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:33:37 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:33:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck Mime list_redirects --output=json
Jan  5 02:33:37 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:33:37 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:33:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/test -e /home/woodpeck/public_html/wp/wp-includes/version.php
Jan  5 02:33:37 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0)
Jan  5 02:33:37 host sudo: pam_unix(sudo:session): session closed for user woodpeck
Jan  5 02:33:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  5 02:33:37 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0)
Jan  5 02:33:37 host sudo: pam_unix(sudo:session): session closed for user woodpeck
Jan  5 02:33:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck LangPHP php_get_vhost_versions --output=json
Jan  5 02:33:37 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:33:37 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:33:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=palco123 --output=json
Jan  5 02:33:38 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:33:38 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:33:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color instance info --format=json --check-updates=true
Jan  5 02:33:38 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  5 02:34:09 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  5 02:34:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false
Jan  5 02:34:09 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  5 02:34:10 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  5 02:34:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false
Jan  5 02:34:10 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  5 02:34:21 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  5 02:34:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  5 02:34:21 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  5 02:34:21 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  5 02:34:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 LangPHP php_get_vhost_versions --output=json
Jan  5 02:34:21 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:34:21 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:34:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color instance login-url --skip-plugins=false --format=json
Jan  5 02:34:21 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  5 02:34:22 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  5 02:34:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 DomainInfo single_domain_data domain=panlys.com return_https_redirect_status=1 --output=json
Jan  5 02:34:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:34:22 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:34:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 Mime list_redirects --output=json
Jan  5 02:34:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:34:22 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:34:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  5 02:34:22 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  5 02:34:23 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  5 02:34:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false
Jan  5 02:34:23 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  5 02:34:23 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  5 02:34:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  5 02:34:24 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  5 02:35:08 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  5 02:35:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false
Jan  5 02:35:08 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  5 02:35:19 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  5 02:35:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/public_html/wp-config.php
Jan  5 02:35:19 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  5 02:35:19 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  5 02:35:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  5 02:35:19 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  5 02:35:19 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  5 02:35:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/public_html/.maintenance
Jan  5 02:35:19 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  5 02:35:19 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  5 02:35:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color db-prefix get
Jan  5 02:35:19 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  5 02:35:20 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  5 02:35:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 DirectoryPrivacy is_directory_protected dir=/home/palco123/public_html --output=json
Jan  5 02:35:20 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:35:20 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:35:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  5 02:35:20 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  5 02:35:21 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  5 02:35:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color option get auto_update_core_major
Jan  5 02:35:21 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  5 02:35:21 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  5 02:35:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color wpt-cron event reschedule wp_version_check '+2 day'
Jan  5 02:35:22 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  5 02:35:22 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  5 02:35:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day'
Jan  5 02:35:22 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  5 02:35:22 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  5 02:35:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color admin-username is-secure
Jan  5 02:35:23 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  5 02:35:23 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  5 02:35:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  5 02:35:23 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  5 02:35:23 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  5 02:35:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/public_html/wp-config.php
Jan  5 02:35:23 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  5 02:35:23 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  5 02:35:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/stat -c %a /home/palco123/public_html/wp-config.php
Jan  5 02:35:24 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  5 02:35:24 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  5 02:35:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color pingbacks is_disabled
Jan  5 02:35:24 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  5 02:35:24 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  5 02:35:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  5 02:35:24 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  5 02:35:24 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  5 02:35:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color security-keys are_keys_correct
Jan  5 02:35:24 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  5 02:35:25 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  5 02:35:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwresourcehunte --output=json
Jan  5 02:35:25 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:35:25 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:35:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color instance info --format=json --check-updates=true
Jan  5 02:35:25 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  5 02:36:25 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  5 02:36:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte DomainInfo single_domain_data domain=resourcehunters.com return_https_redirect_status=1 --output=json
Jan  5 02:36:25 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:36:25 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:36:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte Mime list_redirects --output=json
Jan  5 02:36:25 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:36:25 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:36:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/test -e /home/wwwresourcehunte/public_html/wp-includes/version.php
Jan  5 02:36:26 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  5 02:36:26 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  5 02:36:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/cat /home/wwwresourcehunte/public_html/wp-includes/version.php
Jan  5 02:36:26 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  5 02:36:26 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  5 02:36:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  5 02:36:26 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  5 02:36:26 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  5 02:36:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte LangPHP php_get_vhost_versions --output=json
Jan  5 02:36:26 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:36:26 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:36:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=phmetals WpToolkitNotification send_admin_auto_updates_notification available_updates_text= available_updates_list= installed_updates_text= installed_updates_list= 'failure_updates_text=Updates were not installed for the following items:<br/><br/>' 'failure_updates_list=1. Website "EVM Honda Cochin" (http://www.evmhonda.com): Failed to reset cache for the instance #1: Fatal error: Uncaught Error: Call to undefined function cardealer_is_wpml_active() in /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-options.php:1041#012Stack trace:#012#0 /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-init.php(22): require_once()#012#1 /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/cardealer-helper-library.php(183):
Jan  5 02:36:26 host sudo: wp-toolkit : (command continued) require_once('"'"'/home/wwwevmhon...'"'"')#012#2 /home/wwwevmhonda/public_html/wp-includes/class-wp-hook.php(287): cdhl_include_admin_files('"'"''"'"')#012#3 /home/wwwevmhonda/public_html/wp-includes/class-wp-hook.php(311): WP_Hook->apply_filters(NULL, Array)#012#4 /home/wwwevmhonda/public_html/wp-includes/plugin.php(478): WP_Hook->do_action(Array)#012#5 /home/wwwevmhonda/public_html/wp-settings.php(546): do_action('"'"'init'"'"')#012#6 /usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/vendor/wp-cli/wp-cli/php/WP_CLI/Runner.php(1356): require('"'"'/home/wwwevmhon...'"'"')#012#7 /usr/local/cpanel/3rdparty/wp-toolkit/plib/ve in /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-options.php on line 1041#012Error: There has been a critical error on your website.Learn more about debugging in WordPress. There has been a critical error on your website.#012<br/><br/>2. Website
Jan  5 02:36:26 host sudo: wp-toolkit : (command continued) "/home/mrsclean/public_html/backup" (http://mrsclean.co.in/backup): Failed to reset cache for the instance #5: Error: Error establishing a database connection. This either means that the username and password information in your `wp-config.php` file is incorrect or we can’t contact the database server at `localhost`. This could mean your host’s database server is down.#012<br/><br/>3. Website "/home/mrsclean/public_html/blog" (http://mrsclean.co.in/blog): Failed to reset cache for the instance #6: Error: Error establishing a database connection. This either means that the username and password information in your `wp-config.php` file is incorrect or we can’t contact the database server at `localhost`. This could mean your host’s database server is down.#012<br/><br/>4. Website "/home/ugotscom/public_html/boniface/blog" (http://ugotechnologies.com/boniface/blog): Failed to reset cache for the instance #13:
Jan  5 02:36:26 host sudo: wp-toolkit : (command continued) Error: Error establishing a database connection.#012<br/><br/>5. Website "/home/woodpeck/public_html/wp" (http://woodpeckerindia.com/wp): Failed to reset cache for the instance #16: /bin/sh: line 0: cd: /home/woodpeck/public_html/wp: No such file or directory#012<br/><br/>6. Website "/home/wwwresourcehunte/public_html" (http://resourcehunters.com): Failed to reset cache for the instance #18: WP Toolkit was not able to finish running an operation on this site in 60 seconds, so the operation was terminated. This could mean that your WordPress installation might be infected with malware. Check the wp-config.php file of the installation for potential malware code or run an anti-virus scan. If you cannot find any traces of malware, try running the operation again later.<br/><br/>' --output=json
Jan  5 02:36:26 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:36:26 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:36:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color cli cache clear
Jan  5 02:36:26 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  5 02:36:26 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  5 02:36:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color cli cache clear
Jan  5 02:36:26 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  5 02:36:26 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  5 02:36:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/backup && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/mrsclean/public_html/backup --no-color cli cache clear
Jan  5 02:36:26 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  5 02:36:27 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  5 02:36:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/blog && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/mrsclean/public_html/blog --no-color cli cache clear
Jan  5 02:36:27 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  5 02:36:27 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  5 02:36:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color cli cache clear
Jan  5 02:36:27 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  5 02:36:27 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  5 02:36:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color cli cache clear
Jan  5 02:36:27 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:36:27 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:36:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color cli cache clear
Jan  5 02:36:27 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:36:27 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:36:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color cli cache clear
Jan  5 02:36:27 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:36:28 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:36:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/boniface/blog && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/boniface/blog --no-color cli cache clear
Jan  5 02:36:28 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 02:36:28 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 02:36:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color cli cache clear
Jan  5 02:36:28 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 02:36:28 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 02:36:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color cli cache clear
Jan  5 02:36:28 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 02:36:28 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 02:36:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html/wp && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/woodpeck/public_html/wp --no-color cli cache clear
Jan  5 02:36:28 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0)
Jan  5 02:36:28 host sudo: pam_unix(sudo:session): session closed for user woodpeck
Jan  5 02:36:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color cli cache clear
Jan  5 02:36:28 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  5 02:36:28 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  5 02:36:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color cli cache clear
Jan  5 02:36:28 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  5 02:36:29 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  5 02:36:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet
Jan  5 02:36:29 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  5 02:36:29 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  5 02:36:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet
Jan  5 02:36:29 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  5 02:36:30 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  5 02:36:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet
Jan  5 02:36:30 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  5 02:36:31 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  5 02:36:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet
Jan  5 02:36:31 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:36:31 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:36:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet
Jan  5 02:36:31 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:36:31 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:36:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet
Jan  5 02:36:31 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 02:36:32 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 02:36:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet
Jan  5 02:36:32 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 02:36:32 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 02:36:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet
Jan  5 02:36:32 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 02:36:33 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 02:36:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet
Jan  5 02:36:33 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  5 02:36:33 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  5 02:36:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet
Jan  5 02:36:33 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  5 02:36:33 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  5 02:36:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c httpd -v
Jan  5 02:36:33 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:36:33 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:36:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwevmhonda/evmhonda.com/wp-toolkit.conf
Jan  5 02:36:33 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:36:33 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:36:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwevmhonda/evmhonda.com/wp-toolkit.conf
Jan  5 02:36:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:36:34 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:36:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwevmhonda/evmhonda.com/wp-toolkit.conf
Jan  5 02:36:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:36:34 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:36:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwevmhonda/evmhonda.com/wp-toolkit.conf
Jan  5 02:36:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:36:34 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:36:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf
Jan  5 02:36:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:36:34 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:36:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf
Jan  5 02:36:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:36:34 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:36:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf
Jan  5 02:36:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:36:34 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:36:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf
Jan  5 02:36:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:36:34 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:36:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/shalinijames/shalinijames.com/wp-toolkit.conf
Jan  5 02:36:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:36:34 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:36:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/shalinijames/shalinijames.com/wp-toolkit.conf
Jan  5 02:36:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:36:34 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:36:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/shalinijames/shalinijames.com/wp-toolkit.conf
Jan  5 02:36:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:36:34 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:36:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/shalinijames/shalinijames.com/wp-toolkit.conf
Jan  5 02:36:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:36:34 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:36:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  5 02:36:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:36:34 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:36:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  5 02:36:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:36:34 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:36:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  5 02:36:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:36:34 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:36:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  5 02:36:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:36:34 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:36:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  5 02:36:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:36:34 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:36:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  5 02:36:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:36:34 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:36:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  5 02:36:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:36:34 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:36:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  5 02:36:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:36:34 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:36:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  5 02:36:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:36:34 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:36:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  5 02:36:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:36:34 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:36:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  5 02:36:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:36:34 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:36:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  5 02:36:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:36:34 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:36:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf
Jan  5 02:36:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:36:34 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:36:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf
Jan  5 02:36:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:36:34 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:36:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf
Jan  5 02:36:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:36:34 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:36:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf
Jan  5 02:36:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:36:34 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:36:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf
Jan  5 02:36:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:36:34 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:36:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf
Jan  5 02:36:35 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:36:35 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:36:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf
Jan  5 02:36:35 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:36:35 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:36:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf
Jan  5 02:36:35 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:36:35 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:36:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/palco123/panlys.com/wp-toolkit.conf
Jan  5 02:36:35 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:36:35 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:36:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/palco123/panlys.com/wp-toolkit.conf
Jan  5 02:36:35 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:36:35 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:36:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/palco123/panlys.com/wp-toolkit.conf
Jan  5 02:36:35 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:36:35 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:36:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/palco123/panlys.com/wp-toolkit.conf
Jan  5 02:36:35 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:36:35 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:36:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf
Jan  5 02:36:35 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:36:35 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:36:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf
Jan  5 02:36:35 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:36:35 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:36:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf
Jan  5 02:36:35 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:36:35 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:36:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf
Jan  5 02:36:35 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 02:36:35 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 02:38:29 host sshd[27955]: Invalid user juan from 107.189.30.59 port 53896
Jan  5 02:38:29 host sshd[27955]: input_userauth_request: invalid user juan [preauth]
Jan  5 02:38:29 host sshd[27955]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 02:38:29 host sshd[27955]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59
Jan  5 02:38:31 host sshd[27955]: Failed password for invalid user juan from 107.189.30.59 port 53896 ssh2
Jan  5 02:38:32 host sshd[27955]: Connection closed by 107.189.30.59 port 53896 [preauth]
Jan  5 02:45:36 host sshd[28992]: Invalid user tmax from 92.46.108.20 port 33076
Jan  5 02:45:36 host sshd[28992]: input_userauth_request: invalid user tmax [preauth]
Jan  5 02:45:37 host sshd[28992]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 02:45:37 host sshd[28992]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20
Jan  5 02:45:39 host sshd[28992]: Failed password for invalid user tmax from 92.46.108.20 port 33076 ssh2
Jan  5 02:45:39 host sshd[28992]: Connection closed by 92.46.108.20 port 33076 [preauth]
Jan  5 02:52:22 host sshd[30031]: Invalid user user1 from 41.197.31.178 port 54528
Jan  5 02:52:22 host sshd[30031]: input_userauth_request: invalid user user1 [preauth]
Jan  5 02:52:23 host sshd[30031]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 02:52:23 host sshd[30031]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178
Jan  5 02:52:25 host sshd[30031]: Failed password for invalid user user1 from 41.197.31.178 port 54528 ssh2
Jan  5 02:52:25 host sshd[30031]: Connection closed by 41.197.31.178 port 54528 [preauth]
Jan  5 02:54:29 host sshd[30263]: Connection closed by 64.62.197.124 port 37341 [preauth]
Jan  5 03:01:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  5 03:01:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 03:01:02 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 03:01:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  5 03:01:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 03:01:02 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 03:01:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  5 03:01:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 03:01:02 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 03:01:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  5 03:01:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 03:01:02 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 03:01:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  5 03:01:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 03:01:02 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 03:01:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  5 03:01:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 03:01:02 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 03:01:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  5 03:01:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 03:01:02 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 03:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  5 03:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 03:21:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 03:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  5 03:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 03:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 03:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  5 03:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 03:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 03:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  5 03:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 03:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 03:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  5 03:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 03:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 03:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  5 03:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 03:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 03:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  5 03:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 03:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 03:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  5 03:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 03:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 03:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  5 03:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 03:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 03:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  5 03:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 03:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 03:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  5 03:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 03:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 03:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  5 03:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 03:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 03:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  5 03:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 03:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 03:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=travelboniface user-3=wwwrmswll user-4=wwwresourcehunte user-5=keralaholi user-6=ugotscom user-7=cochintaxi user-8=wwwkaretakers user-9=dartsimp user-10=a2zgroup user-11=laundryboniface user-12=bonifacegroup user-13=wwwevmhonda user-14=wwwletsstalkfood user-15=straightcurve user-16=gifterman user-17=palco123 user-18=phmetals user-19=kottayamcalldriv user-20=wwwnexidigital user-21=mrsclean user-22=remysagr user-23=disposeat user-24=wwwkmaorg user-25=woodpeck user-26=wwwkapin user-27=vfmassets user-28=wwwtestugo user-29=shalinijames user-30=pmcresources feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  5 03:21:53 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  5 03:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 03:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 03:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  5 03:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 03:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 03:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-PjkhSz4sBmW4pCZX.~
Jan  5 03:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 03:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 03:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-PjkhSz4sBmW4pCZX.~'
Jan  5 03:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 03:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 03:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-PjkhSz4sBmW4pCZX.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  5 03:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 03:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 03:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  5 03:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 03:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 03:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  5 03:21:54 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 03:21:54 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 03:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  5 03:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 03:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 03:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  5 03:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 03:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 03:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  5 03:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 03:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 03:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  5 03:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 03:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 03:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  5 03:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 03:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 03:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  5 03:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  5 03:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  5 03:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  5 03:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  5 03:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  5 03:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  5 03:21:58 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  5 03:21:59 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  5 03:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  5 03:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 03:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 03:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  5 03:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 03:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 03:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  5 03:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 03:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 03:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  5 03:22:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 03:22:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 03:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  5 03:22:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 03:22:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 03:26:16 host sshd[3066]: Invalid user user from 103.13.40.2 port 36178
Jan  5 03:26:16 host sshd[3066]: input_userauth_request: invalid user user [preauth]
Jan  5 03:26:16 host sshd[3066]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 03:26:16 host sshd[3066]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2
Jan  5 03:26:18 host sshd[3066]: Failed password for invalid user user from 103.13.40.2 port 36178 ssh2
Jan  5 03:26:18 host sshd[3066]: Connection closed by 103.13.40.2 port 36178 [preauth]
Jan  5 03:32:13 host sshd[3972]: Invalid user admin from 210.146.173.28 port 38554
Jan  5 03:32:13 host sshd[3972]: input_userauth_request: invalid user admin [preauth]
Jan  5 03:32:13 host sshd[3972]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 03:32:13 host sshd[3972]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.146.173.28
Jan  5 03:32:15 host sshd[3972]: Failed password for invalid user admin from 210.146.173.28 port 38554 ssh2
Jan  5 03:32:16 host sshd[3972]: Connection closed by 210.146.173.28 port 38554 [preauth]
Jan  5 03:57:53 host sshd[8002]: User root from 212.83.56.50 not allowed because not listed in AllowUsers
Jan  5 03:57:53 host sshd[8002]: input_userauth_request: invalid user root [preauth]
Jan  5 03:57:53 host unix_chkpwd[8005]: password check failed for user (root)
Jan  5 03:57:53 host sshd[8002]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.83.56.50  user=root
Jan  5 03:57:53 host sshd[8002]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 03:57:55 host sshd[8002]: Failed password for invalid user root from 212.83.56.50 port 39540 ssh2
Jan  5 03:57:55 host sshd[8002]: Received disconnect from 212.83.56.50 port 39540:11: Bye Bye [preauth]
Jan  5 03:57:55 host sshd[8002]: Disconnected from 212.83.56.50 port 39540 [preauth]
Jan  5 03:59:58 host sshd[8241]: User root from 184.168.125.40 not allowed because not listed in AllowUsers
Jan  5 03:59:58 host sshd[8241]: input_userauth_request: invalid user root [preauth]
Jan  5 03:59:58 host unix_chkpwd[8243]: password check failed for user (root)
Jan  5 03:59:58 host sshd[8241]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=184.168.125.40  user=root
Jan  5 03:59:58 host sshd[8241]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 03:59:59 host sshd[8241]: Failed password for invalid user root from 184.168.125.40 port 55132 ssh2
Jan  5 04:00:00 host sshd[8241]: Received disconnect from 184.168.125.40 port 55132:11: Bye Bye [preauth]
Jan  5 04:00:00 host sshd[8241]: Disconnected from 184.168.125.40 port 55132 [preauth]
Jan  5 04:01:39 host sshd[8623]: User root from 104.236.118.222 not allowed because not listed in AllowUsers
Jan  5 04:01:39 host sshd[8623]: input_userauth_request: invalid user root [preauth]
Jan  5 04:01:39 host unix_chkpwd[8627]: password check failed for user (root)
Jan  5 04:01:39 host sshd[8623]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.118.222  user=root
Jan  5 04:01:39 host sshd[8623]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 04:01:41 host sshd[8623]: Failed password for invalid user root from 104.236.118.222 port 52388 ssh2
Jan  5 04:01:41 host sshd[8623]: Received disconnect from 104.236.118.222 port 52388:11: Bye Bye [preauth]
Jan  5 04:01:41 host sshd[8623]: Disconnected from 104.236.118.222 port 52388 [preauth]
Jan  5 04:02:00 host sshd[8651]: Invalid user qs from 15.235.141.21 port 58856
Jan  5 04:02:00 host sshd[8651]: input_userauth_request: invalid user qs [preauth]
Jan  5 04:02:00 host sshd[8651]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 04:02:00 host sshd[8651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=15.235.141.21
Jan  5 04:02:02 host sshd[8651]: Failed password for invalid user qs from 15.235.141.21 port 58856 ssh2
Jan  5 04:02:02 host sshd[8651]: Received disconnect from 15.235.141.21 port 58856:11: Bye Bye [preauth]
Jan  5 04:02:02 host sshd[8651]: Disconnected from 15.235.141.21 port 58856 [preauth]
Jan  5 04:02:48 host sshd[8746]: Invalid user auxiliar from 77.158.71.118 port 35874
Jan  5 04:02:48 host sshd[8746]: input_userauth_request: invalid user auxiliar [preauth]
Jan  5 04:02:48 host sshd[8746]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 04:02:48 host sshd[8746]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.158.71.118
Jan  5 04:02:51 host sshd[8746]: Failed password for invalid user auxiliar from 77.158.71.118 port 35874 ssh2
Jan  5 04:02:51 host sshd[8746]: Received disconnect from 77.158.71.118 port 35874:11: Bye Bye [preauth]
Jan  5 04:02:51 host sshd[8746]: Disconnected from 77.158.71.118 port 35874 [preauth]
Jan  5 04:02:54 host sshd[8753]: User root from 154.221.17.142 not allowed because not listed in AllowUsers
Jan  5 04:02:54 host sshd[8753]: input_userauth_request: invalid user root [preauth]
Jan  5 04:02:54 host unix_chkpwd[8755]: password check failed for user (root)
Jan  5 04:02:54 host sshd[8753]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.221.17.142  user=root
Jan  5 04:02:54 host sshd[8753]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 04:02:56 host sshd[8753]: Failed password for invalid user root from 154.221.17.142 port 36459 ssh2
Jan  5 04:02:56 host sshd[8753]: Received disconnect from 154.221.17.142 port 36459:11: Bye Bye [preauth]
Jan  5 04:02:56 host sshd[8753]: Disconnected from 154.221.17.142 port 36459 [preauth]
Jan  5 04:03:42 host sshd[8882]: Invalid user ftpuser from 222.98.101.138 port 38080
Jan  5 04:03:42 host sshd[8882]: input_userauth_request: invalid user ftpuser [preauth]
Jan  5 04:03:42 host sshd[8882]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 04:03:42 host sshd[8882]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.98.101.138
Jan  5 04:03:44 host sshd[8882]: Failed password for invalid user ftpuser from 222.98.101.138 port 38080 ssh2
Jan  5 04:03:44 host sshd[8882]: Received disconnect from 222.98.101.138 port 38080:11: Bye Bye [preauth]
Jan  5 04:03:44 host sshd[8882]: Disconnected from 222.98.101.138 port 38080 [preauth]
Jan  5 04:04:09 host sshd[8928]: Invalid user sftp from 104.236.118.222 port 33306
Jan  5 04:04:09 host sshd[8928]: input_userauth_request: invalid user sftp [preauth]
Jan  5 04:04:09 host sshd[8928]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 04:04:09 host sshd[8928]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.118.222
Jan  5 04:04:11 host sshd[8928]: Failed password for invalid user sftp from 104.236.118.222 port 33306 ssh2
Jan  5 04:04:11 host sshd[8928]: Received disconnect from 104.236.118.222 port 33306:11: Bye Bye [preauth]
Jan  5 04:04:11 host sshd[8928]: Disconnected from 104.236.118.222 port 33306 [preauth]
Jan  5 04:04:17 host sshd[8981]: Invalid user ubuntu from 184.168.125.40 port 45204
Jan  5 04:04:17 host sshd[8981]: input_userauth_request: invalid user ubuntu [preauth]
Jan  5 04:04:17 host sshd[8981]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 04:04:17 host sshd[8981]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=184.168.125.40
Jan  5 04:04:17 host sshd[8978]: Invalid user user from 77.158.71.118 port 36366
Jan  5 04:04:17 host sshd[8978]: input_userauth_request: invalid user user [preauth]
Jan  5 04:04:17 host sshd[8978]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 04:04:17 host sshd[8978]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.158.71.118
Jan  5 04:04:18 host sshd[8981]: Failed password for invalid user ubuntu from 184.168.125.40 port 45204 ssh2
Jan  5 04:04:18 host sshd[8981]: Received disconnect from 184.168.125.40 port 45204:11: Bye Bye [preauth]
Jan  5 04:04:18 host sshd[8981]: Disconnected from 184.168.125.40 port 45204 [preauth]
Jan  5 04:04:19 host sshd[8978]: Failed password for invalid user user from 77.158.71.118 port 36366 ssh2
Jan  5 04:04:19 host sshd[8978]: Received disconnect from 77.158.71.118 port 36366:11: Bye Bye [preauth]
Jan  5 04:04:19 host sshd[8978]: Disconnected from 77.158.71.118 port 36366 [preauth]
Jan  5 04:04:19 host sshd[8985]: User root from 212.83.56.50 not allowed because not listed in AllowUsers
Jan  5 04:04:19 host sshd[8985]: input_userauth_request: invalid user root [preauth]
Jan  5 04:04:19 host unix_chkpwd[8987]: password check failed for user (root)
Jan  5 04:04:19 host sshd[8985]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.83.56.50  user=root
Jan  5 04:04:19 host sshd[8985]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 04:04:22 host sshd[8985]: Failed password for invalid user root from 212.83.56.50 port 52596 ssh2
Jan  5 04:05:17 host sshd[9281]: Invalid user alex from 222.98.101.138 port 38924
Jan  5 04:05:17 host sshd[9281]: input_userauth_request: invalid user alex [preauth]
Jan  5 04:05:17 host sshd[9281]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 04:05:17 host sshd[9281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.98.101.138
Jan  5 04:05:18 host sshd[9285]: Invalid user ubuntu from 154.221.17.142 port 51161
Jan  5 04:05:18 host sshd[9285]: input_userauth_request: invalid user ubuntu [preauth]
Jan  5 04:05:18 host sshd[9285]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 04:05:18 host sshd[9285]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.221.17.142
Jan  5 04:05:18 host sshd[9281]: Failed password for invalid user alex from 222.98.101.138 port 38924 ssh2
Jan  5 04:05:19 host sshd[9281]: Received disconnect from 222.98.101.138 port 38924:11: Bye Bye [preauth]
Jan  5 04:05:19 host sshd[9281]: Disconnected from 222.98.101.138 port 38924 [preauth]
Jan  5 04:05:20 host sshd[9285]: Failed password for invalid user ubuntu from 154.221.17.142 port 51161 ssh2
Jan  5 04:05:20 host sshd[9285]: Received disconnect from 154.221.17.142 port 51161:11: Bye Bye [preauth]
Jan  5 04:05:20 host sshd[9285]: Disconnected from 154.221.17.142 port 51161 [preauth]
Jan  5 04:05:26 host sshd[9325]: User root from 77.158.71.118 not allowed because not listed in AllowUsers
Jan  5 04:05:26 host sshd[9325]: input_userauth_request: invalid user root [preauth]
Jan  5 04:05:26 host unix_chkpwd[9350]: password check failed for user (root)
Jan  5 04:05:26 host sshd[9325]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.158.71.118  user=root
Jan  5 04:05:26 host sshd[9325]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 04:05:28 host sshd[9325]: Failed password for invalid user root from 77.158.71.118 port 35840 ssh2
Jan  5 04:05:51 host sshd[9413]: User root from 15.235.141.21 not allowed because not listed in AllowUsers
Jan  5 04:05:51 host sshd[9413]: input_userauth_request: invalid user root [preauth]
Jan  5 04:05:51 host unix_chkpwd[9415]: password check failed for user (root)
Jan  5 04:05:51 host sshd[9413]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=15.235.141.21  user=root
Jan  5 04:05:51 host sshd[9413]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 04:05:52 host sshd[9413]: Failed password for invalid user root from 15.235.141.21 port 59028 ssh2
Jan  5 04:05:53 host sshd[9413]: Received disconnect from 15.235.141.21 port 59028:11: Bye Bye [preauth]
Jan  5 04:05:53 host sshd[9413]: Disconnected from 15.235.141.21 port 59028 [preauth]
Jan  5 04:06:40 host sshd[9528]: Invalid user mahdi from 222.98.101.138 port 38882
Jan  5 04:06:40 host sshd[9528]: input_userauth_request: invalid user mahdi [preauth]
Jan  5 04:06:40 host sshd[9528]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 04:06:40 host sshd[9528]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.98.101.138
Jan  5 04:06:42 host sshd[9528]: Failed password for invalid user mahdi from 222.98.101.138 port 38882 ssh2
Jan  5 04:16:46 host sshd[10929]: Did not receive identification string from 162.243.162.122 port 59140
Jan  5 04:19:23 host sshd[11222]: User root from 41.197.31.178 not allowed because not listed in AllowUsers
Jan  5 04:19:23 host sshd[11222]: input_userauth_request: invalid user root [preauth]
Jan  5 04:19:23 host unix_chkpwd[11230]: password check failed for user (root)
Jan  5 04:19:23 host sshd[11222]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178  user=root
Jan  5 04:19:23 host sshd[11222]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 04:19:25 host sshd[11222]: Failed password for invalid user root from 41.197.31.178 port 45818 ssh2
Jan  5 04:19:25 host sshd[11222]: Connection closed by 41.197.31.178 port 45818 [preauth]
Jan  5 04:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  5 04:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 04:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 04:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  5 04:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 04:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 04:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  5 04:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 04:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 04:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  5 04:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 04:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 04:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  5 04:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 04:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 04:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  5 04:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 04:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 04:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  5 04:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 04:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 04:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  5 04:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 04:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 04:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  5 04:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 04:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 04:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  5 04:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 04:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 04:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  5 04:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 04:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 04:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  5 04:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 04:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 04:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  5 04:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 04:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 04:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=ugotscom user-2=wwwrmswll user-3=keralaholi user-4=wwwresourcehunte user-5=travelboniface user-6=wwwpmcresource user-7=laundryboniface user-8=dartsimp user-9=a2zgroup user-10=wwwkaretakers user-11=cochintaxi user-12=wwwnexidigital user-13=mrsclean user-14=phmetals user-15=kottayamcalldriv user-16=gifterman user-17=palco123 user-18=straightcurve user-19=wwwletsstalkfood user-20=wwwevmhonda user-21=bonifacegroup user-22=pmcresources user-23=wwwtestugo user-24=shalinijames user-25=vfmassets user-26=woodpeck user-27=wwwkapin user-28=remysagr user-29=disposeat user-30=wwwkmaorg feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  5 04:21:55 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  5 04:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 04:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 04:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  5 04:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 04:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 04:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-BVYxDzox7uH5CLdW.~
Jan  5 04:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 04:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 04:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-BVYxDzox7uH5CLdW.~'
Jan  5 04:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 04:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 04:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-BVYxDzox7uH5CLdW.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  5 04:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 04:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 04:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  5 04:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 04:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 04:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  5 04:21:59 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 04:21:59 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 04:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  5 04:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 04:22:00 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 04:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  5 04:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 04:22:00 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 04:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  5 04:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 04:22:00 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 04:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  5 04:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 04:22:00 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 04:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  5 04:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 04:22:01 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 04:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  5 04:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  5 04:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  5 04:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  5 04:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  5 04:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  5 04:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  5 04:22:04 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  5 04:22:06 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  5 04:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  5 04:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 04:22:13 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 04:22:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  5 04:22:13 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 04:22:13 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 04:22:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  5 04:22:14 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 04:22:16 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 04:22:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  5 04:22:16 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 04:22:17 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 04:22:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  5 04:22:17 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 04:22:19 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 04:39:52 host sshd[14894]: User root from 181.40.79.30 not allowed because not listed in AllowUsers
Jan  5 04:39:52 host sshd[14894]: input_userauth_request: invalid user root [preauth]
Jan  5 04:39:52 host unix_chkpwd[14899]: password check failed for user (root)
Jan  5 04:39:52 host sshd[14894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.40.79.30  user=root
Jan  5 04:39:52 host sshd[14894]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 04:39:54 host sshd[14894]: Failed password for invalid user root from 181.40.79.30 port 47581 ssh2
Jan  5 04:39:54 host sshd[14894]: Received disconnect from 181.40.79.30 port 47581:11: Bye Bye [preauth]
Jan  5 04:39:54 host sshd[14894]: Disconnected from 181.40.79.30 port 47581 [preauth]
Jan  5 04:42:53 host sshd[15585]: User root from 181.40.79.30 not allowed because not listed in AllowUsers
Jan  5 04:42:53 host sshd[15585]: input_userauth_request: invalid user root [preauth]
Jan  5 04:42:53 host unix_chkpwd[15591]: password check failed for user (root)
Jan  5 04:42:53 host sshd[15585]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.40.79.30  user=root
Jan  5 04:42:53 host sshd[15585]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 04:42:55 host sshd[15585]: Failed password for invalid user root from 181.40.79.30 port 33406 ssh2
Jan  5 04:42:55 host sshd[15585]: Received disconnect from 181.40.79.30 port 33406:11: Bye Bye [preauth]
Jan  5 04:42:55 host sshd[15585]: Disconnected from 181.40.79.30 port 33406 [preauth]
Jan  5 04:46:34 host sshd[16378]: Invalid user user from 103.13.40.2 port 45398
Jan  5 04:46:34 host sshd[16378]: input_userauth_request: invalid user user [preauth]
Jan  5 04:46:34 host sshd[16378]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 04:46:34 host sshd[16378]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2
Jan  5 04:46:36 host sshd[16378]: Failed password for invalid user user from 103.13.40.2 port 45398 ssh2
Jan  5 04:46:36 host sshd[16378]: Connection closed by 103.13.40.2 port 45398 [preauth]
Jan  5 04:47:20 host sshd[16448]: Invalid user a from 194.110.203.109 port 39012
Jan  5 04:47:20 host sshd[16448]: input_userauth_request: invalid user a [preauth]
Jan  5 04:47:20 host sshd[16448]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 04:47:20 host sshd[16448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109
Jan  5 04:47:22 host sshd[16448]: Failed password for invalid user a from 194.110.203.109 port 39012 ssh2
Jan  5 04:47:25 host sshd[16448]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 04:47:28 host sshd[16448]: Failed password for invalid user a from 194.110.203.109 port 39012 ssh2
Jan  5 04:47:31 host sshd[16448]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 04:47:33 host sshd[16448]: Failed password for invalid user a from 194.110.203.109 port 39012 ssh2
Jan  5 04:47:36 host sshd[16448]: Connection closed by 194.110.203.109 port 39012 [preauth]
Jan  5 04:47:36 host sshd[16448]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109
Jan  5 05:16:40 host sshd[20659]: User root from 92.46.108.20 not allowed because not listed in AllowUsers
Jan  5 05:16:40 host sshd[20659]: input_userauth_request: invalid user root [preauth]
Jan  5 05:16:41 host unix_chkpwd[20664]: password check failed for user (root)
Jan  5 05:16:41 host sshd[20659]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20  user=root
Jan  5 05:16:41 host sshd[20659]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 05:16:43 host sshd[20659]: Failed password for invalid user root from 92.46.108.20 port 33486 ssh2
Jan  5 05:16:44 host sshd[20659]: Connection closed by 92.46.108.20 port 33486 [preauth]
Jan  5 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  5 05:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 05:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  5 05:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 05:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  5 05:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 05:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  5 05:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 05:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  5 05:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 05:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  5 05:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 05:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  5 05:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 05:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  5 05:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 05:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  5 05:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 05:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  5 05:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 05:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  5 05:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 05:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  5 05:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 05:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  5 05:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 05:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=a2zgroup user-2=dartsimp user-3=laundryboniface user-4=wwwkaretakers user-5=cochintaxi user-6=travelboniface user-7=ugotscom user-8=wwwresourcehunte user-9=keralaholi user-10=wwwrmswll user-11=wwwpmcresource user-12=shalinijames user-13=wwwtestugo user-14=vfmassets user-15=pmcresources user-16=wwwkmaorg user-17=disposeat user-18=remysagr user-19=woodpeck user-20=wwwkapin user-21=kottayamcalldriv user-22=phmetals user-23=palco123 user-24=gifterman user-25=wwwnexidigital user-26=mrsclean user-27=wwwevmhonda user-28=bonifacegroup user-29=wwwletsstalkfood user-30=straightcurve feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  5 05:21:54 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  5 05:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 05:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  5 05:21:54 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 05:21:54 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=evmhonda.com --output=json
Jan  5 05:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 05:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/test -e /home/wwwevmhonda/wordpress-backups
Jan  5 05:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  5 05:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  5 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && find -H /home/wwwevmhonda/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  5 05:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  5 05:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  5 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=letsstalkfood.com --output=json
Jan  5 05:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 05:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/wordpress-backups
Jan  5 05:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  5 05:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  5 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && find -H /home/wwwletsstalkfood/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  5 05:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  5 05:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  5 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=mrsclean.co.in --output=json
Jan  5 05:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 05:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/wordpress-backups
Jan  5 05:21:55 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  5 05:21:55 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  5 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/backup && find -H /home/mrsclean/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  5 05:21:55 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  5 05:21:55 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  5 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/wordpress-backups
Jan  5 05:21:55 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  5 05:21:55 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  5 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/blog && find -H /home/mrsclean/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  5 05:21:55 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  5 05:21:55 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  5 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=shalinijames.com --output=json
Jan  5 05:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 05:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/wordpress-backups
Jan  5 05:21:55 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  5 05:21:55 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  5 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && find -H /home/shalinijames/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  5 05:21:55 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  5 05:21:55 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  5 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=testugo.in --output=json
Jan  5 05:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 05:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups
Jan  5 05:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 05:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && find -H /home/wwwtestugo/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  5 05:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 05:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups
Jan  5 05:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 05:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && find -H /home/wwwtestugo/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  5 05:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 05:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups
Jan  5 05:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 05:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && find -H /home/wwwtestugo/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  5 05:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 05:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=ugotechnologies.com --output=json
Jan  5 05:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 05:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups
Jan  5 05:21:55 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 05:21:55 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/boniface/blog && find -H /home/ugotscom/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  5 05:21:55 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 05:21:55 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups
Jan  5 05:21:55 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 05:21:55 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && find -H /home/ugotscom/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  5 05:21:56 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 05:21:56 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups
Jan  5 05:21:56 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 05:21:56 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && find -H /home/ugotscom/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  5 05:21:56 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 05:21:56 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=woodpeckerindia.com --output=json
Jan  5 05:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 05:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/test -e /home/woodpeck/wordpress-backups
Jan  5 05:21:56 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0)
Jan  5 05:21:56 host sudo: pam_unix(sudo:session): session closed for user woodpeck
Jan  5 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html/wp && find -H /home/woodpeck/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  5 05:21:56 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0)
Jan  5 05:21:56 host sudo: pam_unix(sudo:session): session closed for user woodpeck
Jan  5 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=panlys.com --output=json
Jan  5 05:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 05:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/wordpress-backups
Jan  5 05:21:56 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  5 05:21:56 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  5 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && find -H /home/palco123/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  5 05:21:56 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  5 05:21:56 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  5 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=resourcehunters.com --output=json
Jan  5 05:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 05:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/test -e /home/wwwresourcehunte/wordpress-backups
Jan  5 05:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  5 05:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  5 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && find -H /home/wwwresourcehunte/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  5 05:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  5 05:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  5 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /var/cpanel/licenseid_credentials.json
Jan  5 05:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 05:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  5 05:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 05:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=a2zgroup ; COMMAND=/bin/cat /home/a2zgroup/.wp-toolkit-identifier
Jan  5 05:21:56 host sudo: pam_unix(sudo:session): session opened for user a2zgroup by (uid=0)
Jan  5 05:21:56 host sudo: pam_unix(sudo:session): session closed for user a2zgroup
Jan  5 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=dartsimp ; COMMAND=/bin/cat /home/dartsimp/.wp-toolkit-identifier
Jan  5 05:21:56 host sudo: pam_unix(sudo:session): session opened for user dartsimp by (uid=0)
Jan  5 05:21:56 host sudo: pam_unix(sudo:session): session closed for user dartsimp
Jan  5 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=laundryboniface ; COMMAND=/bin/cat /home/laundryboniface/.wp-toolkit-identifier
Jan  5 05:21:56 host sudo: pam_unix(sudo:session): session opened for user laundryboniface by (uid=0)
Jan  5 05:21:56 host sudo: pam_unix(sudo:session): session closed for user laundryboniface
Jan  5 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkaretakers ; COMMAND=/bin/cat /home/wwwkaretakers/.wp-toolkit-identifier
Jan  5 05:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwkaretakers by (uid=0)
Jan  5 05:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwkaretakers
Jan  5 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=cochintaxi ; COMMAND=/bin/cat /home/cochintaxi/.wp-toolkit-identifier
Jan  5 05:21:56 host sudo: pam_unix(sudo:session): session opened for user cochintaxi by (uid=0)
Jan  5 05:21:56 host sudo: pam_unix(sudo:session): session closed for user cochintaxi
Jan  5 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=travelboniface ; COMMAND=/bin/cat /home/travelboniface/.wp-toolkit-identifier
Jan  5 05:21:56 host sudo: pam_unix(sudo:session): session opened for user travelboniface by (uid=0)
Jan  5 05:21:56 host sudo: pam_unix(sudo:session): session closed for user travelboniface
Jan  5 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/cat /home/wwwresourcehunte/.wp-toolkit-identifier
Jan  5 05:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  5 05:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  5 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/cat /home/keralaholi/.wp-toolkit-identifier
Jan  5 05:21:57 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0)
Jan  5 05:21:57 host sudo: pam_unix(sudo:session): session closed for user keralaholi
Jan  5 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -f /home/keralaholi/.wp-toolkit-identifier
Jan  5 05:21:57 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0)
Jan  5 05:21:57 host sudo: pam_unix(sudo:session): session closed for user keralaholi
Jan  5 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -e /home/keralaholi/-wpt-tmp-nvhk8OGNiCGncjft.wp-toolkit-identifier
Jan  5 05:21:57 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0)
Jan  5 05:21:57 host sudo: pam_unix(sudo:session): session closed for user keralaholi
Jan  5 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/sh -c cat > /home/keralaholi/-wpt-tmp-nvhk8OGNiCGncjft.wp-toolkit-identifier
Jan  5 05:21:57 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0)
Jan  5 05:21:57 host sudo: pam_unix(sudo:session): session closed for user keralaholi
Jan  5 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwrmswll ; COMMAND=/bin/cat /home/wwwrmswll/.wp-toolkit-identifier
Jan  5 05:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwrmswll by (uid=0)
Jan  5 05:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwrmswll
Jan  5 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwpmcresource ; COMMAND=/bin/cat /home/wwwpmcresource/.wp-toolkit-identifier
Jan  5 05:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwpmcresource by (uid=0)
Jan  5 05:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwpmcresource
Jan  5 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/cat /home/shalinijames/.wp-toolkit-identifier
Jan  5 05:21:57 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  5 05:21:57 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  5 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/cat /home/wwwtestugo/.wp-toolkit-identifier
Jan  5 05:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 05:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=vfmassets ; COMMAND=/bin/cat /home/vfmassets/.wp-toolkit-identifier
Jan  5 05:21:57 host sudo: pam_unix(sudo:session): session opened for user vfmassets by (uid=0)
Jan  5 05:21:57 host sudo: pam_unix(sudo:session): session closed for user vfmassets
Jan  5 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=pmcresources ; COMMAND=/bin/cat /home/pmcresources/.wp-toolkit-identifier
Jan  5 05:21:57 host sudo: pam_unix(sudo:session): session opened for user pmcresources by (uid=0)
Jan  5 05:21:57 host sudo: pam_unix(sudo:session): session closed for user pmcresources
Jan  5 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkmaorg ; COMMAND=/bin/cat /home/wwwkmaorg/.wp-toolkit-identifier
Jan  5 05:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwkmaorg by (uid=0)
Jan  5 05:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwkmaorg
Jan  5 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=disposeat ; COMMAND=/bin/cat /home/disposeat/.wp-toolkit-identifier
Jan  5 05:21:57 host sudo: pam_unix(sudo:session): session opened for user disposeat by (uid=0)
Jan  5 05:21:57 host sudo: pam_unix(sudo:session): session closed for user disposeat
Jan  5 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=remysagr ; COMMAND=/bin/cat /home/remysagr/.wp-toolkit-identifier
Jan  5 05:21:57 host sudo: pam_unix(sudo:session): session opened for user remysagr by (uid=0)
Jan  5 05:21:57 host sudo: pam_unix(sudo:session): session closed for user remysagr
Jan  5 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/cat /home/woodpeck/.wp-toolkit-identifier
Jan  5 05:21:57 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0)
Jan  5 05:21:57 host sudo: pam_unix(sudo:session): session closed for user woodpeck
Jan  5 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkapin ; COMMAND=/bin/cat /home/wwwkapin/.wp-toolkit-identifier
Jan  5 05:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwkapin by (uid=0)
Jan  5 05:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwkapin
Jan  5 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=kottayamcalldriv ; COMMAND=/bin/cat /home/kottayamcalldriv/.wp-toolkit-identifier
Jan  5 05:21:57 host sudo: pam_unix(sudo:session): session opened for user kottayamcalldriv by (uid=0)
Jan  5 05:21:57 host sudo: pam_unix(sudo:session): session closed for user kottayamcalldriv
Jan  5 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=phmetals ; COMMAND=/bin/cat /home/phmetals/.wp-toolkit-identifier
Jan  5 05:21:57 host sudo: pam_unix(sudo:session): session opened for user phmetals by (uid=0)
Jan  5 05:21:57 host sudo: pam_unix(sudo:session): session closed for user phmetals
Jan  5 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/cat /home/palco123/.wp-toolkit-identifier
Jan  5 05:21:57 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  5 05:21:57 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  5 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=gifterman ; COMMAND=/bin/cat /home/gifterman/.wp-toolkit-identifier
Jan  5 05:21:57 host sudo: pam_unix(sudo:session): session opened for user gifterman by (uid=0)
Jan  5 05:21:57 host sudo: pam_unix(sudo:session): session closed for user gifterman
Jan  5 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwnexidigital ; COMMAND=/bin/cat /home/wwwnexidigital/.wp-toolkit-identifier
Jan  5 05:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwnexidigital by (uid=0)
Jan  5 05:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwnexidigital
Jan  5 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/cat /home/mrsclean/.wp-toolkit-identifier
Jan  5 05:21:57 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  5 05:21:57 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  5 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/cat /home/wwwevmhonda/.wp-toolkit-identifier
Jan  5 05:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  5 05:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  5 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=bonifacegroup ; COMMAND=/bin/cat /home/bonifacegroup/.wp-toolkit-identifier
Jan  5 05:21:57 host sudo: pam_unix(sudo:session): session opened for user bonifacegroup by (uid=0)
Jan  5 05:21:57 host sudo: pam_unix(sudo:session): session closed for user bonifacegroup
Jan  5 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/cat /home/wwwletsstalkfood/.wp-toolkit-identifier
Jan  5 05:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  5 05:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  5 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=straightcurve ; COMMAND=/bin/cat /home/straightcurve/.wp-toolkit-identifier
Jan  5 05:21:58 host sudo: pam_unix(sudo:session): session opened for user straightcurve by (uid=0)
Jan  5 05:21:58 host sudo: pam_unix(sudo:session): session closed for user straightcurve
Jan  5 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/cat /home/keralaholi/.wp-toolkit-identifier
Jan  5 05:21:58 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0)
Jan  5 05:21:58 host sudo: pam_unix(sudo:session): session closed for user keralaholi
Jan  5 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -f /home/keralaholi/.wp-toolkit-identifier
Jan  5 05:21:58 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0)
Jan  5 05:21:58 host sudo: pam_unix(sudo:session): session closed for user keralaholi
Jan  5 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -e /home/keralaholi/-wpt-tmp-xeB9pJQ2ARnFJiPJ.wp-toolkit-identifier
Jan  5 05:21:58 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0)
Jan  5 05:21:58 host sudo: pam_unix(sudo:session): session closed for user keralaholi
Jan  5 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/sh -c cat > /home/keralaholi/-wpt-tmp-xeB9pJQ2ARnFJiPJ.wp-toolkit-identifier
Jan  5 05:21:58 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0)
Jan  5 05:21:58 host sudo: pam_unix(sudo:session): session closed for user keralaholi
Jan  5 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_shared_ip --output=json
Jan  5 05:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 05:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_public_ip ip=167.71.234.10 --output=json
Jan  5 05:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 05:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  5 05:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 05:22:01 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-tOUwUda69qUvVfel.~
Jan  5 05:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 05:22:01 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-tOUwUda69qUvVfel.~'
Jan  5 05:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 05:22:01 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-tOUwUda69qUvVfel.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  5 05:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 05:22:01 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  5 05:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 05:22:01 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  5 05:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 05:22:01 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  5 05:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 05:22:01 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  5 05:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 05:22:01 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  5 05:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 05:22:02 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  5 05:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 05:22:03 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  5 05:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  5 05:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  5 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  5 05:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  5 05:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  5 05:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  5 05:22:06 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  5 05:22:07 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  5 05:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  5 05:22:08 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 05:22:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 05:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  5 05:22:09 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 05:22:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 05:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  5 05:22:09 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 05:22:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 05:22:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  5 05:22:12 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 05:22:13 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 05:22:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  5 05:22:13 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 05:22:14 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 05:24:29 host sshd[22338]: Invalid user service from 194.169.175.102 port 53625
Jan  5 05:24:29 host sshd[22338]: input_userauth_request: invalid user service [preauth]
Jan  5 05:24:29 host sshd[22338]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 05:24:29 host sshd[22338]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.169.175.102
Jan  5 05:24:31 host sshd[22338]: Failed password for invalid user service from 194.169.175.102 port 53625 ssh2
Jan  5 05:24:31 host sshd[22338]: Received disconnect from 194.169.175.102 port 53625:11: Client disconnecting normally [preauth]
Jan  5 05:24:31 host sshd[22338]: Disconnected from 194.169.175.102 port 53625 [preauth]
Jan  5 05:47:16 host sshd[25900]: Invalid user scanner from 41.197.31.178 port 42880
Jan  5 05:47:16 host sshd[25900]: input_userauth_request: invalid user scanner [preauth]
Jan  5 05:47:16 host sshd[25900]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 05:47:16 host sshd[25900]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178
Jan  5 05:47:18 host sshd[25900]: Failed password for invalid user scanner from 41.197.31.178 port 42880 ssh2
Jan  5 05:47:18 host sshd[25900]: Connection closed by 41.197.31.178 port 42880 [preauth]
Jan  5 06:07:08 host sshd[29120]: Invalid user user1 from 103.13.40.2 port 44324
Jan  5 06:07:08 host sshd[29120]: input_userauth_request: invalid user user1 [preauth]
Jan  5 06:07:08 host sshd[29120]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 06:07:08 host sshd[29120]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2
Jan  5 06:07:10 host sshd[29120]: Failed password for invalid user user1 from 103.13.40.2 port 44324 ssh2
Jan  5 06:07:10 host sshd[29120]: Connection closed by 103.13.40.2 port 44324 [preauth]
Jan  5 06:09:34 host sshd[29684]: Did not receive identification string from 13.40.151.168 port 21345
Jan  5 06:09:40 host sshd[29702]: Did not receive identification string from 13.40.151.168 port 21345
Jan  5 06:13:19 host sshd[30472]: Did not receive identification string from 13.40.151.168 port 21345
Jan  5 06:13:25 host sshd[30486]: Did not receive identification string from 13.40.151.168 port 21345
Jan  5 06:17:03 host sshd[31100]: Did not receive identification string from 13.40.151.168 port 21345
Jan  5 06:21:17 host sshd[31868]: Did not receive identification string from 45.79.181.223 port 64262
Jan  5 06:21:20 host sshd[31869]: Connection closed by 45.79.181.223 port 64274 [preauth]
Jan  5 06:21:23 host sshd[31873]: Connection closed by 45.79.181.223 port 64280 [preauth]
Jan  5 06:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  5 06:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 06:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 06:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  5 06:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 06:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 06:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  5 06:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 06:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 06:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  5 06:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 06:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 06:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  5 06:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 06:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 06:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  5 06:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 06:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 06:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  5 06:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 06:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 06:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  5 06:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 06:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 06:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  5 06:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 06:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 06:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  5 06:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 06:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 06:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  5 06:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 06:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 06:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  5 06:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 06:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 06:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  5 06:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 06:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 06:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwevmhonda user-2=bonifacegroup user-3=wwwletsstalkfood user-4=straightcurve user-5=kottayamcalldriv user-6=phmetals user-7=gifterman user-8=palco123 user-9=wwwnexidigital user-10=mrsclean user-11=wwwkmaorg user-12=disposeat user-13=remysagr user-14=wwwkapin user-15=woodpeck user-16=wwwtestugo user-17=shalinijames user-18=vfmassets user-19=pmcresources user-20=wwwpmcresource user-21=travelboniface user-22=ugotscom user-23=wwwrmswll user-24=keralaholi user-25=wwwresourcehunte user-26=wwwkaretakers user-27=cochintaxi user-28=dartsimp user-29=a2zgroup user-30=laundryboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  5 06:21:53 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  5 06:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 06:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 06:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  5 06:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 06:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 06:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-OjmJ0qTh7z2KFJXV.~
Jan  5 06:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 06:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 06:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-OjmJ0qTh7z2KFJXV.~'
Jan  5 06:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 06:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 06:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-OjmJ0qTh7z2KFJXV.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  5 06:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 06:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 06:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  5 06:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 06:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 06:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  5 06:21:54 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 06:21:54 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 06:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  5 06:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 06:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 06:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  5 06:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 06:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 06:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  5 06:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 06:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 06:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  5 06:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 06:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 06:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  5 06:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 06:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 06:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  5 06:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  5 06:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  5 06:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  5 06:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  5 06:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  5 06:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  5 06:21:59 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  5 06:22:01 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  5 06:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  5 06:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 06:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 06:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  5 06:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 06:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 06:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  5 06:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 06:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 06:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  5 06:22:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 06:22:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 06:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  5 06:22:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 06:22:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 06:27:19 host sshd[417]: Invalid user eugene from 43.240.103.141 port 60106
Jan  5 06:27:19 host sshd[417]: input_userauth_request: invalid user eugene [preauth]
Jan  5 06:27:19 host sshd[417]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 06:27:19 host sshd[417]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.240.103.141
Jan  5 06:27:21 host sshd[417]: Failed password for invalid user eugene from 43.240.103.141 port 60106 ssh2
Jan  5 06:27:21 host sshd[417]: Received disconnect from 43.240.103.141 port 60106:11: Bye Bye [preauth]
Jan  5 06:27:21 host sshd[417]: Disconnected from 43.240.103.141 port 60106 [preauth]
Jan  5 06:30:06 host sshd[930]: User root from 43.240.103.141 not allowed because not listed in AllowUsers
Jan  5 06:30:06 host sshd[930]: input_userauth_request: invalid user root [preauth]
Jan  5 06:30:06 host unix_chkpwd[933]: password check failed for user (root)
Jan  5 06:30:06 host sshd[930]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.240.103.141  user=root
Jan  5 06:30:06 host sshd[930]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 06:30:08 host sshd[930]: Failed password for invalid user root from 43.240.103.141 port 39782 ssh2
Jan  5 06:30:08 host sshd[930]: Received disconnect from 43.240.103.141 port 39782:11: Bye Bye [preauth]
Jan  5 06:30:08 host sshd[930]: Disconnected from 43.240.103.141 port 39782 [preauth]
Jan  5 06:46:09 host sshd[3346]: Bad protocol version identification '\003' from 185.73.124.135 port 64566
Jan  5 06:49:38 host sshd[3802]: User root from 79.3.19.34 not allowed because not listed in AllowUsers
Jan  5 06:49:38 host sshd[3802]: input_userauth_request: invalid user root [preauth]
Jan  5 06:49:38 host unix_chkpwd[3806]: password check failed for user (root)
Jan  5 06:49:38 host sshd[3802]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.3.19.34  user=root
Jan  5 06:49:38 host sshd[3802]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 06:49:40 host sshd[3802]: Failed password for invalid user root from 79.3.19.34 port 41876 ssh2
Jan  5 06:49:41 host sshd[3802]: Received disconnect from 79.3.19.34 port 41876:11: Bye Bye [preauth]
Jan  5 06:49:41 host sshd[3802]: Disconnected from 79.3.19.34 port 41876 [preauth]
Jan  5 06:57:27 host sshd[5061]: User root from 79.3.19.34 not allowed because not listed in AllowUsers
Jan  5 06:57:27 host sshd[5061]: input_userauth_request: invalid user root [preauth]
Jan  5 06:57:27 host unix_chkpwd[5090]: password check failed for user (root)
Jan  5 06:57:27 host sshd[5061]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.3.19.34  user=root
Jan  5 06:57:27 host sshd[5061]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 06:57:28 host sshd[5061]: Failed password for invalid user root from 79.3.19.34 port 47093 ssh2
Jan  5 06:57:29 host sshd[5061]: Received disconnect from 79.3.19.34 port 47093:11: Bye Bye [preauth]
Jan  5 06:57:29 host sshd[5061]: Disconnected from 79.3.19.34 port 47093 [preauth]
Jan  5 07:09:30 host sshd[7331]: Invalid user aa from 194.110.203.109 port 42028
Jan  5 07:09:30 host sshd[7331]: input_userauth_request: invalid user aa [preauth]
Jan  5 07:09:30 host sshd[7331]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 07:09:30 host sshd[7331]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109
Jan  5 07:09:32 host sshd[7331]: Failed password for invalid user aa from 194.110.203.109 port 42028 ssh2
Jan  5 07:09:35 host sshd[7331]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 07:09:36 host sshd[7331]: Failed password for invalid user aa from 194.110.203.109 port 42028 ssh2
Jan  5 07:09:39 host sshd[7331]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 07:09:42 host sshd[7331]: Failed password for invalid user aa from 194.110.203.109 port 42028 ssh2
Jan  5 07:09:45 host sshd[7331]: Connection closed by 194.110.203.109 port 42028 [preauth]
Jan  5 07:09:45 host sshd[7331]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109
Jan  5 07:14:52 host sshd[8192]: User root from 23.94.43.69 not allowed because not listed in AllowUsers
Jan  5 07:14:52 host sshd[8192]: input_userauth_request: invalid user root [preauth]
Jan  5 07:14:52 host unix_chkpwd[8195]: password check failed for user (root)
Jan  5 07:14:52 host sshd[8192]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.94.43.69  user=root
Jan  5 07:14:52 host sshd[8192]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 07:14:54 host sshd[8192]: Failed password for invalid user root from 23.94.43.69 port 35136 ssh2
Jan  5 07:14:55 host sshd[8192]: Received disconnect from 23.94.43.69 port 35136:11: Bye Bye [preauth]
Jan  5 07:14:55 host sshd[8192]: Disconnected from 23.94.43.69 port 35136 [preauth]
Jan  5 07:15:01 host sshd[8210]: Invalid user tele from 193.179.226.199 port 58336
Jan  5 07:15:01 host sshd[8210]: input_userauth_request: invalid user tele [preauth]
Jan  5 07:15:01 host sshd[8210]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 07:15:01 host sshd[8210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.179.226.199
Jan  5 07:15:03 host sshd[8213]: Invalid user rancher from 157.230.228.27 port 47316
Jan  5 07:15:03 host sshd[8213]: input_userauth_request: invalid user rancher [preauth]
Jan  5 07:15:03 host sshd[8210]: Failed password for invalid user tele from 193.179.226.199 port 58336 ssh2
Jan  5 07:15:03 host sshd[8213]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 07:15:03 host sshd[8213]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.228.27
Jan  5 07:15:03 host sshd[8210]: Received disconnect from 193.179.226.199 port 58336:11: Bye Bye [preauth]
Jan  5 07:15:03 host sshd[8210]: Disconnected from 193.179.226.199 port 58336 [preauth]
Jan  5 07:15:04 host sshd[8213]: Failed password for invalid user rancher from 157.230.228.27 port 47316 ssh2
Jan  5 07:15:05 host sshd[8213]: Received disconnect from 157.230.228.27 port 47316:11: Bye Bye [preauth]
Jan  5 07:15:05 host sshd[8213]: Disconnected from 157.230.228.27 port 47316 [preauth]
Jan  5 07:15:06 host sshd[8236]: Invalid user vpn from 165.227.166.247 port 36834
Jan  5 07:15:06 host sshd[8236]: input_userauth_request: invalid user vpn [preauth]
Jan  5 07:15:06 host sshd[8236]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 07:15:06 host sshd[8236]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.247
Jan  5 07:15:08 host sshd[8236]: Failed password for invalid user vpn from 165.227.166.247 port 36834 ssh2
Jan  5 07:15:09 host sshd[8236]: Received disconnect from 165.227.166.247 port 36834:11: Bye Bye [preauth]
Jan  5 07:15:09 host sshd[8236]: Disconnected from 165.227.166.247 port 36834 [preauth]
Jan  5 07:15:27 host sshd[8336]: Invalid user ec2-user from 110.39.142.162 port 56262
Jan  5 07:15:27 host sshd[8336]: input_userauth_request: invalid user ec2-user [preauth]
Jan  5 07:15:27 host sshd[8336]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 07:15:27 host sshd[8336]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.39.142.162
Jan  5 07:15:28 host sshd[8336]: Failed password for invalid user ec2-user from 110.39.142.162 port 56262 ssh2
Jan  5 07:15:29 host sshd[8336]: Received disconnect from 110.39.142.162 port 56262:11: Bye Bye [preauth]
Jan  5 07:15:29 host sshd[8336]: Disconnected from 110.39.142.162 port 56262 [preauth]
Jan  5 07:15:36 host sshd[8369]: Invalid user admin from 41.197.31.178 port 51978
Jan  5 07:15:36 host sshd[8369]: input_userauth_request: invalid user admin [preauth]
Jan  5 07:15:36 host sshd[8369]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 07:15:36 host sshd[8369]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178
Jan  5 07:15:38 host sshd[8369]: Failed password for invalid user admin from 41.197.31.178 port 51978 ssh2
Jan  5 07:15:38 host sshd[8369]: Connection closed by 41.197.31.178 port 51978 [preauth]
Jan  5 07:15:46 host sshd[8381]: Invalid user flw from 137.184.84.188 port 46098
Jan  5 07:15:46 host sshd[8381]: input_userauth_request: invalid user flw [preauth]
Jan  5 07:15:46 host sshd[8381]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 07:15:46 host sshd[8381]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.84.188
Jan  5 07:15:48 host sshd[8381]: Failed password for invalid user flw from 137.184.84.188 port 46098 ssh2
Jan  5 07:15:48 host sshd[8381]: Received disconnect from 137.184.84.188 port 46098:11: Bye Bye [preauth]
Jan  5 07:15:48 host sshd[8381]: Disconnected from 137.184.84.188 port 46098 [preauth]
Jan  5 07:16:46 host sshd[8476]: User root from 196.204.226.180 not allowed because not listed in AllowUsers
Jan  5 07:16:46 host sshd[8476]: input_userauth_request: invalid user root [preauth]
Jan  5 07:16:46 host unix_chkpwd[8482]: password check failed for user (root)
Jan  5 07:16:46 host sshd[8476]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.204.226.180  user=root
Jan  5 07:16:46 host sshd[8476]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 07:16:47 host sshd[8480]: Invalid user aaa from 202.169.46.155 port 41874
Jan  5 07:16:47 host sshd[8480]: input_userauth_request: invalid user aaa [preauth]
Jan  5 07:16:47 host sshd[8480]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 07:16:47 host sshd[8480]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.169.46.155
Jan  5 07:16:49 host sshd[8476]: Failed password for invalid user root from 196.204.226.180 port 53964 ssh2
Jan  5 07:16:49 host sshd[8476]: Received disconnect from 196.204.226.180 port 53964:11: Bye Bye [preauth]
Jan  5 07:16:49 host sshd[8476]: Disconnected from 196.204.226.180 port 53964 [preauth]
Jan  5 07:16:50 host sshd[8480]: Failed password for invalid user aaa from 202.169.46.155 port 41874 ssh2
Jan  5 07:16:50 host sshd[8480]: Received disconnect from 202.169.46.155 port 41874:11: Bye Bye [preauth]
Jan  5 07:16:50 host sshd[8480]: Disconnected from 202.169.46.155 port 41874 [preauth]
Jan  5 07:17:04 host sshd[8625]: User root from 112.254.116.124 not allowed because not listed in AllowUsers
Jan  5 07:17:04 host sshd[8625]: input_userauth_request: invalid user root [preauth]
Jan  5 07:17:04 host unix_chkpwd[8628]: password check failed for user (root)
Jan  5 07:17:04 host sshd[8625]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.254.116.124  user=root
Jan  5 07:17:04 host sshd[8625]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 07:17:07 host sshd[8625]: Failed password for invalid user root from 112.254.116.124 port 55096 ssh2
Jan  5 07:17:07 host sshd[8625]: Received disconnect from 112.254.116.124 port 55096:11: Bye Bye [preauth]
Jan  5 07:17:07 host sshd[8625]: Disconnected from 112.254.116.124 port 55096 [preauth]
Jan  5 07:18:31 host sshd[8824]: User root from 195.154.19.216 not allowed because not listed in AllowUsers
Jan  5 07:18:31 host sshd[8824]: input_userauth_request: invalid user root [preauth]
Jan  5 07:18:31 host unix_chkpwd[8826]: password check failed for user (root)
Jan  5 07:18:31 host sshd[8824]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.154.19.216  user=root
Jan  5 07:18:31 host sshd[8824]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 07:18:33 host sshd[8824]: Failed password for invalid user root from 195.154.19.216 port 48650 ssh2
Jan  5 07:18:33 host sshd[8824]: Received disconnect from 195.154.19.216 port 48650:11: Bye Bye [preauth]
Jan  5 07:18:33 host sshd[8824]: Disconnected from 195.154.19.216 port 48650 [preauth]
Jan  5 07:19:15 host sshd[8908]: User nobody from 103.148.113.55 not allowed because not listed in AllowUsers
Jan  5 07:19:15 host sshd[8908]: input_userauth_request: invalid user nobody [preauth]
Jan  5 07:19:15 host unix_chkpwd[8912]: password check failed for user (nobody)
Jan  5 07:19:15 host sshd[8908]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.148.113.55  user=nobody
Jan  5 07:19:15 host sshd[8908]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "nobody"
Jan  5 07:19:17 host sshd[8908]: Failed password for invalid user nobody from 103.148.113.55 port 36566 ssh2
Jan  5 07:19:18 host sshd[8908]: Received disconnect from 103.148.113.55 port 36566:11: Bye Bye [preauth]
Jan  5 07:19:18 host sshd[8908]: Disconnected from 103.148.113.55 port 36566 [preauth]
Jan  5 07:20:18 host sshd[9095]: Invalid user bill from 157.230.228.27 port 49224
Jan  5 07:20:18 host sshd[9095]: input_userauth_request: invalid user bill [preauth]
Jan  5 07:20:18 host sshd[9095]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 07:20:18 host sshd[9095]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.228.27
Jan  5 07:20:20 host sshd[9095]: Failed password for invalid user bill from 157.230.228.27 port 49224 ssh2
Jan  5 07:20:20 host sshd[9095]: Received disconnect from 157.230.228.27 port 49224:11: Bye Bye [preauth]
Jan  5 07:20:20 host sshd[9095]: Disconnected from 157.230.228.27 port 49224 [preauth]
Jan  5 07:20:21 host sshd[9113]: Invalid user admin from 45.195.9.110 port 44710
Jan  5 07:20:21 host sshd[9113]: input_userauth_request: invalid user admin [preauth]
Jan  5 07:20:21 host sshd[9113]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 07:20:21 host sshd[9113]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.195.9.110
Jan  5 07:20:24 host sshd[9113]: Failed password for invalid user admin from 45.195.9.110 port 44710 ssh2
Jan  5 07:20:24 host sshd[9113]: Received disconnect from 45.195.9.110 port 44710:11: Bye Bye [preauth]
Jan  5 07:20:24 host sshd[9113]: Disconnected from 45.195.9.110 port 44710 [preauth]
Jan  5 07:20:29 host sshd[9149]: Invalid user ftp_test from 103.160.69.52 port 38296
Jan  5 07:20:29 host sshd[9149]: input_userauth_request: invalid user ftp_test [preauth]
Jan  5 07:20:29 host sshd[9149]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 07:20:29 host sshd[9149]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.160.69.52
Jan  5 07:20:32 host sshd[9149]: Failed password for invalid user ftp_test from 103.160.69.52 port 38296 ssh2
Jan  5 07:20:32 host sshd[9149]: Received disconnect from 103.160.69.52 port 38296:11: Bye Bye [preauth]
Jan  5 07:20:32 host sshd[9149]: Disconnected from 103.160.69.52 port 38296 [preauth]
Jan  5 07:20:36 host sshd[9179]: User root from 110.39.142.162 not allowed because not listed in AllowUsers
Jan  5 07:20:36 host sshd[9179]: input_userauth_request: invalid user root [preauth]
Jan  5 07:20:36 host unix_chkpwd[9182]: password check failed for user (root)
Jan  5 07:20:36 host sshd[9179]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.39.142.162  user=root
Jan  5 07:20:36 host sshd[9179]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 07:20:38 host sshd[9179]: Failed password for invalid user root from 110.39.142.162 port 42274 ssh2
Jan  5 07:20:38 host sshd[9179]: Received disconnect from 110.39.142.162 port 42274:11: Bye Bye [preauth]
Jan  5 07:20:38 host sshd[9179]: Disconnected from 110.39.142.162 port 42274 [preauth]
Jan  5 07:20:55 host sshd[9255]: User root from 195.154.19.216 not allowed because not listed in AllowUsers
Jan  5 07:20:55 host sshd[9255]: input_userauth_request: invalid user root [preauth]
Jan  5 07:20:55 host unix_chkpwd[9260]: password check failed for user (root)
Jan  5 07:20:55 host sshd[9255]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.154.19.216  user=root
Jan  5 07:20:55 host sshd[9255]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 07:20:57 host sshd[9255]: Failed password for invalid user root from 195.154.19.216 port 45212 ssh2
Jan  5 07:20:57 host sshd[9255]: Received disconnect from 195.154.19.216 port 45212:11: Bye Bye [preauth]
Jan  5 07:20:57 host sshd[9255]: Disconnected from 195.154.19.216 port 45212 [preauth]
Jan  5 07:20:58 host sshd[9266]: Invalid user administrador from 193.179.226.199 port 56756
Jan  5 07:20:58 host sshd[9266]: input_userauth_request: invalid user administrador [preauth]
Jan  5 07:20:58 host sshd[9266]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 07:20:58 host sshd[9266]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.179.226.199
Jan  5 07:20:59 host sshd[9268]: User root from 202.169.46.155 not allowed because not listed in AllowUsers
Jan  5 07:20:59 host sshd[9268]: input_userauth_request: invalid user root [preauth]
Jan  5 07:20:59 host unix_chkpwd[9292]: password check failed for user (root)
Jan  5 07:20:59 host sshd[9268]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.169.46.155  user=root
Jan  5 07:20:59 host sshd[9268]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 07:21:00 host sshd[9266]: Failed password for invalid user administrador from 193.179.226.199 port 56756 ssh2
Jan  5 07:21:00 host sshd[9266]: Received disconnect from 193.179.226.199 port 56756:11: Bye Bye [preauth]
Jan  5 07:21:00 host sshd[9266]: Disconnected from 193.179.226.199 port 56756 [preauth]
Jan  5 07:21:01 host sshd[9305]: Invalid user gabriel from 201.217.143.51 port 55234
Jan  5 07:21:01 host sshd[9305]: input_userauth_request: invalid user gabriel [preauth]
Jan  5 07:21:01 host sshd[9305]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 07:21:01 host sshd[9305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.217.143.51
Jan  5 07:21:02 host sshd[9268]: Failed password for invalid user root from 202.169.46.155 port 37128 ssh2
Jan  5 07:21:02 host sshd[9268]: Received disconnect from 202.169.46.155 port 37128:11: Bye Bye [preauth]
Jan  5 07:21:02 host sshd[9268]: Disconnected from 202.169.46.155 port 37128 [preauth]
Jan  5 07:21:03 host sshd[9305]: Failed password for invalid user gabriel from 201.217.143.51 port 55234 ssh2
Jan  5 07:21:04 host sshd[9305]: Received disconnect from 201.217.143.51 port 55234:11: Bye Bye [preauth]
Jan  5 07:21:04 host sshd[9305]: Disconnected from 201.217.143.51 port 55234 [preauth]
Jan  5 07:21:08 host sshd[9358]: Invalid user vpn from 196.204.226.180 port 46674
Jan  5 07:21:08 host sshd[9358]: input_userauth_request: invalid user vpn [preauth]
Jan  5 07:21:08 host sshd[9358]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 07:21:08 host sshd[9358]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.204.226.180
Jan  5 07:21:09 host sshd[9362]: User root from 23.94.43.69 not allowed because not listed in AllowUsers
Jan  5 07:21:09 host sshd[9362]: input_userauth_request: invalid user root [preauth]
Jan  5 07:21:09 host unix_chkpwd[9367]: password check failed for user (root)
Jan  5 07:21:09 host sshd[9362]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.94.43.69  user=root
Jan  5 07:21:09 host sshd[9362]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 07:21:11 host sshd[9358]: Failed password for invalid user vpn from 196.204.226.180 port 46674 ssh2
Jan  5 07:21:11 host sshd[9358]: Received disconnect from 196.204.226.180 port 46674:11: Bye Bye [preauth]
Jan  5 07:21:11 host sshd[9358]: Disconnected from 196.204.226.180 port 46674 [preauth]
Jan  5 07:21:12 host sshd[9362]: Failed password for invalid user root from 23.94.43.69 port 37822 ssh2
Jan  5 07:21:12 host sshd[9362]: Received disconnect from 23.94.43.69 port 37822:11: Bye Bye [preauth]
Jan  5 07:21:12 host sshd[9362]: Disconnected from 23.94.43.69 port 37822 [preauth]
Jan  5 07:21:23 host sshd[9497]: Invalid user bill from 165.227.166.247 port 37412
Jan  5 07:21:23 host sshd[9497]: input_userauth_request: invalid user bill [preauth]
Jan  5 07:21:23 host sshd[9497]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 07:21:23 host sshd[9497]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.247
Jan  5 07:21:25 host sshd[9497]: Failed password for invalid user bill from 165.227.166.247 port 37412 ssh2
Jan  5 07:21:26 host sshd[9497]: Received disconnect from 165.227.166.247 port 37412:11: Bye Bye [preauth]
Jan  5 07:21:26 host sshd[9497]: Disconnected from 165.227.166.247 port 37412 [preauth]
Jan  5 07:21:28 host sshd[9572]: User root from 157.230.228.27 not allowed because not listed in AllowUsers
Jan  5 07:21:28 host sshd[9572]: input_userauth_request: invalid user root [preauth]
Jan  5 07:21:28 host unix_chkpwd[9577]: password check failed for user (root)
Jan  5 07:21:28 host sshd[9572]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.228.27  user=root
Jan  5 07:21:28 host sshd[9572]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 07:21:30 host sshd[9572]: Failed password for invalid user root from 157.230.228.27 port 41338 ssh2
Jan  5 07:21:40 host sshd[9627]: Invalid user dev from 137.184.84.188 port 39204
Jan  5 07:21:40 host sshd[9627]: input_userauth_request: invalid user dev [preauth]
Jan  5 07:21:40 host sshd[9627]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 07:21:40 host sshd[9627]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.84.188
Jan  5 07:21:41 host sshd[9627]: Failed password for invalid user dev from 137.184.84.188 port 39204 ssh2
Jan  5 07:21:42 host sshd[9627]: Received disconnect from 137.184.84.188 port 39204:11: Bye Bye [preauth]
Jan  5 07:21:42 host sshd[9627]: Disconnected from 137.184.84.188 port 39204 [preauth]
Jan  5 07:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  5 07:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 07:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 07:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  5 07:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 07:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 07:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  5 07:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 07:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 07:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  5 07:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 07:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 07:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  5 07:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 07:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 07:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  5 07:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 07:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 07:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  5 07:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 07:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 07:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  5 07:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 07:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 07:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  5 07:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 07:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 07:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  5 07:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 07:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 07:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  5 07:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 07:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 07:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  5 07:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 07:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 07:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  5 07:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 07:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 07:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=ugotscom user-3=wwwrmswll user-4=wwwresourcehunte user-5=keralaholi user-6=travelboniface user-7=wwwkaretakers user-8=cochintaxi user-9=laundryboniface user-10=dartsimp user-11=a2zgroup user-12=wwwletsstalkfood user-13=straightcurve user-14=wwwevmhonda user-15=bonifacegroup user-16=mrsclean user-17=wwwnexidigital user-18=kottayamcalldriv user-19=phmetals user-20=gifterman user-21=palco123 user-22=wwwkapin user-23=woodpeck user-24=remysagr user-25=disposeat user-26=wwwkmaorg user-27=pmcresources user-28=wwwtestugo user-29=shalinijames user-30=vfmassets feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  5 07:21:53 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  5 07:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 07:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 07:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  5 07:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 07:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 07:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-j3wFQKK3cDDR8V1g.~
Jan  5 07:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 07:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 07:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-j3wFQKK3cDDR8V1g.~'
Jan  5 07:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 07:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 07:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-j3wFQKK3cDDR8V1g.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  5 07:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 07:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 07:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  5 07:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 07:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 07:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  5 07:21:57 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 07:21:57 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 07:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  5 07:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 07:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 07:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  5 07:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 07:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 07:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  5 07:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 07:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 07:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  5 07:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 07:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 07:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  5 07:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 07:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 07:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  5 07:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  5 07:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  5 07:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  5 07:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  5 07:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  5 07:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  5 07:22:06 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  5 07:22:11 host sshd[9832]: Invalid user support from 193.179.226.199 port 52006
Jan  5 07:22:11 host sshd[9832]: input_userauth_request: invalid user support [preauth]
Jan  5 07:22:11 host sshd[9832]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 07:22:11 host sshd[9832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.179.226.199
Jan  5 07:22:11 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  5 07:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  5 07:22:11 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 07:22:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 07:22:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  5 07:22:12 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 07:22:12 host sshd[9832]: Failed password for invalid user support from 193.179.226.199 port 52006 ssh2
Jan  5 07:22:13 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 07:22:13 host sshd[9832]: Received disconnect from 193.179.226.199 port 52006:11: Bye Bye [preauth]
Jan  5 07:22:13 host sshd[9832]: Disconnected from 193.179.226.199 port 52006 [preauth]
Jan  5 07:22:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  5 07:22:13 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 07:22:18 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 07:22:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  5 07:22:18 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 07:22:19 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 07:22:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  5 07:22:19 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 07:22:21 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 07:22:26 host sshd[10073]: Invalid user support from 165.227.166.247 port 60204
Jan  5 07:22:26 host sshd[10073]: input_userauth_request: invalid user support [preauth]
Jan  5 07:22:26 host sshd[10073]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 07:22:26 host sshd[10073]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.247
Jan  5 07:22:27 host sshd[10073]: Failed password for invalid user support from 165.227.166.247 port 60204 ssh2
Jan  5 07:22:28 host sshd[10073]: Received disconnect from 165.227.166.247 port 60204:11: Bye Bye [preauth]
Jan  5 07:22:28 host sshd[10073]: Disconnected from 165.227.166.247 port 60204 [preauth]
Jan  5 07:22:44 host sshd[10151]: User root from 137.184.84.188 not allowed because not listed in AllowUsers
Jan  5 07:22:44 host sshd[10151]: input_userauth_request: invalid user root [preauth]
Jan  5 07:22:44 host unix_chkpwd[10156]: password check failed for user (root)
Jan  5 07:22:44 host sshd[10151]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.84.188  user=root
Jan  5 07:22:44 host sshd[10151]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 07:22:46 host sshd[10151]: Failed password for invalid user root from 137.184.84.188 port 47056 ssh2
Jan  5 07:22:51 host sshd[10201]: Invalid user daniel from 201.217.143.51 port 11555
Jan  5 07:22:51 host sshd[10201]: input_userauth_request: invalid user daniel [preauth]
Jan  5 07:22:51 host sshd[10201]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 07:22:51 host sshd[10201]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.217.143.51
Jan  5 07:22:53 host sshd[10201]: Failed password for invalid user daniel from 201.217.143.51 port 11555 ssh2
Jan  5 07:22:54 host sshd[10201]: Received disconnect from 201.217.143.51 port 11555:11: Bye Bye [preauth]
Jan  5 07:22:54 host sshd[10201]: Disconnected from 201.217.143.51 port 11555 [preauth]
Jan  5 07:22:56 host sshd[10217]: Invalid user pi from 123.195.86.89 port 36458
Jan  5 07:22:56 host sshd[10217]: input_userauth_request: invalid user pi [preauth]
Jan  5 07:22:56 host sshd[10217]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 07:22:56 host sshd[10217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.195.86.89
Jan  5 07:22:58 host sshd[10217]: Failed password for invalid user pi from 123.195.86.89 port 36458 ssh2
Jan  5 07:22:58 host sshd[10217]: Connection closed by 123.195.86.89 port 36458 [preauth]
Jan  5 07:23:02 host sshd[10244]: Invalid user administrador from 103.160.69.52 port 41756
Jan  5 07:23:02 host sshd[10244]: input_userauth_request: invalid user administrador [preauth]
Jan  5 07:23:02 host sshd[10244]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 07:23:02 host sshd[10244]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.160.69.52
Jan  5 07:23:05 host sshd[10244]: Failed password for invalid user administrador from 103.160.69.52 port 41756 ssh2
Jan  5 07:23:05 host sshd[10244]: Received disconnect from 103.160.69.52 port 41756:11: Bye Bye [preauth]
Jan  5 07:23:05 host sshd[10244]: Disconnected from 103.160.69.52 port 41756 [preauth]
Jan  5 07:23:31 host sshd[10371]: Invalid user nk from 101.33.80.197 port 48770
Jan  5 07:23:31 host sshd[10371]: input_userauth_request: invalid user nk [preauth]
Jan  5 07:23:31 host sshd[10371]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 07:23:31 host sshd[10371]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.33.80.197
Jan  5 07:23:33 host sshd[10371]: Failed password for invalid user nk from 101.33.80.197 port 48770 ssh2
Jan  5 07:23:33 host sshd[10371]: Received disconnect from 101.33.80.197 port 48770:11: Bye Bye [preauth]
Jan  5 07:23:33 host sshd[10371]: Disconnected from 101.33.80.197 port 48770 [preauth]
Jan  5 07:23:56 host sshd[10410]: Invalid user xh from 45.195.9.110 port 43230
Jan  5 07:23:56 host sshd[10410]: input_userauth_request: invalid user xh [preauth]
Jan  5 07:23:56 host sshd[10410]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 07:23:56 host sshd[10410]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.195.9.110
Jan  5 07:23:58 host sshd[10410]: Failed password for invalid user xh from 45.195.9.110 port 43230 ssh2
Jan  5 07:23:58 host sshd[10410]: Received disconnect from 45.195.9.110 port 43230:11: Bye Bye [preauth]
Jan  5 07:23:58 host sshd[10410]: Disconnected from 45.195.9.110 port 43230 [preauth]
Jan  5 07:24:10 host sshd[10441]: User root from 201.217.143.51 not allowed because not listed in AllowUsers
Jan  5 07:24:10 host sshd[10441]: input_userauth_request: invalid user root [preauth]
Jan  5 07:24:10 host unix_chkpwd[10445]: password check failed for user (root)
Jan  5 07:24:10 host sshd[10441]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.217.143.51  user=root
Jan  5 07:24:10 host sshd[10441]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 07:24:12 host sshd[10441]: Failed password for invalid user root from 201.217.143.51 port 8620 ssh2
Jan  5 07:24:12 host sshd[10441]: Received disconnect from 201.217.143.51 port 8620:11: Bye Bye [preauth]
Jan  5 07:24:12 host sshd[10441]: Disconnected from 201.217.143.51 port 8620 [preauth]
Jan  5 07:24:24 host sshd[10508]: User root from 103.148.113.55 not allowed because not listed in AllowUsers
Jan  5 07:24:24 host sshd[10508]: input_userauth_request: invalid user root [preauth]
Jan  5 07:24:24 host unix_chkpwd[10512]: password check failed for user (root)
Jan  5 07:24:24 host sshd[10508]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.148.113.55  user=root
Jan  5 07:24:24 host sshd[10508]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 07:24:27 host sshd[10508]: Failed password for invalid user root from 103.148.113.55 port 58702 ssh2
Jan  5 07:24:27 host sshd[10508]: Received disconnect from 103.148.113.55 port 58702:11: Bye Bye [preauth]
Jan  5 07:24:27 host sshd[10508]: Disconnected from 103.148.113.55 port 58702 [preauth]
Jan  5 07:25:06 host sshd[10666]: Invalid user support from 103.160.69.52 port 42300
Jan  5 07:25:06 host sshd[10666]: input_userauth_request: invalid user support [preauth]
Jan  5 07:25:06 host sshd[10666]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 07:25:06 host sshd[10666]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.160.69.52
Jan  5 07:25:08 host sshd[10666]: Failed password for invalid user support from 103.160.69.52 port 42300 ssh2
Jan  5 07:25:09 host sshd[10666]: Received disconnect from 103.160.69.52 port 42300:11: Bye Bye [preauth]
Jan  5 07:25:09 host sshd[10666]: Disconnected from 103.160.69.52 port 42300 [preauth]
Jan  5 07:25:19 host sshd[10722]: Invalid user ed from 45.195.9.110 port 44716
Jan  5 07:25:19 host sshd[10722]: input_userauth_request: invalid user ed [preauth]
Jan  5 07:25:19 host sshd[10722]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 07:25:19 host sshd[10722]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.195.9.110
Jan  5 07:25:21 host sshd[10722]: Failed password for invalid user ed from 45.195.9.110 port 44716 ssh2
Jan  5 07:25:21 host sshd[10722]: Received disconnect from 45.195.9.110 port 44716:11: Bye Bye [preauth]
Jan  5 07:25:21 host sshd[10722]: Disconnected from 45.195.9.110 port 44716 [preauth]
Jan  5 07:28:07 host sshd[11303]: User root from 112.254.116.124 not allowed because not listed in AllowUsers
Jan  5 07:28:07 host sshd[11303]: input_userauth_request: invalid user root [preauth]
Jan  5 07:28:07 host unix_chkpwd[11307]: password check failed for user (root)
Jan  5 07:28:07 host sshd[11303]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.254.116.124  user=root
Jan  5 07:28:07 host sshd[11303]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 07:28:09 host sshd[11303]: Failed password for invalid user root from 112.254.116.124 port 59072 ssh2
Jan  5 07:28:09 host sshd[11303]: Received disconnect from 112.254.116.124 port 59072:11: Bye Bye [preauth]
Jan  5 07:28:09 host sshd[11303]: Disconnected from 112.254.116.124 port 59072 [preauth]
Jan  5 07:28:59 host sshd[11460]: Invalid user lsy from 103.13.40.2 port 53018
Jan  5 07:28:59 host sshd[11460]: input_userauth_request: invalid user lsy [preauth]
Jan  5 07:28:59 host sshd[11460]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 07:28:59 host sshd[11460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2
Jan  5 07:29:01 host sshd[11460]: Failed password for invalid user lsy from 103.13.40.2 port 53018 ssh2
Jan  5 07:29:01 host sshd[11460]: Connection closed by 103.13.40.2 port 53018 [preauth]
Jan  5 07:34:05 host sshd[12508]: User root from 101.33.80.197 not allowed because not listed in AllowUsers
Jan  5 07:34:05 host sshd[12508]: input_userauth_request: invalid user root [preauth]
Jan  5 07:34:05 host unix_chkpwd[12530]: password check failed for user (root)
Jan  5 07:34:05 host sshd[12508]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.33.80.197  user=root
Jan  5 07:34:05 host sshd[12508]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 07:34:07 host sshd[12508]: Failed password for invalid user root from 101.33.80.197 port 42398 ssh2
Jan  5 07:34:07 host sshd[12508]: Received disconnect from 101.33.80.197 port 42398:11: Bye Bye [preauth]
Jan  5 07:34:07 host sshd[12508]: Disconnected from 101.33.80.197 port 42398 [preauth]
Jan  5 07:38:25 host sshd[13345]: Invalid user jack from 107.189.30.59 port 40356
Jan  5 07:38:25 host sshd[13345]: input_userauth_request: invalid user jack [preauth]
Jan  5 07:38:25 host sshd[13345]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 07:38:25 host sshd[13345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59
Jan  5 07:38:27 host sshd[13345]: Failed password for invalid user jack from 107.189.30.59 port 40356 ssh2
Jan  5 07:38:28 host sshd[13345]: Connection closed by 107.189.30.59 port 40356 [preauth]
Jan  5 07:44:05 host sshd[14314]: User root from 45.181.228.101 not allowed because not listed in AllowUsers
Jan  5 07:44:05 host sshd[14314]: input_userauth_request: invalid user root [preauth]
Jan  5 07:44:05 host unix_chkpwd[14317]: password check failed for user (root)
Jan  5 07:44:05 host sshd[14314]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.181.228.101  user=root
Jan  5 07:44:05 host sshd[14314]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 07:44:06 host sshd[14314]: Failed password for invalid user root from 45.181.228.101 port 54540 ssh2
Jan  5 07:44:07 host sshd[14314]: Received disconnect from 45.181.228.101 port 54540:11: Bye Bye [preauth]
Jan  5 07:44:07 host sshd[14314]: Disconnected from 45.181.228.101 port 54540 [preauth]
Jan  5 07:44:09 host sshd[14324]: User root from 164.163.98.49 not allowed because not listed in AllowUsers
Jan  5 07:44:09 host sshd[14324]: input_userauth_request: invalid user root [preauth]
Jan  5 07:44:09 host unix_chkpwd[14340]: password check failed for user (root)
Jan  5 07:44:09 host sshd[14324]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.163.98.49  user=root
Jan  5 07:44:09 host sshd[14324]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 07:44:11 host sshd[14324]: Failed password for invalid user root from 164.163.98.49 port 52875 ssh2
Jan  5 07:44:12 host sshd[14324]: Received disconnect from 164.163.98.49 port 52875:11: Bye Bye [preauth]
Jan  5 07:44:12 host sshd[14324]: Disconnected from 164.163.98.49 port 52875 [preauth]
Jan  5 07:44:21 host sshd[14433]: Invalid user appldev from 186.67.150.170 port 47471
Jan  5 07:44:21 host sshd[14433]: input_userauth_request: invalid user appldev [preauth]
Jan  5 07:44:21 host sshd[14433]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 07:44:21 host sshd[14433]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.67.150.170
Jan  5 07:44:23 host sshd[14433]: Failed password for invalid user appldev from 186.67.150.170 port 47471 ssh2
Jan  5 07:44:23 host sshd[14433]: Received disconnect from 186.67.150.170 port 47471:11: Bye Bye [preauth]
Jan  5 07:44:23 host sshd[14433]: Disconnected from 186.67.150.170 port 47471 [preauth]
Jan  5 07:44:40 host sshd[14502]: Invalid user deployer from 180.190.241.88 port 45564
Jan  5 07:44:40 host sshd[14502]: input_userauth_request: invalid user deployer [preauth]
Jan  5 07:44:40 host sshd[14502]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 07:44:40 host sshd[14502]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.190.241.88
Jan  5 07:44:42 host sshd[14502]: Failed password for invalid user deployer from 180.190.241.88 port 45564 ssh2
Jan  5 07:44:42 host sshd[14502]: Received disconnect from 180.190.241.88 port 45564:11: Bye Bye [preauth]
Jan  5 07:44:42 host sshd[14502]: Disconnected from 180.190.241.88 port 45564 [preauth]
Jan  5 07:45:12 host sshd[14605]: User root from 139.59.26.97 not allowed because not listed in AllowUsers
Jan  5 07:45:12 host sshd[14605]: input_userauth_request: invalid user root [preauth]
Jan  5 07:45:12 host unix_chkpwd[14607]: password check failed for user (root)
Jan  5 07:45:12 host sshd[14605]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.26.97  user=root
Jan  5 07:45:12 host sshd[14605]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 07:45:14 host sshd[14605]: Failed password for invalid user root from 139.59.26.97 port 45298 ssh2
Jan  5 07:45:14 host sshd[14605]: Received disconnect from 139.59.26.97 port 45298:11: Bye Bye [preauth]
Jan  5 07:45:14 host sshd[14605]: Disconnected from 139.59.26.97 port 45298 [preauth]
Jan  5 07:45:31 host sshd[14671]: Did not receive identification string from 149.129.220.222 port 61000
Jan  5 07:45:56 host sshd[14762]: Invalid user steam from 45.181.228.101 port 53008
Jan  5 07:45:56 host sshd[14762]: input_userauth_request: invalid user steam [preauth]
Jan  5 07:45:56 host sshd[14762]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 07:45:56 host sshd[14762]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.181.228.101
Jan  5 07:45:58 host sshd[14762]: Failed password for invalid user steam from 45.181.228.101 port 53008 ssh2
Jan  5 07:45:59 host sshd[14762]: Received disconnect from 45.181.228.101 port 53008:11: Bye Bye [preauth]
Jan  5 07:45:59 host sshd[14762]: Disconnected from 45.181.228.101 port 53008 [preauth]
Jan  5 07:47:00 host sshd[14929]: Invalid user user2 from 76.176.70.129 port 47608
Jan  5 07:47:00 host sshd[14929]: input_userauth_request: invalid user user2 [preauth]
Jan  5 07:47:00 host sshd[14929]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 07:47:00 host sshd[14929]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=76.176.70.129
Jan  5 07:47:01 host sshd[14929]: Failed password for invalid user user2 from 76.176.70.129 port 47608 ssh2
Jan  5 07:47:01 host sshd[14929]: Received disconnect from 76.176.70.129 port 47608:11: Bye Bye [preauth]
Jan  5 07:47:01 host sshd[14929]: Disconnected from 76.176.70.129 port 47608 [preauth]
Jan  5 07:47:20 host sshd[14972]: Invalid user log from 186.67.150.170 port 35359
Jan  5 07:47:20 host sshd[14972]: input_userauth_request: invalid user log [preauth]
Jan  5 07:47:20 host sshd[14972]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 07:47:20 host sshd[14972]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.67.150.170
Jan  5 07:47:22 host sshd[14972]: Failed password for invalid user log from 186.67.150.170 port 35359 ssh2
Jan  5 07:47:22 host sshd[14972]: Received disconnect from 186.67.150.170 port 35359:11: Bye Bye [preauth]
Jan  5 07:47:22 host sshd[14972]: Disconnected from 186.67.150.170 port 35359 [preauth]
Jan  5 07:47:54 host sshd[15050]: User root from 178.33.30.197 not allowed because not listed in AllowUsers
Jan  5 07:47:54 host sshd[15050]: input_userauth_request: invalid user root [preauth]
Jan  5 07:47:55 host unix_chkpwd[15054]: password check failed for user (root)
Jan  5 07:47:55 host sshd[15050]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.33.30.197  user=root
Jan  5 07:47:55 host sshd[15050]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 07:47:56 host sshd[15050]: Failed password for invalid user root from 178.33.30.197 port 51676 ssh2
Jan  5 07:47:56 host sshd[15050]: Received disconnect from 178.33.30.197 port 51676:11: Bye Bye [preauth]
Jan  5 07:47:56 host sshd[15050]: Disconnected from 178.33.30.197 port 51676 [preauth]
Jan  5 07:48:45 host sshd[15240]: Invalid user mc from 186.67.150.170 port 47048
Jan  5 07:48:45 host sshd[15240]: input_userauth_request: invalid user mc [preauth]
Jan  5 07:48:45 host sshd[15240]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 07:48:45 host sshd[15240]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.67.150.170
Jan  5 07:48:47 host sshd[15240]: Failed password for invalid user mc from 186.67.150.170 port 47048 ssh2
Jan  5 07:48:47 host sshd[15240]: Received disconnect from 186.67.150.170 port 47048:11: Bye Bye [preauth]
Jan  5 07:48:47 host sshd[15240]: Disconnected from 186.67.150.170 port 47048 [preauth]
Jan  5 07:49:17 host sshd[15331]: User root from 122.154.56.18 not allowed because not listed in AllowUsers
Jan  5 07:49:17 host sshd[15331]: input_userauth_request: invalid user root [preauth]
Jan  5 07:49:17 host unix_chkpwd[15334]: password check failed for user (root)
Jan  5 07:49:17 host sshd[15331]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.154.56.18  user=root
Jan  5 07:49:17 host sshd[15331]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 07:49:19 host sshd[15331]: Failed password for invalid user root from 122.154.56.18 port 41330 ssh2
Jan  5 07:49:19 host sshd[15331]: Received disconnect from 122.154.56.18 port 41330:11: Bye Bye [preauth]
Jan  5 07:49:19 host sshd[15331]: Disconnected from 122.154.56.18 port 41330 [preauth]
Jan  5 07:49:25 host sshd[15372]: User root from 178.128.215.16 not allowed because not listed in AllowUsers
Jan  5 07:49:25 host sshd[15372]: input_userauth_request: invalid user root [preauth]
Jan  5 07:49:25 host unix_chkpwd[15375]: password check failed for user (root)
Jan  5 07:49:25 host sshd[15372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.215.16  user=root
Jan  5 07:49:25 host sshd[15372]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 07:49:27 host sshd[15372]: Failed password for invalid user root from 178.128.215.16 port 53390 ssh2
Jan  5 07:49:27 host sshd[15372]: Received disconnect from 178.128.215.16 port 53390:11: Bye Bye [preauth]
Jan  5 07:49:27 host sshd[15372]: Disconnected from 178.128.215.16 port 53390 [preauth]
Jan  5 07:50:04 host sshd[15441]: Invalid user wzhang from 92.46.108.20 port 50484
Jan  5 07:50:04 host sshd[15441]: input_userauth_request: invalid user wzhang [preauth]
Jan  5 07:50:05 host sshd[15441]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 07:50:05 host sshd[15441]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20
Jan  5 07:50:06 host sshd[15441]: Failed password for invalid user wzhang from 92.46.108.20 port 50484 ssh2
Jan  5 07:50:08 host sshd[15441]: Connection closed by 92.46.108.20 port 50484 [preauth]
Jan  5 07:50:40 host sshd[15548]: User root from 178.33.30.197 not allowed because not listed in AllowUsers
Jan  5 07:50:40 host sshd[15548]: input_userauth_request: invalid user root [preauth]
Jan  5 07:50:40 host unix_chkpwd[15551]: password check failed for user (root)
Jan  5 07:50:40 host sshd[15548]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.33.30.197  user=root
Jan  5 07:50:40 host sshd[15548]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 07:50:42 host sshd[15548]: Failed password for invalid user root from 178.33.30.197 port 37988 ssh2
Jan  5 07:51:19 host sshd[15648]: Invalid user usertest from 180.190.241.88 port 49160
Jan  5 07:51:19 host sshd[15648]: input_userauth_request: invalid user usertest [preauth]
Jan  5 07:51:19 host sshd[15648]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 07:51:19 host sshd[15648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.190.241.88
Jan  5 07:51:21 host sshd[15648]: Failed password for invalid user usertest from 180.190.241.88 port 49160 ssh2
Jan  5 07:51:21 host sshd[15648]: Received disconnect from 180.190.241.88 port 49160:11: Bye Bye [preauth]
Jan  5 07:51:21 host sshd[15648]: Disconnected from 180.190.241.88 port 49160 [preauth]
Jan  5 07:51:36 host sshd[15705]: Invalid user halo from 139.59.26.97 port 40504
Jan  5 07:51:36 host sshd[15705]: input_userauth_request: invalid user halo [preauth]
Jan  5 07:51:36 host sshd[15705]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 07:51:36 host sshd[15705]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.26.97
Jan  5 07:51:38 host sshd[15705]: Failed password for invalid user halo from 139.59.26.97 port 40504 ssh2
Jan  5 07:51:38 host sshd[15705]: Received disconnect from 139.59.26.97 port 40504:11: Bye Bye [preauth]
Jan  5 07:51:38 host sshd[15705]: Disconnected from 139.59.26.97 port 40504 [preauth]
Jan  5 07:51:43 host sshd[15753]: User root from 164.163.98.49 not allowed because not listed in AllowUsers
Jan  5 07:51:43 host sshd[15753]: input_userauth_request: invalid user root [preauth]
Jan  5 07:51:43 host unix_chkpwd[15757]: password check failed for user (root)
Jan  5 07:51:43 host sshd[15753]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.163.98.49  user=root
Jan  5 07:51:43 host sshd[15753]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 07:51:45 host sshd[15753]: Failed password for invalid user root from 164.163.98.49 port 54422 ssh2
Jan  5 07:51:45 host sshd[15753]: Received disconnect from 164.163.98.49 port 54422:11: Bye Bye [preauth]
Jan  5 07:51:45 host sshd[15753]: Disconnected from 164.163.98.49 port 54422 [preauth]
Jan  5 07:51:55 host sshd[15806]: Invalid user git from 76.176.70.129 port 43299
Jan  5 07:51:55 host sshd[15806]: input_userauth_request: invalid user git [preauth]
Jan  5 07:51:55 host sshd[15806]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 07:51:55 host sshd[15806]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=76.176.70.129
Jan  5 07:51:57 host sshd[15806]: Failed password for invalid user git from 76.176.70.129 port 43299 ssh2
Jan  5 07:51:57 host sshd[15806]: Received disconnect from 76.176.70.129 port 43299:11: Bye Bye [preauth]
Jan  5 07:51:57 host sshd[15806]: Disconnected from 76.176.70.129 port 43299 [preauth]
Jan  5 07:52:34 host sshd[15893]: User root from 178.128.215.16 not allowed because not listed in AllowUsers
Jan  5 07:52:34 host sshd[15893]: input_userauth_request: invalid user root [preauth]
Jan  5 07:52:34 host unix_chkpwd[15895]: password check failed for user (root)
Jan  5 07:52:34 host sshd[15893]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.215.16  user=root
Jan  5 07:52:34 host sshd[15893]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 07:52:36 host sshd[15893]: Failed password for invalid user root from 178.128.215.16 port 58912 ssh2
Jan  5 07:52:46 host sshd[15942]: User root from 180.190.241.88 not allowed because not listed in AllowUsers
Jan  5 07:52:46 host sshd[15942]: input_userauth_request: invalid user root [preauth]
Jan  5 07:52:46 host unix_chkpwd[15948]: password check failed for user (root)
Jan  5 07:52:46 host sshd[15942]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.190.241.88  user=root
Jan  5 07:52:46 host sshd[15942]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 07:52:48 host sshd[15942]: Failed password for invalid user root from 180.190.241.88 port 44994 ssh2
Jan  5 07:52:48 host sshd[15942]: Received disconnect from 180.190.241.88 port 44994:11: Bye Bye [preauth]
Jan  5 07:52:48 host sshd[15942]: Disconnected from 180.190.241.88 port 44994 [preauth]
Jan  5 07:53:10 host sshd[16009]: Invalid user user9 from 76.176.70.129 port 54958
Jan  5 07:53:10 host sshd[16009]: input_userauth_request: invalid user user9 [preauth]
Jan  5 07:53:10 host sshd[16009]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 07:53:10 host sshd[16009]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=76.176.70.129
Jan  5 07:53:12 host sshd[16009]: Failed password for invalid user user9 from 76.176.70.129 port 54958 ssh2
Jan  5 08:03:58 host sshd[17710]: User root from 143.198.132.244 not allowed because not listed in AllowUsers
Jan  5 08:03:58 host sshd[17710]: input_userauth_request: invalid user root [preauth]
Jan  5 08:03:58 host unix_chkpwd[17714]: password check failed for user (root)
Jan  5 08:03:58 host sshd[17710]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.132.244  user=root
Jan  5 08:03:58 host sshd[17710]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 08:04:00 host sshd[17710]: Failed password for invalid user root from 143.198.132.244 port 40924 ssh2
Jan  5 08:04:00 host sshd[17710]: Received disconnect from 143.198.132.244 port 40924:11: Bye Bye [preauth]
Jan  5 08:04:00 host sshd[17710]: Disconnected from 143.198.132.244 port 40924 [preauth]
Jan  5 08:04:49 host sshd[17826]: Invalid user desliga from 43.157.10.218 port 48874
Jan  5 08:04:49 host sshd[17826]: input_userauth_request: invalid user desliga [preauth]
Jan  5 08:04:49 host sshd[17826]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 08:04:49 host sshd[17826]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.157.10.218
Jan  5 08:04:52 host sshd[17826]: Failed password for invalid user desliga from 43.157.10.218 port 48874 ssh2
Jan  5 08:04:52 host sshd[17826]: Received disconnect from 43.157.10.218 port 48874:11: Bye Bye [preauth]
Jan  5 08:04:52 host sshd[17826]: Disconnected from 43.157.10.218 port 48874 [preauth]
Jan  5 08:05:01 host sshd[17855]: User root from 43.131.58.217 not allowed because not listed in AllowUsers
Jan  5 08:05:01 host sshd[17855]: input_userauth_request: invalid user root [preauth]
Jan  5 08:05:01 host unix_chkpwd[17879]: password check failed for user (root)
Jan  5 08:05:01 host sshd[17855]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.131.58.217  user=root
Jan  5 08:05:01 host sshd[17855]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 08:05:03 host sshd[17855]: Failed password for invalid user root from 43.131.58.217 port 59794 ssh2
Jan  5 08:05:03 host sshd[17855]: Received disconnect from 43.131.58.217 port 59794:11: Bye Bye [preauth]
Jan  5 08:05:03 host sshd[17855]: Disconnected from 43.131.58.217 port 59794 [preauth]
Jan  5 08:06:20 host sshd[18063]: User root from 137.184.35.63 not allowed because not listed in AllowUsers
Jan  5 08:06:20 host sshd[18063]: input_userauth_request: invalid user root [preauth]
Jan  5 08:06:20 host unix_chkpwd[18068]: password check failed for user (root)
Jan  5 08:06:20 host sshd[18063]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.35.63  user=root
Jan  5 08:06:20 host sshd[18063]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 08:06:22 host sshd[18063]: Failed password for invalid user root from 137.184.35.63 port 34696 ssh2
Jan  5 08:06:22 host sshd[18063]: Received disconnect from 137.184.35.63 port 34696:11: Bye Bye [preauth]
Jan  5 08:06:22 host sshd[18063]: Disconnected from 137.184.35.63 port 34696 [preauth]
Jan  5 08:06:30 host sshd[18108]: Invalid user jenkins from 43.132.253.90 port 64144
Jan  5 08:06:30 host sshd[18108]: input_userauth_request: invalid user jenkins [preauth]
Jan  5 08:06:30 host sshd[18108]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 08:06:30 host sshd[18108]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.132.253.90
Jan  5 08:06:32 host sshd[18108]: Failed password for invalid user jenkins from 43.132.253.90 port 64144 ssh2
Jan  5 08:06:32 host sshd[18108]: Received disconnect from 43.132.253.90 port 64144:11: Bye Bye [preauth]
Jan  5 08:06:32 host sshd[18108]: Disconnected from 43.132.253.90 port 64144 [preauth]
Jan  5 08:06:34 host sshd[18118]: User root from 186.103.205.82 not allowed because not listed in AllowUsers
Jan  5 08:06:34 host sshd[18118]: input_userauth_request: invalid user root [preauth]
Jan  5 08:06:34 host unix_chkpwd[18122]: password check failed for user (root)
Jan  5 08:06:34 host sshd[18118]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.103.205.82  user=root
Jan  5 08:06:34 host sshd[18118]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 08:06:37 host sshd[18118]: Failed password for invalid user root from 186.103.205.82 port 3294 ssh2
Jan  5 08:06:37 host sshd[18118]: Received disconnect from 186.103.205.82 port 3294:11: Bye Bye [preauth]
Jan  5 08:06:37 host sshd[18118]: Disconnected from 186.103.205.82 port 3294 [preauth]
Jan  5 08:07:05 host sshd[18180]: Invalid user amp from 49.248.95.218 port 23426
Jan  5 08:07:05 host sshd[18180]: input_userauth_request: invalid user amp [preauth]
Jan  5 08:07:05 host sshd[18180]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 08:07:05 host sshd[18180]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.248.95.218
Jan  5 08:07:07 host sshd[18180]: Failed password for invalid user amp from 49.248.95.218 port 23426 ssh2
Jan  5 08:07:07 host sshd[18180]: Received disconnect from 49.248.95.218 port 23426:11: Bye Bye [preauth]
Jan  5 08:07:07 host sshd[18180]: Disconnected from 49.248.95.218 port 23426 [preauth]
Jan  5 08:07:12 host sshd[18205]: User root from 41.65.224.81 not allowed because not listed in AllowUsers
Jan  5 08:07:12 host sshd[18205]: input_userauth_request: invalid user root [preauth]
Jan  5 08:07:12 host unix_chkpwd[18209]: password check failed for user (root)
Jan  5 08:07:12 host sshd[18205]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.65.224.81  user=root
Jan  5 08:07:12 host sshd[18205]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 08:07:14 host sshd[18205]: Failed password for invalid user root from 41.65.224.81 port 34738 ssh2
Jan  5 08:07:14 host sshd[18205]: Received disconnect from 41.65.224.81 port 34738:11: Bye Bye [preauth]
Jan  5 08:07:14 host sshd[18205]: Disconnected from 41.65.224.81 port 34738 [preauth]
Jan  5 08:07:16 host sshd[18219]: Invalid user nagios from 27.112.78.168 port 34246
Jan  5 08:07:16 host sshd[18219]: input_userauth_request: invalid user nagios [preauth]
Jan  5 08:07:16 host sshd[18219]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 08:07:16 host sshd[18219]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.112.78.168
Jan  5 08:07:18 host sshd[18219]: Failed password for invalid user nagios from 27.112.78.168 port 34246 ssh2
Jan  5 08:07:18 host sshd[18219]: Received disconnect from 27.112.78.168 port 34246:11: Bye Bye [preauth]
Jan  5 08:07:18 host sshd[18219]: Disconnected from 27.112.78.168 port 34246 [preauth]
Jan  5 08:07:40 host sshd[18301]: Invalid user desliga from 110.50.84.76 port 37590
Jan  5 08:07:40 host sshd[18301]: input_userauth_request: invalid user desliga [preauth]
Jan  5 08:07:40 host sshd[18301]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 08:07:40 host sshd[18301]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.50.84.76
Jan  5 08:07:42 host sshd[18301]: Failed password for invalid user desliga from 110.50.84.76 port 37590 ssh2
Jan  5 08:07:42 host sshd[18301]: Received disconnect from 110.50.84.76 port 37590:11: Bye Bye [preauth]
Jan  5 08:07:42 host sshd[18301]: Disconnected from 110.50.84.76 port 37590 [preauth]
Jan  5 08:08:26 host sshd[18396]: User root from 104.131.6.66 not allowed because not listed in AllowUsers
Jan  5 08:08:26 host sshd[18396]: input_userauth_request: invalid user root [preauth]
Jan  5 08:08:26 host unix_chkpwd[18420]: password check failed for user (root)
Jan  5 08:08:26 host sshd[18396]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.6.66  user=root
Jan  5 08:08:26 host sshd[18396]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 08:08:28 host sshd[18396]: Failed password for invalid user root from 104.131.6.66 port 53870 ssh2
Jan  5 08:08:28 host sshd[18396]: Received disconnect from 104.131.6.66 port 53870:11: Bye Bye [preauth]
Jan  5 08:08:28 host sshd[18396]: Disconnected from 104.131.6.66 port 53870 [preauth]
Jan  5 08:08:33 host sshd[18434]: Invalid user personal from 51.83.71.70 port 53118
Jan  5 08:08:33 host sshd[18434]: input_userauth_request: invalid user personal [preauth]
Jan  5 08:08:33 host sshd[18434]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 08:08:33 host sshd[18434]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.71.70
Jan  5 08:08:35 host sshd[18434]: Failed password for invalid user personal from 51.83.71.70 port 53118 ssh2
Jan  5 08:08:35 host sshd[18434]: Received disconnect from 51.83.71.70 port 53118:11: Bye Bye [preauth]
Jan  5 08:08:35 host sshd[18434]: Disconnected from 51.83.71.70 port 53118 [preauth]
Jan  5 08:08:36 host sshd[18439]: Invalid user sample from 80.2.40.82 port 36948
Jan  5 08:08:36 host sshd[18439]: input_userauth_request: invalid user sample [preauth]
Jan  5 08:08:36 host sshd[18439]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 08:08:36 host sshd[18439]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.2.40.82
Jan  5 08:08:38 host sshd[18439]: Failed password for invalid user sample from 80.2.40.82 port 36948 ssh2
Jan  5 08:08:38 host sshd[18439]: Received disconnect from 80.2.40.82 port 36948:11: Bye Bye [preauth]
Jan  5 08:08:38 host sshd[18439]: Disconnected from 80.2.40.82 port 36948 [preauth]
Jan  5 08:09:04 host sshd[18595]: User root from 202.51.74.123 not allowed because not listed in AllowUsers
Jan  5 08:09:04 host sshd[18595]: input_userauth_request: invalid user root [preauth]
Jan  5 08:09:04 host unix_chkpwd[18599]: password check failed for user (root)
Jan  5 08:09:04 host sshd[18595]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.51.74.123  user=root
Jan  5 08:09:04 host sshd[18595]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 08:09:06 host sshd[18595]: Failed password for invalid user root from 202.51.74.123 port 51246 ssh2
Jan  5 08:09:06 host sshd[18595]: Received disconnect from 202.51.74.123 port 51246:11: Bye Bye [preauth]
Jan  5 08:09:06 host sshd[18595]: Disconnected from 202.51.74.123 port 51246 [preauth]
Jan  5 08:09:25 host sshd[18629]: Invalid user desliga from 143.198.132.244 port 41690
Jan  5 08:09:25 host sshd[18629]: input_userauth_request: invalid user desliga [preauth]
Jan  5 08:09:25 host sshd[18629]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 08:09:25 host sshd[18629]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.132.244
Jan  5 08:09:27 host sshd[18629]: Failed password for invalid user desliga from 143.198.132.244 port 41690 ssh2
Jan  5 08:09:28 host sshd[18629]: Received disconnect from 143.198.132.244 port 41690:11: Bye Bye [preauth]
Jan  5 08:09:28 host sshd[18629]: Disconnected from 143.198.132.244 port 41690 [preauth]
Jan  5 08:09:41 host sshd[18718]: User root from 43.131.58.217 not allowed because not listed in AllowUsers
Jan  5 08:09:41 host sshd[18718]: input_userauth_request: invalid user root [preauth]
Jan  5 08:09:41 host unix_chkpwd[18722]: password check failed for user (root)
Jan  5 08:09:41 host sshd[18718]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.131.58.217  user=root
Jan  5 08:09:41 host sshd[18718]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 08:09:43 host sshd[18727]: Invalid user luis from 43.157.10.218 port 45462
Jan  5 08:09:43 host sshd[18727]: input_userauth_request: invalid user luis [preauth]
Jan  5 08:09:43 host sshd[18727]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 08:09:43 host sshd[18727]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.157.10.218
Jan  5 08:09:43 host sshd[18718]: Failed password for invalid user root from 43.131.58.217 port 55284 ssh2
Jan  5 08:09:44 host sshd[18718]: Received disconnect from 43.131.58.217 port 55284:11: Bye Bye [preauth]
Jan  5 08:09:44 host sshd[18718]: Disconnected from 43.131.58.217 port 55284 [preauth]
Jan  5 08:09:45 host sshd[18727]: Failed password for invalid user luis from 43.157.10.218 port 45462 ssh2
Jan  5 08:09:45 host sshd[18727]: Received disconnect from 43.157.10.218 port 45462:11: Bye Bye [preauth]
Jan  5 08:09:45 host sshd[18727]: Disconnected from 43.157.10.218 port 45462 [preauth]
Jan  5 08:10:24 host sshd[18884]: User root from 115.240.206.206 not allowed because not listed in AllowUsers
Jan  5 08:10:24 host sshd[18884]: input_userauth_request: invalid user root [preauth]
Jan  5 08:10:24 host unix_chkpwd[18886]: password check failed for user (root)
Jan  5 08:10:24 host sshd[18884]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.240.206.206  user=root
Jan  5 08:10:24 host sshd[18884]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 08:10:26 host sshd[18884]: Failed password for invalid user root from 115.240.206.206 port 3192 ssh2
Jan  5 08:10:26 host sshd[18884]: Received disconnect from 115.240.206.206 port 3192:11: Bye Bye [preauth]
Jan  5 08:10:26 host sshd[18884]: Disconnected from 115.240.206.206 port 3192 [preauth]
Jan  5 08:10:33 host sshd[18924]: User root from 41.65.224.81 not allowed because not listed in AllowUsers
Jan  5 08:10:33 host sshd[18924]: input_userauth_request: invalid user root [preauth]
Jan  5 08:10:33 host unix_chkpwd[18930]: password check failed for user (root)
Jan  5 08:10:33 host sshd[18924]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.65.224.81  user=root
Jan  5 08:10:33 host sshd[18924]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 08:10:35 host sshd[18924]: Failed password for invalid user root from 41.65.224.81 port 55446 ssh2
Jan  5 08:10:36 host sshd[18934]: Invalid user developer from 51.83.71.70 port 57310
Jan  5 08:10:36 host sshd[18934]: input_userauth_request: invalid user developer [preauth]
Jan  5 08:10:36 host sshd[18934]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 08:10:36 host sshd[18934]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.71.70
Jan  5 08:10:36 host sshd[18924]: Received disconnect from 41.65.224.81 port 55446:11: Bye Bye [preauth]
Jan  5 08:10:36 host sshd[18924]: Disconnected from 41.65.224.81 port 55446 [preauth]
Jan  5 08:10:38 host sshd[18934]: Failed password for invalid user developer from 51.83.71.70 port 57310 ssh2
Jan  5 08:10:38 host sshd[18934]: Received disconnect from 51.83.71.70 port 57310:11: Bye Bye [preauth]
Jan  5 08:10:38 host sshd[18934]: Disconnected from 51.83.71.70 port 57310 [preauth]
Jan  5 08:10:44 host sshd[18976]: User root from 43.154.237.117 not allowed because not listed in AllowUsers
Jan  5 08:10:44 host sshd[18976]: input_userauth_request: invalid user root [preauth]
Jan  5 08:10:44 host unix_chkpwd[18978]: password check failed for user (root)
Jan  5 08:10:44 host sshd[18976]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.154.237.117  user=root
Jan  5 08:10:44 host sshd[18976]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 08:10:46 host sshd[18976]: Failed password for invalid user root from 43.154.237.117 port 38654 ssh2
Jan  5 08:10:46 host sshd[18976]: Received disconnect from 43.154.237.117 port 38654:11: Bye Bye [preauth]
Jan  5 08:10:46 host sshd[18976]: Disconnected from 43.154.237.117 port 38654 [preauth]
Jan  5 08:10:48 host sshd[18983]: User root from 49.248.95.218 not allowed because not listed in AllowUsers
Jan  5 08:10:48 host sshd[18983]: input_userauth_request: invalid user root [preauth]
Jan  5 08:10:48 host unix_chkpwd[18985]: password check failed for user (root)
Jan  5 08:10:48 host sshd[18983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.248.95.218  user=root
Jan  5 08:10:48 host sshd[18983]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 08:10:50 host sshd[18983]: Failed password for invalid user root from 49.248.95.218 port 53528 ssh2
Jan  5 08:10:51 host sshd[18983]: Received disconnect from 49.248.95.218 port 53528:11: Bye Bye [preauth]
Jan  5 08:10:51 host sshd[18983]: Disconnected from 49.248.95.218 port 53528 [preauth]
Jan  5 08:10:59 host sshd[19035]: User root from 27.112.78.168 not allowed because not listed in AllowUsers
Jan  5 08:10:59 host sshd[19035]: input_userauth_request: invalid user root [preauth]
Jan  5 08:10:59 host unix_chkpwd[19039]: password check failed for user (root)
Jan  5 08:10:59 host sshd[19035]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.112.78.168  user=root
Jan  5 08:10:59 host sshd[19035]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 08:11:01 host sshd[19037]: Invalid user admin from 43.157.10.218 port 44534
Jan  5 08:11:01 host sshd[19037]: input_userauth_request: invalid user admin [preauth]
Jan  5 08:11:01 host sshd[19037]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 08:11:01 host sshd[19037]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.157.10.218
Jan  5 08:11:01 host sshd[19035]: Failed password for invalid user root from 27.112.78.168 port 48874 ssh2
Jan  5 08:11:01 host sshd[19035]: Received disconnect from 27.112.78.168 port 48874:11: Bye Bye [preauth]
Jan  5 08:11:01 host sshd[19035]: Disconnected from 27.112.78.168 port 48874 [preauth]
Jan  5 08:11:02 host sshd[19037]: Failed password for invalid user admin from 43.157.10.218 port 44534 ssh2
Jan  5 08:11:03 host sshd[19037]: Received disconnect from 43.157.10.218 port 44534:11: Bye Bye [preauth]
Jan  5 08:11:03 host sshd[19037]: Disconnected from 43.157.10.218 port 44534 [preauth]
Jan  5 08:11:05 host sshd[19057]: Invalid user amit from 137.184.35.63 port 44736
Jan  5 08:11:05 host sshd[19057]: input_userauth_request: invalid user amit [preauth]
Jan  5 08:11:05 host sshd[19057]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 08:11:05 host sshd[19057]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.35.63
Jan  5 08:11:07 host sshd[19057]: Failed password for invalid user amit from 137.184.35.63 port 44736 ssh2
Jan  5 08:11:08 host sshd[19057]: Received disconnect from 137.184.35.63 port 44736:11: Bye Bye [preauth]
Jan  5 08:11:08 host sshd[19057]: Disconnected from 137.184.35.63 port 44736 [preauth]
Jan  5 08:11:14 host sshd[19157]: User root from 104.131.6.66 not allowed because not listed in AllowUsers
Jan  5 08:11:14 host sshd[19157]: input_userauth_request: invalid user root [preauth]
Jan  5 08:11:14 host unix_chkpwd[19160]: password check failed for user (root)
Jan  5 08:11:14 host sshd[19157]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.6.66  user=root
Jan  5 08:11:14 host sshd[19157]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 08:11:16 host sshd[19157]: Failed password for invalid user root from 104.131.6.66 port 48284 ssh2
Jan  5 08:11:16 host sshd[19183]: Invalid user devops from 43.132.253.90 port 64358
Jan  5 08:11:16 host sshd[19183]: input_userauth_request: invalid user devops [preauth]
Jan  5 08:11:16 host sshd[19183]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 08:11:16 host sshd[19183]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.132.253.90
Jan  5 08:11:18 host sshd[19183]: Failed password for invalid user devops from 43.132.253.90 port 64358 ssh2
Jan  5 08:11:18 host sshd[19183]: Received disconnect from 43.132.253.90 port 64358:11: Bye Bye [preauth]
Jan  5 08:11:18 host sshd[19183]: Disconnected from 43.132.253.90 port 64358 [preauth]
Jan  5 08:11:33 host sshd[19247]: User root from 110.50.84.76 not allowed because not listed in AllowUsers
Jan  5 08:11:33 host sshd[19247]: input_userauth_request: invalid user root [preauth]
Jan  5 08:11:33 host unix_chkpwd[19250]: password check failed for user (root)
Jan  5 08:11:33 host sshd[19247]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.50.84.76  user=root
Jan  5 08:11:33 host sshd[19247]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 08:11:35 host sshd[19247]: Failed password for invalid user root from 110.50.84.76 port 60814 ssh2
Jan  5 08:11:35 host sshd[19247]: Received disconnect from 110.50.84.76 port 60814:11: Bye Bye [preauth]
Jan  5 08:11:35 host sshd[19247]: Disconnected from 110.50.84.76 port 60814 [preauth]
Jan  5 08:11:48 host sshd[19317]: Invalid user test from 51.83.71.70 port 56508
Jan  5 08:11:48 host sshd[19317]: input_userauth_request: invalid user test [preauth]
Jan  5 08:11:48 host sshd[19317]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 08:11:48 host sshd[19317]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.71.70
Jan  5 08:11:50 host sshd[19317]: Failed password for invalid user test from 51.83.71.70 port 56508 ssh2
Jan  5 08:11:51 host sshd[19317]: Received disconnect from 51.83.71.70 port 56508:11: Bye Bye [preauth]
Jan  5 08:11:51 host sshd[19317]: Disconnected from 51.83.71.70 port 56508 [preauth]
Jan  5 08:11:51 host sshd[19327]: Invalid user qa from 202.51.74.123 port 58992
Jan  5 08:11:51 host sshd[19327]: input_userauth_request: invalid user qa [preauth]
Jan  5 08:11:51 host sshd[19327]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 08:11:51 host sshd[19327]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.51.74.123
Jan  5 08:11:54 host sshd[19327]: Failed password for invalid user qa from 202.51.74.123 port 58992 ssh2
Jan  5 08:11:54 host sshd[19327]: Received disconnect from 202.51.74.123 port 58992:11: Bye Bye [preauth]
Jan  5 08:11:54 host sshd[19327]: Disconnected from 202.51.74.123 port 58992 [preauth]
Jan  5 08:11:56 host sshd[19358]: User root from 186.103.205.82 not allowed because not listed in AllowUsers
Jan  5 08:11:56 host sshd[19358]: input_userauth_request: invalid user root [preauth]
Jan  5 08:11:56 host unix_chkpwd[19366]: password check failed for user (root)
Jan  5 08:11:56 host sshd[19358]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.103.205.82  user=root
Jan  5 08:11:56 host sshd[19358]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 08:11:58 host sshd[19358]: Failed password for invalid user root from 186.103.205.82 port 5464 ssh2
Jan  5 08:11:59 host sshd[19358]: Received disconnect from 186.103.205.82 port 5464:11: Bye Bye [preauth]
Jan  5 08:11:59 host sshd[19358]: Disconnected from 186.103.205.82 port 5464 [preauth]
Jan  5 08:12:27 host sshd[19490]: Invalid user otsmanager from 43.154.237.117 port 36704
Jan  5 08:12:27 host sshd[19490]: input_userauth_request: invalid user otsmanager [preauth]
Jan  5 08:12:27 host sshd[19490]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 08:12:27 host sshd[19490]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.154.237.117
Jan  5 08:12:29 host sshd[19496]: Invalid user alex from 43.132.253.90 port 64448
Jan  5 08:12:29 host sshd[19496]: input_userauth_request: invalid user alex [preauth]
Jan  5 08:12:29 host sshd[19496]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 08:12:29 host sshd[19496]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.132.253.90
Jan  5 08:12:30 host sshd[19490]: Failed password for invalid user otsmanager from 43.154.237.117 port 36704 ssh2
Jan  5 08:12:30 host sshd[19490]: Received disconnect from 43.154.237.117 port 36704:11: Bye Bye [preauth]
Jan  5 08:12:30 host sshd[19490]: Disconnected from 43.154.237.117 port 36704 [preauth]
Jan  5 08:12:31 host sshd[19496]: Failed password for invalid user alex from 43.132.253.90 port 64448 ssh2
Jan  5 08:12:39 host sshd[19566]: Connection closed by 80.2.40.82 port 47416 [preauth]
Jan  5 08:12:41 host sshd[19571]: Invalid user git from 115.240.206.206 port 51537
Jan  5 08:12:41 host sshd[19571]: input_userauth_request: invalid user git [preauth]
Jan  5 08:12:41 host sshd[19571]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 08:12:41 host sshd[19571]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.240.206.206
Jan  5 08:12:43 host sshd[19571]: Failed password for invalid user git from 115.240.206.206 port 51537 ssh2
Jan  5 08:12:43 host sshd[19571]: Received disconnect from 115.240.206.206 port 51537:11: Bye Bye [preauth]
Jan  5 08:12:43 host sshd[19571]: Disconnected from 115.240.206.206 port 51537 [preauth]
Jan  5 08:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  5 08:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 08:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 08:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  5 08:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 08:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 08:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  5 08:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 08:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 08:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  5 08:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 08:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 08:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  5 08:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 08:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 08:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  5 08:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 08:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 08:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  5 08:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 08:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 08:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  5 08:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 08:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 08:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  5 08:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 08:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 08:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  5 08:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 08:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 08:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  5 08:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 08:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 08:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  5 08:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 08:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 08:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  5 08:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 08:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 08:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=ugotscom user-3=wwwrmswll user-4=keralaholi user-5=wwwresourcehunte user-6=travelboniface user-7=wwwkaretakers user-8=cochintaxi user-9=laundryboniface user-10=dartsimp user-11=a2zgroup user-12=wwwletsstalkfood user-13=straightcurve user-14=wwwevmhonda user-15=bonifacegroup user-16=mrsclean user-17=wwwnexidigital user-18=kottayamcalldriv user-19=phmetals user-20=gifterman user-21=palco123 user-22=wwwkapin user-23=woodpeck user-24=disposeat user-25=wwwkmaorg user-26=remysagr user-27=pmcresources user-28=wwwtestugo user-29=shalinijames user-30=vfmassets feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  5 08:21:53 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  5 08:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 08:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 08:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  5 08:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 08:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 08:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-fMgCkTd9lQxH7bX8.~
Jan  5 08:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 08:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 08:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-fMgCkTd9lQxH7bX8.~'
Jan  5 08:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 08:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 08:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-fMgCkTd9lQxH7bX8.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  5 08:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 08:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 08:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  5 08:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 08:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 08:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  5 08:21:56 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 08:21:56 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 08:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  5 08:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 08:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 08:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  5 08:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 08:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 08:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  5 08:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 08:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 08:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  5 08:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 08:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 08:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  5 08:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 08:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 08:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  5 08:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  5 08:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  5 08:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  5 08:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  5 08:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  5 08:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  5 08:22:00 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  5 08:22:02 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  5 08:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  5 08:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 08:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 08:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  5 08:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 08:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 08:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  5 08:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 08:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 08:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  5 08:22:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 08:22:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 08:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  5 08:22:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 08:22:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 08:27:58 host sshd[21929]: Connection reset by 80.2.40.82 port 55790 [preauth]
Jan  5 08:42:33 host sshd[24199]: Invalid user geral from 157.230.121.169 port 47130
Jan  5 08:42:33 host sshd[24199]: input_userauth_request: invalid user geral [preauth]
Jan  5 08:42:33 host sshd[24199]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 08:42:33 host sshd[24199]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.121.169
Jan  5 08:42:35 host sshd[24199]: Failed password for invalid user geral from 157.230.121.169 port 47130 ssh2
Jan  5 08:42:35 host sshd[24199]: Received disconnect from 157.230.121.169 port 47130:11: Bye Bye [preauth]
Jan  5 08:42:35 host sshd[24199]: Disconnected from 157.230.121.169 port 47130 [preauth]
Jan  5 08:43:29 host sshd[24334]: Invalid user admin from 41.197.31.178 port 49148
Jan  5 08:43:29 host sshd[24334]: input_userauth_request: invalid user admin [preauth]
Jan  5 08:43:29 host sshd[24334]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 08:43:29 host sshd[24334]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178
Jan  5 08:43:31 host sshd[24334]: Failed password for invalid user admin from 41.197.31.178 port 49148 ssh2
Jan  5 08:43:31 host sshd[24334]: Connection closed by 41.197.31.178 port 49148 [preauth]
Jan  5 08:43:32 host sshd[24341]: User root from 178.128.98.121 not allowed because not listed in AllowUsers
Jan  5 08:43:32 host sshd[24341]: input_userauth_request: invalid user root [preauth]
Jan  5 08:43:32 host unix_chkpwd[24343]: password check failed for user (root)
Jan  5 08:43:32 host sshd[24341]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.98.121  user=root
Jan  5 08:43:32 host sshd[24341]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 08:43:34 host sshd[24341]: Failed password for invalid user root from 178.128.98.121 port 50802 ssh2
Jan  5 08:43:34 host sshd[24341]: Received disconnect from 178.128.98.121 port 50802:11: Bye Bye [preauth]
Jan  5 08:43:34 host sshd[24341]: Disconnected from 178.128.98.121 port 50802 [preauth]
Jan  5 08:43:43 host sshd[24356]: User root from 97.74.83.185 not allowed because not listed in AllowUsers
Jan  5 08:43:43 host sshd[24356]: input_userauth_request: invalid user root [preauth]
Jan  5 08:43:43 host unix_chkpwd[24358]: password check failed for user (root)
Jan  5 08:43:43 host sshd[24356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=97.74.83.185  user=root
Jan  5 08:43:43 host sshd[24356]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 08:43:45 host sshd[24356]: Failed password for invalid user root from 97.74.83.185 port 41026 ssh2
Jan  5 08:43:45 host sshd[24356]: Received disconnect from 97.74.83.185 port 41026:11: Bye Bye [preauth]
Jan  5 08:43:45 host sshd[24356]: Disconnected from 97.74.83.185 port 41026 [preauth]
Jan  5 08:44:39 host sshd[24529]: Invalid user import from 211.197.205.91 port 58956
Jan  5 08:44:39 host sshd[24529]: input_userauth_request: invalid user import [preauth]
Jan  5 08:44:39 host sshd[24529]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 08:44:39 host sshd[24529]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.197.205.91
Jan  5 08:44:42 host sshd[24529]: Failed password for invalid user import from 211.197.205.91 port 58956 ssh2
Jan  5 08:44:42 host sshd[24529]: Received disconnect from 211.197.205.91 port 58956:11: Bye Bye [preauth]
Jan  5 08:44:42 host sshd[24529]: Disconnected from 211.197.205.91 port 58956 [preauth]
Jan  5 08:44:50 host sshd[24583]: Invalid user admin from 220.123.99.92 port 37542
Jan  5 08:44:50 host sshd[24583]: input_userauth_request: invalid user admin [preauth]
Jan  5 08:44:50 host sshd[24583]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 08:44:50 host sshd[24583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.123.99.92
Jan  5 08:44:53 host sshd[24583]: Failed password for invalid user admin from 220.123.99.92 port 37542 ssh2
Jan  5 08:44:53 host sshd[24583]: Connection closed by 220.123.99.92 port 37542 [preauth]
Jan  5 08:45:29 host sshd[24656]: Connection closed by 45.155.126.4 port 39034 [preauth]
Jan  5 08:47:11 host sshd[24896]: User root from 14.35.205.136 not allowed because not listed in AllowUsers
Jan  5 08:47:11 host sshd[24896]: input_userauth_request: invalid user root [preauth]
Jan  5 08:47:11 host unix_chkpwd[24899]: password check failed for user (root)
Jan  5 08:47:11 host sshd[24896]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.35.205.136  user=root
Jan  5 08:47:11 host sshd[24896]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 08:47:13 host sshd[24896]: Failed password for invalid user root from 14.35.205.136 port 49248 ssh2
Jan  5 08:47:13 host sshd[24896]: Received disconnect from 14.35.205.136 port 49248:11: Bye Bye [preauth]
Jan  5 08:47:13 host sshd[24896]: Disconnected from 14.35.205.136 port 49248 [preauth]
Jan  5 08:47:57 host sshd[24968]: Invalid user geral from 217.17.230.180 port 54948
Jan  5 08:47:57 host sshd[24968]: input_userauth_request: invalid user geral [preauth]
Jan  5 08:47:57 host sshd[24968]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 08:47:57 host sshd[24968]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.17.230.180
Jan  5 08:47:59 host sshd[24968]: Failed password for invalid user geral from 217.17.230.180 port 54948 ssh2
Jan  5 08:47:59 host sshd[24968]: Received disconnect from 217.17.230.180 port 54948:11: Bye Bye [preauth]
Jan  5 08:47:59 host sshd[24968]: Disconnected from 217.17.230.180 port 54948 [preauth]
Jan  5 08:48:25 host sshd[25018]: User root from 157.230.121.169 not allowed because not listed in AllowUsers
Jan  5 08:48:25 host sshd[25018]: input_userauth_request: invalid user root [preauth]
Jan  5 08:48:25 host unix_chkpwd[25028]: password check failed for user (root)
Jan  5 08:48:25 host sshd[25018]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.121.169  user=root
Jan  5 08:48:25 host sshd[25018]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 08:48:27 host sshd[25018]: Failed password for invalid user root from 157.230.121.169 port 47872 ssh2
Jan  5 08:48:27 host sshd[25018]: Received disconnect from 157.230.121.169 port 47872:11: Bye Bye [preauth]
Jan  5 08:48:27 host sshd[25018]: Disconnected from 157.230.121.169 port 47872 [preauth]
Jan  5 08:49:09 host sshd[25143]: User root from 14.35.205.136 not allowed because not listed in AllowUsers
Jan  5 08:49:09 host sshd[25143]: input_userauth_request: invalid user root [preauth]
Jan  5 08:49:09 host unix_chkpwd[25146]: password check failed for user (root)
Jan  5 08:49:09 host sshd[25143]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.35.205.136  user=root
Jan  5 08:49:09 host sshd[25143]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 08:49:12 host sshd[25143]: Failed password for invalid user root from 14.35.205.136 port 52604 ssh2
Jan  5 08:49:12 host sshd[25143]: Received disconnect from 14.35.205.136 port 52604:11: Bye Bye [preauth]
Jan  5 08:49:12 host sshd[25143]: Disconnected from 14.35.205.136 port 52604 [preauth]
Jan  5 08:49:16 host sshd[25183]: Invalid user ark from 97.74.83.185 port 36306
Jan  5 08:49:16 host sshd[25183]: input_userauth_request: invalid user ark [preauth]
Jan  5 08:49:16 host sshd[25183]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 08:49:16 host sshd[25183]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=97.74.83.185
Jan  5 08:49:17 host sshd[25183]: Failed password for invalid user ark from 97.74.83.185 port 36306 ssh2
Jan  5 08:49:17 host sshd[25183]: Received disconnect from 97.74.83.185 port 36306:11: Bye Bye [preauth]
Jan  5 08:49:17 host sshd[25183]: Disconnected from 97.74.83.185 port 36306 [preauth]
Jan  5 08:49:19 host sshd[25189]: Invalid user desarrollo from 211.197.205.91 port 44812
Jan  5 08:49:19 host sshd[25189]: input_userauth_request: invalid user desarrollo [preauth]
Jan  5 08:49:19 host sshd[25189]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 08:49:19 host sshd[25189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.197.205.91
Jan  5 08:49:22 host sshd[25189]: Failed password for invalid user desarrollo from 211.197.205.91 port 44812 ssh2
Jan  5 08:49:22 host sshd[25189]: Received disconnect from 211.197.205.91 port 44812:11: Bye Bye [preauth]
Jan  5 08:49:22 host sshd[25189]: Disconnected from 211.197.205.91 port 44812 [preauth]
Jan  5 08:49:29 host sshd[25267]: Invalid user ec2-user from 178.128.98.121 port 52054
Jan  5 08:49:29 host sshd[25267]: input_userauth_request: invalid user ec2-user [preauth]
Jan  5 08:49:29 host sshd[25267]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 08:49:29 host sshd[25267]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.98.121
Jan  5 08:49:31 host sshd[25267]: Failed password for invalid user ec2-user from 178.128.98.121 port 52054 ssh2
Jan  5 08:49:31 host sshd[25267]: Received disconnect from 178.128.98.121 port 52054:11: Bye Bye [preauth]
Jan  5 08:49:31 host sshd[25267]: Disconnected from 178.128.98.121 port 52054 [preauth]
Jan  5 08:49:43 host sshd[25325]: User root from 217.17.230.180 not allowed because not listed in AllowUsers
Jan  5 08:49:43 host sshd[25325]: input_userauth_request: invalid user root [preauth]
Jan  5 08:49:43 host unix_chkpwd[25328]: password check failed for user (root)
Jan  5 08:49:43 host sshd[25325]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.17.230.180  user=root
Jan  5 08:49:43 host sshd[25325]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 08:49:46 host sshd[25325]: Failed password for invalid user root from 217.17.230.180 port 40424 ssh2
Jan  5 08:49:46 host sshd[25325]: Received disconnect from 217.17.230.180 port 40424:11: Bye Bye [preauth]
Jan  5 08:49:46 host sshd[25325]: Disconnected from 217.17.230.180 port 40424 [preauth]
Jan  5 08:50:36 host sshd[25599]: User root from 211.197.205.91 not allowed because not listed in AllowUsers
Jan  5 08:50:36 host sshd[25599]: input_userauth_request: invalid user root [preauth]
Jan  5 08:50:36 host unix_chkpwd[25603]: password check failed for user (root)
Jan  5 08:50:36 host sshd[25599]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.197.205.91  user=root
Jan  5 08:50:36 host sshd[25599]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 08:50:38 host sshd[25599]: Failed password for invalid user root from 211.197.205.91 port 50994 ssh2
Jan  5 08:51:38 host sshd[25754]: Invalid user cron from 103.13.40.2 port 48502
Jan  5 08:51:38 host sshd[25754]: input_userauth_request: invalid user cron [preauth]
Jan  5 08:51:38 host sshd[25754]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 08:51:38 host sshd[25754]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2
Jan  5 08:51:40 host sshd[25754]: Failed password for invalid user cron from 103.13.40.2 port 48502 ssh2
Jan  5 08:51:40 host sshd[25754]: Connection closed by 103.13.40.2 port 48502 [preauth]
Jan  5 09:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  5 09:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 09:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 09:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  5 09:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 09:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 09:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  5 09:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 09:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 09:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  5 09:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 09:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 09:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  5 09:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 09:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 09:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  5 09:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 09:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 09:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  5 09:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 09:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 09:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  5 09:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 09:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 09:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  5 09:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 09:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 09:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  5 09:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 09:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 09:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  5 09:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 09:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 09:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  5 09:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 09:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 09:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  5 09:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 09:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 09:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=cochintaxi user-2=wwwkaretakers user-3=laundryboniface user-4=dartsimp user-5=a2zgroup user-6=wwwpmcresource user-7=ugotscom user-8=wwwrmswll user-9=keralaholi user-10=wwwresourcehunte user-11=travelboniface user-12=wwwkapin user-13=woodpeck user-14=wwwkmaorg user-15=disposeat user-16=remysagr user-17=pmcresources user-18=wwwtestugo user-19=shalinijames user-20=vfmassets user-21=straightcurve user-22=wwwletsstalkfood user-23=wwwevmhonda user-24=bonifacegroup user-25=wwwnexidigital user-26=mrsclean user-27=kottayamcalldriv user-28=phmetals user-29=gifterman user-30=palco123 feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  5 09:21:53 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  5 09:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 09:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 09:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  5 09:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 09:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 09:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-wGCcamdVVwWUJaoz.~
Jan  5 09:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 09:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 09:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-wGCcamdVVwWUJaoz.~'
Jan  5 09:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 09:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 09:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-wGCcamdVVwWUJaoz.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  5 09:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 09:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 09:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  5 09:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 09:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 09:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  5 09:21:53 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 09:21:53 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 09:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  5 09:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 09:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 09:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  5 09:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 09:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 09:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  5 09:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 09:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 09:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  5 09:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 09:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 09:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  5 09:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 09:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 09:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  5 09:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  5 09:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  5 09:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  5 09:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  5 09:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  5 09:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  5 09:21:58 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  5 09:22:00 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  5 09:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  5 09:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 09:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 09:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  5 09:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 09:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 09:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  5 09:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 09:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 09:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  5 09:22:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 09:22:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 09:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  5 09:22:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 09:22:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 09:23:15 host sshd[30758]: Invalid user ab from 194.110.203.109 port 60710
Jan  5 09:23:15 host sshd[30758]: input_userauth_request: invalid user ab [preauth]
Jan  5 09:23:15 host sshd[30758]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 09:23:15 host sshd[30758]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109
Jan  5 09:23:17 host sshd[30758]: Failed password for invalid user ab from 194.110.203.109 port 60710 ssh2
Jan  5 09:23:21 host sshd[30758]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 09:23:22 host sshd[30758]: Failed password for invalid user ab from 194.110.203.109 port 60710 ssh2
Jan  5 09:23:26 host sshd[30758]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 09:23:28 host sshd[30758]: Failed password for invalid user ab from 194.110.203.109 port 60710 ssh2
Jan  5 09:23:31 host sshd[30758]: Connection closed by 194.110.203.109 port 60710 [preauth]
Jan  5 09:23:31 host sshd[30758]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109
Jan  5 10:13:20 host sshd[7746]: Invalid user user1 from 41.197.31.178 port 60692
Jan  5 10:13:20 host sshd[7746]: input_userauth_request: invalid user user1 [preauth]
Jan  5 10:13:20 host sshd[7746]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 10:13:20 host sshd[7746]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178
Jan  5 10:13:23 host sshd[7746]: Failed password for invalid user user1 from 41.197.31.178 port 60692 ssh2
Jan  5 10:13:23 host sshd[7746]: Connection closed by 41.197.31.178 port 60692 [preauth]
Jan  5 10:18:14 host sshd[8843]: User root from 103.13.40.2 not allowed because not listed in AllowUsers
Jan  5 10:18:14 host sshd[8843]: input_userauth_request: invalid user root [preauth]
Jan  5 10:18:14 host unix_chkpwd[8845]: password check failed for user (root)
Jan  5 10:18:14 host sshd[8843]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2  user=root
Jan  5 10:18:14 host sshd[8843]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 10:18:16 host sshd[8843]: Failed password for invalid user root from 103.13.40.2 port 58772 ssh2
Jan  5 10:18:16 host sshd[8843]: Connection closed by 103.13.40.2 port 58772 [preauth]
Jan  5 10:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  5 10:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 10:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 10:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  5 10:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 10:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 10:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  5 10:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 10:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 10:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  5 10:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 10:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 10:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  5 10:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 10:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 10:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  5 10:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 10:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 10:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  5 10:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 10:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 10:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  5 10:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 10:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 10:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  5 10:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 10:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 10:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  5 10:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 10:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 10:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  5 10:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 10:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 10:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  5 10:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 10:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 10:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  5 10:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 10:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 10:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkmaorg user-2=disposeat user-3=remysagr user-4=woodpeck user-5=wwwkapin user-6=shalinijames user-7=wwwtestugo user-8=vfmassets user-9=pmcresources user-10=wwwevmhonda user-11=bonifacegroup user-12=wwwletsstalkfood user-13=straightcurve user-14=phmetals user-15=kottayamcalldriv user-16=palco123 user-17=gifterman user-18=mrsclean user-19=wwwnexidigital user-20=cochintaxi user-21=wwwkaretakers user-22=a2zgroup user-23=dartsimp user-24=laundryboniface user-25=wwwpmcresource user-26=travelboniface user-27=ugotscom user-28=keralaholi user-29=wwwresourcehunte user-30=wwwrmswll feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  5 10:21:53 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  5 10:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 10:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 10:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  5 10:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 10:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 10:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-EDrGi4bv9tP1H8KE.~
Jan  5 10:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 10:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 10:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-EDrGi4bv9tP1H8KE.~'
Jan  5 10:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 10:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 10:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-EDrGi4bv9tP1H8KE.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  5 10:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 10:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 10:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  5 10:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 10:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 10:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  5 10:21:54 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 10:21:54 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 10:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  5 10:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 10:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 10:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  5 10:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 10:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 10:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  5 10:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 10:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 10:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  5 10:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 10:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 10:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  5 10:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 10:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 10:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  5 10:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  5 10:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  5 10:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  5 10:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  5 10:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  5 10:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  5 10:21:59 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  5 10:22:01 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  5 10:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  5 10:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 10:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 10:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  5 10:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 10:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 10:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  5 10:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 10:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 10:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  5 10:22:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 10:22:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 10:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  5 10:22:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 10:22:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 10:23:38 host sshd[9949]: Invalid user nagios from 92.46.108.20 port 57466
Jan  5 10:23:38 host sshd[9949]: input_userauth_request: invalid user nagios [preauth]
Jan  5 10:23:39 host sshd[9949]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 10:23:39 host sshd[9949]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20
Jan  5 10:23:41 host sshd[9949]: Failed password for invalid user nagios from 92.46.108.20 port 57466 ssh2
Jan  5 10:23:42 host sshd[9949]: Connection closed by 92.46.108.20 port 57466 [preauth]
Jan  5 10:35:00 host sshd[11481]: Invalid user user from 24.121.33.250 port 34070
Jan  5 10:35:00 host sshd[11481]: input_userauth_request: invalid user user [preauth]
Jan  5 10:35:01 host sshd[11481]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 10:35:01 host sshd[11481]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.121.33.250
Jan  5 10:35:02 host sshd[11481]: Failed password for invalid user user from 24.121.33.250 port 34070 ssh2
Jan  5 10:35:03 host sshd[11481]: Connection closed by 24.121.33.250 port 34070 [preauth]
Jan  5 10:39:36 host sshd[12209]: User root from 185.105.1.169 not allowed because not listed in AllowUsers
Jan  5 10:39:36 host sshd[12209]: input_userauth_request: invalid user root [preauth]
Jan  5 10:39:36 host unix_chkpwd[12212]: password check failed for user (root)
Jan  5 10:39:36 host sshd[12209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.105.1.169  user=root
Jan  5 10:39:36 host sshd[12209]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 10:39:37 host sshd[12209]: Failed password for invalid user root from 185.105.1.169 port 59420 ssh2
Jan  5 10:39:37 host sshd[12209]: Received disconnect from 185.105.1.169 port 59420:11: Bye Bye [preauth]
Jan  5 10:39:37 host sshd[12209]: Disconnected from 185.105.1.169 port 59420 [preauth]
Jan  5 10:40:15 host sshd[12313]: Invalid user main from 103.75.148.11 port 47746
Jan  5 10:40:15 host sshd[12313]: input_userauth_request: invalid user main [preauth]
Jan  5 10:40:15 host sshd[12313]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 10:40:15 host sshd[12313]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.75.148.11
Jan  5 10:40:17 host sshd[12313]: Failed password for invalid user main from 103.75.148.11 port 47746 ssh2
Jan  5 10:40:17 host sshd[12313]: Received disconnect from 103.75.148.11 port 47746:11: Bye Bye [preauth]
Jan  5 10:40:17 host sshd[12313]: Disconnected from 103.75.148.11 port 47746 [preauth]
Jan  5 10:40:20 host sshd[12323]: Invalid user cloudera from 101.51.233.250 port 48540
Jan  5 10:40:20 host sshd[12323]: input_userauth_request: invalid user cloudera [preauth]
Jan  5 10:40:20 host sshd[12323]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 10:40:20 host sshd[12323]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.51.233.250
Jan  5 10:40:22 host sshd[12323]: Failed password for invalid user cloudera from 101.51.233.250 port 48540 ssh2
Jan  5 10:40:22 host sshd[12323]: Received disconnect from 101.51.233.250 port 48540:11: Bye Bye [preauth]
Jan  5 10:40:22 host sshd[12323]: Disconnected from 101.51.233.250 port 48540 [preauth]
Jan  5 10:42:10 host sshd[12658]: User root from 101.51.233.250 not allowed because not listed in AllowUsers
Jan  5 10:42:10 host sshd[12658]: input_userauth_request: invalid user root [preauth]
Jan  5 10:42:10 host unix_chkpwd[12661]: password check failed for user (root)
Jan  5 10:42:10 host sshd[12658]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.51.233.250  user=root
Jan  5 10:42:10 host sshd[12658]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 10:42:13 host sshd[12658]: Failed password for invalid user root from 101.51.233.250 port 60908 ssh2
Jan  5 10:42:13 host sshd[12658]: Received disconnect from 101.51.233.250 port 60908:11: Bye Bye [preauth]
Jan  5 10:42:13 host sshd[12658]: Disconnected from 101.51.233.250 port 60908 [preauth]
Jan  5 10:42:57 host sshd[12786]: Invalid user user from 134.17.17.131 port 6338
Jan  5 10:42:57 host sshd[12786]: input_userauth_request: invalid user user [preauth]
Jan  5 10:42:57 host sshd[12786]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 10:42:57 host sshd[12786]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.17.17.131
Jan  5 10:42:59 host sshd[12786]: Failed password for invalid user user from 134.17.17.131 port 6338 ssh2
Jan  5 10:42:59 host sshd[12786]: Received disconnect from 134.17.17.131 port 6338:11: Bye Bye [preauth]
Jan  5 10:42:59 host sshd[12786]: Disconnected from 134.17.17.131 port 6338 [preauth]
Jan  5 10:43:00 host sshd[12800]: Invalid user ubuntu from 45.119.9.158 port 36836
Jan  5 10:43:00 host sshd[12800]: input_userauth_request: invalid user ubuntu [preauth]
Jan  5 10:43:00 host sshd[12800]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 10:43:00 host sshd[12800]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.119.9.158
Jan  5 10:43:02 host sshd[12800]: Failed password for invalid user ubuntu from 45.119.9.158 port 36836 ssh2
Jan  5 10:43:02 host sshd[12800]: Received disconnect from 45.119.9.158 port 36836:11: Bye Bye [preauth]
Jan  5 10:43:02 host sshd[12800]: Disconnected from 45.119.9.158 port 36836 [preauth]
Jan  5 10:43:17 host sshd[12847]: Invalid user webtest from 134.122.90.69 port 34074
Jan  5 10:43:17 host sshd[12847]: input_userauth_request: invalid user webtest [preauth]
Jan  5 10:43:17 host sshd[12847]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 10:43:17 host sshd[12847]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.90.69
Jan  5 10:43:19 host sshd[12847]: Failed password for invalid user webtest from 134.122.90.69 port 34074 ssh2
Jan  5 10:43:19 host sshd[12847]: Received disconnect from 134.122.90.69 port 34074:11: Bye Bye [preauth]
Jan  5 10:43:19 host sshd[12847]: Disconnected from 134.122.90.69 port 34074 [preauth]
Jan  5 10:45:31 host sshd[13346]: User root from 134.17.17.131 not allowed because not listed in AllowUsers
Jan  5 10:45:31 host sshd[13346]: input_userauth_request: invalid user root [preauth]
Jan  5 10:45:31 host unix_chkpwd[13349]: password check failed for user (root)
Jan  5 10:45:31 host sshd[13346]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.17.17.131  user=root
Jan  5 10:45:31 host sshd[13346]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 10:45:34 host sshd[13346]: Failed password for invalid user root from 134.17.17.131 port 6339 ssh2
Jan  5 10:45:34 host sshd[13346]: Received disconnect from 134.17.17.131 port 6339:11: Bye Bye [preauth]
Jan  5 10:45:34 host sshd[13346]: Disconnected from 134.17.17.131 port 6339 [preauth]
Jan  5 10:46:04 host sshd[13438]: User root from 103.75.148.11 not allowed because not listed in AllowUsers
Jan  5 10:46:04 host sshd[13438]: input_userauth_request: invalid user root [preauth]
Jan  5 10:46:04 host unix_chkpwd[13440]: password check failed for user (root)
Jan  5 10:46:04 host sshd[13438]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.75.148.11  user=root
Jan  5 10:46:04 host sshd[13438]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 10:46:06 host sshd[13438]: Failed password for invalid user root from 103.75.148.11 port 53884 ssh2
Jan  5 10:46:06 host sshd[13438]: Received disconnect from 103.75.148.11 port 53884:11: Bye Bye [preauth]
Jan  5 10:46:06 host sshd[13438]: Disconnected from 103.75.148.11 port 53884 [preauth]
Jan  5 10:46:10 host sshd[13448]: Invalid user unix from 185.105.1.169 port 33196
Jan  5 10:46:10 host sshd[13448]: input_userauth_request: invalid user unix [preauth]
Jan  5 10:46:10 host sshd[13448]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 10:46:10 host sshd[13448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.105.1.169
Jan  5 10:46:11 host sshd[13448]: Failed password for invalid user unix from 185.105.1.169 port 33196 ssh2
Jan  5 10:46:11 host sshd[13448]: Received disconnect from 185.105.1.169 port 33196:11: Bye Bye [preauth]
Jan  5 10:46:11 host sshd[13448]: Disconnected from 185.105.1.169 port 33196 [preauth]
Jan  5 10:46:26 host sshd[13527]: Invalid user zhang from 134.122.90.69 port 39570
Jan  5 10:46:26 host sshd[13527]: input_userauth_request: invalid user zhang [preauth]
Jan  5 10:46:26 host sshd[13527]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 10:46:26 host sshd[13527]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.90.69
Jan  5 10:46:27 host sshd[13527]: Failed password for invalid user zhang from 134.122.90.69 port 39570 ssh2
Jan  5 10:46:27 host sshd[13527]: Received disconnect from 134.122.90.69 port 39570:11: Bye Bye [preauth]
Jan  5 10:46:27 host sshd[13527]: Disconnected from 134.122.90.69 port 39570 [preauth]
Jan  5 10:46:42 host sshd[13575]: Invalid user jupyter from 45.119.9.158 port 55448
Jan  5 10:46:42 host sshd[13575]: input_userauth_request: invalid user jupyter [preauth]
Jan  5 10:46:42 host sshd[13575]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 10:46:42 host sshd[13575]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.119.9.158
Jan  5 10:46:45 host sshd[13575]: Failed password for invalid user jupyter from 45.119.9.158 port 55448 ssh2
Jan  5 10:46:45 host sshd[13575]: Received disconnect from 45.119.9.158 port 55448:11: Bye Bye [preauth]
Jan  5 10:46:45 host sshd[13575]: Disconnected from 45.119.9.158 port 55448 [preauth]
Jan  5 10:47:38 host sshd[13687]: User root from 134.122.90.69 not allowed because not listed in AllowUsers
Jan  5 10:47:38 host sshd[13687]: input_userauth_request: invalid user root [preauth]
Jan  5 10:47:38 host unix_chkpwd[13690]: password check failed for user (root)
Jan  5 10:47:38 host sshd[13687]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.90.69  user=root
Jan  5 10:47:38 host sshd[13687]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 10:47:40 host sshd[13687]: Failed password for invalid user root from 134.122.90.69 port 54078 ssh2
Jan  5 10:47:40 host sshd[13687]: Received disconnect from 134.122.90.69 port 54078:11: Bye Bye [preauth]
Jan  5 10:47:40 host sshd[13687]: Disconnected from 134.122.90.69 port 54078 [preauth]
Jan  5 10:48:15 host sshd[13772]: Invalid user unix from 45.119.9.158 port 57508
Jan  5 10:48:15 host sshd[13772]: input_userauth_request: invalid user unix [preauth]
Jan  5 10:48:15 host sshd[13772]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 10:48:15 host sshd[13772]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.119.9.158
Jan  5 10:48:17 host sshd[13772]: Failed password for invalid user unix from 45.119.9.158 port 57508 ssh2
Jan  5 10:53:35 host sshd[14580]: Invalid user zwj from 137.184.0.243 port 37626
Jan  5 10:53:35 host sshd[14580]: input_userauth_request: invalid user zwj [preauth]
Jan  5 10:53:35 host sshd[14580]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 10:53:35 host sshd[14580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.0.243
Jan  5 10:53:37 host sshd[14580]: Failed password for invalid user zwj from 137.184.0.243 port 37626 ssh2
Jan  5 10:53:37 host sshd[14580]: Received disconnect from 137.184.0.243 port 37626:11: Bye Bye [preauth]
Jan  5 10:53:37 host sshd[14580]: Disconnected from 137.184.0.243 port 37626 [preauth]
Jan  5 10:53:48 host sshd[14602]: Invalid user ubnt from 167.99.207.240 port 43630
Jan  5 10:53:48 host sshd[14602]: input_userauth_request: invalid user ubnt [preauth]
Jan  5 10:53:48 host sshd[14602]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 10:53:48 host sshd[14602]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.207.240
Jan  5 10:53:49 host sshd[14608]: Invalid user rahul from 140.238.255.101 port 44062
Jan  5 10:53:49 host sshd[14608]: input_userauth_request: invalid user rahul [preauth]
Jan  5 10:53:49 host sshd[14608]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 10:53:49 host sshd[14608]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.238.255.101
Jan  5 10:53:50 host sshd[14602]: Failed password for invalid user ubnt from 167.99.207.240 port 43630 ssh2
Jan  5 10:53:50 host sshd[14608]: Failed password for invalid user rahul from 140.238.255.101 port 44062 ssh2
Jan  5 10:53:50 host sshd[14608]: Received disconnect from 140.238.255.101 port 44062:11: Bye Bye [preauth]
Jan  5 10:53:50 host sshd[14608]: Disconnected from 140.238.255.101 port 44062 [preauth]
Jan  5 10:53:51 host sshd[14602]: Received disconnect from 167.99.207.240 port 43630:11: Bye Bye [preauth]
Jan  5 10:53:51 host sshd[14602]: Disconnected from 167.99.207.240 port 43630 [preauth]
Jan  5 10:53:53 host sshd[14613]: Invalid user admin from 167.99.207.240 port 49406
Jan  5 10:53:53 host sshd[14613]: input_userauth_request: invalid user admin [preauth]
Jan  5 10:53:53 host sshd[14613]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 10:53:53 host sshd[14613]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.207.240
Jan  5 10:53:55 host sshd[14613]: Failed password for invalid user admin from 167.99.207.240 port 49406 ssh2
Jan  5 10:53:55 host sshd[14613]: Received disconnect from 167.99.207.240 port 49406:11: Bye Bye [preauth]
Jan  5 10:53:55 host sshd[14613]: Disconnected from 167.99.207.240 port 49406 [preauth]
Jan  5 10:53:57 host sshd[14630]: User root from 167.99.207.240 not allowed because not listed in AllowUsers
Jan  5 10:53:57 host sshd[14630]: input_userauth_request: invalid user root [preauth]
Jan  5 10:53:57 host unix_chkpwd[14634]: password check failed for user (root)
Jan  5 10:53:57 host sshd[14630]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.207.240  user=root
Jan  5 10:53:57 host sshd[14630]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 10:53:59 host sshd[14630]: Failed password for invalid user root from 167.99.207.240 port 54704 ssh2
Jan  5 10:53:59 host sshd[14630]: Received disconnect from 167.99.207.240 port 54704:11: Bye Bye [preauth]
Jan  5 10:53:59 host sshd[14630]: Disconnected from 167.99.207.240 port 54704 [preauth]
Jan  5 10:54:01 host sshd[14639]: Invalid user 1234 from 167.99.207.240 port 59980
Jan  5 10:54:01 host sshd[14639]: input_userauth_request: invalid user 1234 [preauth]
Jan  5 10:54:01 host sshd[14639]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 10:54:01 host sshd[14639]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.207.240
Jan  5 10:54:03 host sshd[14639]: Failed password for invalid user 1234 from 167.99.207.240 port 59980 ssh2
Jan  5 10:54:38 host sshd[14765]: Invalid user abc from 176.96.186.130 port 54060
Jan  5 10:54:38 host sshd[14765]: input_userauth_request: invalid user abc [preauth]
Jan  5 10:54:38 host sshd[14765]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 10:54:38 host sshd[14765]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.96.186.130
Jan  5 10:54:40 host sshd[14765]: Failed password for invalid user abc from 176.96.186.130 port 54060 ssh2
Jan  5 10:54:40 host sshd[14765]: Received disconnect from 176.96.186.130 port 54060:11: Bye Bye [preauth]
Jan  5 10:54:40 host sshd[14765]: Disconnected from 176.96.186.130 port 54060 [preauth]
Jan  5 10:54:45 host sshd[14762]: Connection closed by 167.99.107.57 port 42448 [preauth]
Jan  5 10:55:23 host sshd[14831]: User root from 178.64.190.253 not allowed because not listed in AllowUsers
Jan  5 10:55:23 host sshd[14831]: input_userauth_request: invalid user root [preauth]
Jan  5 10:55:23 host unix_chkpwd[14834]: password check failed for user (root)
Jan  5 10:55:23 host sshd[14831]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.64.190.253  user=root
Jan  5 10:55:23 host sshd[14831]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 10:55:25 host sshd[14831]: Failed password for invalid user root from 178.64.190.253 port 37774 ssh2
Jan  5 10:55:26 host sshd[14831]: Received disconnect from 178.64.190.253 port 37774:11: Bye Bye [preauth]
Jan  5 10:55:26 host sshd[14831]: Disconnected from 178.64.190.253 port 37774 [preauth]
Jan  5 10:56:40 host sshd[15034]: Invalid user li from 167.172.94.17 port 29186
Jan  5 10:56:40 host sshd[15034]: input_userauth_request: invalid user li [preauth]
Jan  5 10:56:40 host sshd[15034]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 10:56:40 host sshd[15034]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.94.17
Jan  5 10:56:40 host sshd[15030]: User root from 80.68.7.50 not allowed because not listed in AllowUsers
Jan  5 10:56:40 host sshd[15030]: input_userauth_request: invalid user root [preauth]
Jan  5 10:56:40 host unix_chkpwd[15036]: password check failed for user (root)
Jan  5 10:56:40 host sshd[15030]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.68.7.50  user=root
Jan  5 10:56:40 host sshd[15030]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 10:56:42 host sshd[15034]: Failed password for invalid user li from 167.172.94.17 port 29186 ssh2
Jan  5 10:56:42 host sshd[15034]: Received disconnect from 167.172.94.17 port 29186:11: Bye Bye [preauth]
Jan  5 10:56:42 host sshd[15034]: Disconnected from 167.172.94.17 port 29186 [preauth]
Jan  5 10:56:42 host sshd[15030]: Failed password for invalid user root from 80.68.7.50 port 40782 ssh2
Jan  5 10:56:43 host sshd[15030]: Received disconnect from 80.68.7.50 port 40782:11: Bye Bye [preauth]
Jan  5 10:56:43 host sshd[15030]: Disconnected from 80.68.7.50 port 40782 [preauth]
Jan  5 10:56:56 host sshd[15068]: Invalid user larry from 209.141.56.48 port 43886
Jan  5 10:56:56 host sshd[15068]: input_userauth_request: invalid user larry [preauth]
Jan  5 10:56:56 host sshd[15068]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 10:56:56 host sshd[15068]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48
Jan  5 10:56:58 host sshd[15068]: Failed password for invalid user larry from 209.141.56.48 port 43886 ssh2
Jan  5 10:56:58 host sshd[15068]: Connection closed by 209.141.56.48 port 43886 [preauth]
Jan  5 10:56:59 host sshd[15074]: User ftp from 196.221.202.98 not allowed because not listed in AllowUsers
Jan  5 10:56:59 host sshd[15074]: input_userauth_request: invalid user ftp [preauth]
Jan  5 10:56:59 host unix_chkpwd[15078]: password check failed for user (ftp)
Jan  5 10:56:59 host sshd[15074]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.221.202.98  user=ftp
Jan  5 10:56:59 host sshd[15074]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp"
Jan  5 10:57:01 host sshd[15074]: Failed password for invalid user ftp from 196.221.202.98 port 12670 ssh2
Jan  5 10:57:01 host sshd[15074]: Received disconnect from 196.221.202.98 port 12670:11: Bye Bye [preauth]
Jan  5 10:57:01 host sshd[15074]: Disconnected from 196.221.202.98 port 12670 [preauth]
Jan  5 10:57:29 host sshd[15165]: User root from 104.248.31.56 not allowed because not listed in AllowUsers
Jan  5 10:57:29 host sshd[15165]: input_userauth_request: invalid user root [preauth]
Jan  5 10:57:29 host unix_chkpwd[15180]: password check failed for user (root)
Jan  5 10:57:29 host sshd[15165]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.31.56  user=root
Jan  5 10:57:29 host sshd[15165]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 10:57:31 host sshd[15165]: Failed password for invalid user root from 104.248.31.56 port 47642 ssh2
Jan  5 10:57:31 host sshd[15165]: Received disconnect from 104.248.31.56 port 47642:11: Bye Bye [preauth]
Jan  5 10:57:31 host sshd[15165]: Disconnected from 104.248.31.56 port 47642 [preauth]
Jan  5 10:57:44 host sshd[15295]: Invalid user git from 146.190.228.94 port 60720
Jan  5 10:57:44 host sshd[15295]: input_userauth_request: invalid user git [preauth]
Jan  5 10:57:44 host sshd[15295]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 10:57:44 host sshd[15295]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.190.228.94
Jan  5 10:57:46 host sshd[15295]: Failed password for invalid user git from 146.190.228.94 port 60720 ssh2
Jan  5 10:57:46 host sshd[15295]: Received disconnect from 146.190.228.94 port 60720:11: Bye Bye [preauth]
Jan  5 10:57:46 host sshd[15295]: Disconnected from 146.190.228.94 port 60720 [preauth]
Jan  5 10:59:30 host sshd[15495]: Invalid user raquel from 176.96.186.130 port 47338
Jan  5 10:59:30 host sshd[15495]: input_userauth_request: invalid user raquel [preauth]
Jan  5 10:59:30 host sshd[15495]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 10:59:30 host sshd[15495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.96.186.130
Jan  5 10:59:30 host sshd[15500]: User root from 140.238.255.101 not allowed because not listed in AllowUsers
Jan  5 10:59:30 host sshd[15500]: input_userauth_request: invalid user root [preauth]
Jan  5 10:59:30 host unix_chkpwd[15502]: password check failed for user (root)
Jan  5 10:59:30 host sshd[15500]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.238.255.101  user=root
Jan  5 10:59:30 host sshd[15500]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 10:59:31 host sshd[15495]: Failed password for invalid user raquel from 176.96.186.130 port 47338 ssh2
Jan  5 10:59:31 host sshd[15500]: Failed password for invalid user root from 140.238.255.101 port 50740 ssh2
Jan  5 10:59:31 host sshd[15500]: Received disconnect from 140.238.255.101 port 50740:11: Bye Bye [preauth]
Jan  5 10:59:31 host sshd[15500]: Disconnected from 140.238.255.101 port 50740 [preauth]
Jan  5 10:59:31 host sshd[15495]: Received disconnect from 176.96.186.130 port 47338:11: Bye Bye [preauth]
Jan  5 10:59:31 host sshd[15495]: Disconnected from 176.96.186.130 port 47338 [preauth]
Jan  5 10:59:49 host sshd[15555]: User root from 146.190.228.94 not allowed because not listed in AllowUsers
Jan  5 10:59:49 host sshd[15555]: input_userauth_request: invalid user root [preauth]
Jan  5 10:59:49 host unix_chkpwd[15559]: password check failed for user (root)
Jan  5 10:59:49 host sshd[15555]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.190.228.94  user=root
Jan  5 10:59:49 host sshd[15555]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 10:59:51 host sshd[15555]: Failed password for invalid user root from 146.190.228.94 port 47202 ssh2
Jan  5 10:59:51 host sshd[15555]: Received disconnect from 146.190.228.94 port 47202:11: Bye Bye [preauth]
Jan  5 10:59:51 host sshd[15555]: Disconnected from 146.190.228.94 port 47202 [preauth]
Jan  5 11:00:17 host sshd[15655]: User root from 178.64.190.253 not allowed because not listed in AllowUsers
Jan  5 11:00:17 host sshd[15655]: input_userauth_request: invalid user root [preauth]
Jan  5 11:00:17 host unix_chkpwd[15662]: password check failed for user (root)
Jan  5 11:00:17 host sshd[15655]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.64.190.253  user=root
Jan  5 11:00:17 host sshd[15655]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 11:00:19 host sshd[15663]: Invalid user webadmin from 196.221.202.98 port 5188
Jan  5 11:00:19 host sshd[15663]: input_userauth_request: invalid user webadmin [preauth]
Jan  5 11:00:19 host sshd[15663]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 11:00:19 host sshd[15663]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.221.202.98
Jan  5 11:00:19 host sshd[15655]: Failed password for invalid user root from 178.64.190.253 port 59010 ssh2
Jan  5 11:00:20 host sshd[15655]: Received disconnect from 178.64.190.253 port 59010:11: Bye Bye [preauth]
Jan  5 11:00:20 host sshd[15655]: Disconnected from 178.64.190.253 port 59010 [preauth]
Jan  5 11:00:21 host sshd[15663]: Failed password for invalid user webadmin from 196.221.202.98 port 5188 ssh2
Jan  5 11:00:22 host sshd[15663]: Received disconnect from 196.221.202.98 port 5188:11: Bye Bye [preauth]
Jan  5 11:00:22 host sshd[15663]: Disconnected from 196.221.202.98 port 5188 [preauth]
Jan  5 11:00:23 host sshd[15676]: Invalid user redhat from 137.184.0.243 port 45600
Jan  5 11:00:23 host sshd[15676]: input_userauth_request: invalid user redhat [preauth]
Jan  5 11:00:23 host sshd[15676]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 11:00:23 host sshd[15676]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.0.243
Jan  5 11:00:24 host sshd[15676]: Failed password for invalid user redhat from 137.184.0.243 port 45600 ssh2
Jan  5 11:00:24 host sshd[15676]: Received disconnect from 137.184.0.243 port 45600:11: Bye Bye [preauth]
Jan  5 11:00:24 host sshd[15676]: Disconnected from 137.184.0.243 port 45600 [preauth]
Jan  5 11:00:37 host sshd[15794]: Invalid user czerda from 167.172.94.17 port 24088
Jan  5 11:00:37 host sshd[15794]: input_userauth_request: invalid user czerda [preauth]
Jan  5 11:00:37 host sshd[15794]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 11:00:37 host sshd[15794]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.94.17
Jan  5 11:00:39 host sshd[15794]: Failed password for invalid user czerda from 167.172.94.17 port 24088 ssh2
Jan  5 11:00:39 host sshd[15794]: Received disconnect from 167.172.94.17 port 24088:11: Bye Bye [preauth]
Jan  5 11:00:39 host sshd[15794]: Disconnected from 167.172.94.17 port 24088 [preauth]
Jan  5 11:00:44 host sshd[15809]: User root from 176.96.186.130 not allowed because not listed in AllowUsers
Jan  5 11:00:44 host sshd[15809]: input_userauth_request: invalid user root [preauth]
Jan  5 11:00:44 host unix_chkpwd[15813]: password check failed for user (root)
Jan  5 11:00:44 host sshd[15809]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.96.186.130  user=root
Jan  5 11:00:44 host sshd[15809]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 11:00:46 host sshd[15809]: Failed password for invalid user root from 176.96.186.130 port 45122 ssh2
Jan  5 11:00:46 host sshd[15809]: Received disconnect from 176.96.186.130 port 45122:11: Bye Bye [preauth]
Jan  5 11:00:46 host sshd[15809]: Disconnected from 176.96.186.130 port 45122 [preauth]
Jan  5 11:00:48 host sshd[15840]: Invalid user webadmin from 104.248.31.56 port 56864
Jan  5 11:00:48 host sshd[15840]: input_userauth_request: invalid user webadmin [preauth]
Jan  5 11:00:48 host sshd[15840]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 11:00:48 host sshd[15840]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.31.56
Jan  5 11:00:50 host sshd[15840]: Failed password for invalid user webadmin from 104.248.31.56 port 56864 ssh2
Jan  5 11:00:50 host sshd[15840]: Received disconnect from 104.248.31.56 port 56864:11: Bye Bye [preauth]
Jan  5 11:00:50 host sshd[15840]: Disconnected from 104.248.31.56 port 56864 [preauth]
Jan  5 11:01:19 host sshd[15975]: User root from 80.68.7.50 not allowed because not listed in AllowUsers
Jan  5 11:01:19 host sshd[15975]: input_userauth_request: invalid user root [preauth]
Jan  5 11:01:19 host unix_chkpwd[15979]: password check failed for user (root)
Jan  5 11:01:19 host sshd[15975]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.68.7.50  user=root
Jan  5 11:01:19 host sshd[15975]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 11:01:20 host sshd[15975]: Failed password for invalid user root from 80.68.7.50 port 39334 ssh2
Jan  5 11:01:20 host sshd[15975]: Received disconnect from 80.68.7.50 port 39334:11: Bye Bye [preauth]
Jan  5 11:01:20 host sshd[15975]: Disconnected from 80.68.7.50 port 39334 [preauth]
Jan  5 11:01:22 host sshd[15983]: User root from 137.184.0.243 not allowed because not listed in AllowUsers
Jan  5 11:01:22 host sshd[15983]: input_userauth_request: invalid user root [preauth]
Jan  5 11:01:22 host unix_chkpwd[16017]: password check failed for user (root)
Jan  5 11:01:22 host sshd[15983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.0.243  user=root
Jan  5 11:01:22 host sshd[15983]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 11:01:24 host sshd[15983]: Failed password for invalid user root from 137.184.0.243 port 35600 ssh2
Jan  5 11:01:24 host sshd[15983]: Received disconnect from 137.184.0.243 port 35600:11: Bye Bye [preauth]
Jan  5 11:01:24 host sshd[15983]: Disconnected from 137.184.0.243 port 35600 [preauth]
Jan  5 11:02:07 host sshd[16176]: Invalid user sinusbot from 167.172.94.17 port 19744
Jan  5 11:02:07 host sshd[16176]: input_userauth_request: invalid user sinusbot [preauth]
Jan  5 11:02:07 host sshd[16176]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 11:02:07 host sshd[16176]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.94.17
Jan  5 11:02:09 host sshd[16176]: Failed password for invalid user sinusbot from 167.172.94.17 port 19744 ssh2
Jan  5 11:02:09 host sshd[16176]: Received disconnect from 167.172.94.17 port 19744:11: Bye Bye [preauth]
Jan  5 11:02:09 host sshd[16176]: Disconnected from 167.172.94.17 port 19744 [preauth]
Jan  5 11:12:26 host sshd[17878]: User root from 51.250.79.53 not allowed because not listed in AllowUsers
Jan  5 11:12:26 host sshd[17878]: input_userauth_request: invalid user root [preauth]
Jan  5 11:12:26 host unix_chkpwd[17902]: password check failed for user (root)
Jan  5 11:12:26 host sshd[17878]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.250.79.53  user=root
Jan  5 11:12:26 host sshd[17878]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 11:12:28 host sshd[17878]: Failed password for invalid user root from 51.250.79.53 port 35914 ssh2
Jan  5 11:12:28 host sshd[17878]: Received disconnect from 51.250.79.53 port 35914:11: Bye Bye [preauth]
Jan  5 11:12:28 host sshd[17878]: Disconnected from 51.250.79.53 port 35914 [preauth]
Jan  5 11:12:43 host sshd[17925]: Invalid user terminal from 192.99.247.60 port 34192
Jan  5 11:12:43 host sshd[17925]: input_userauth_request: invalid user terminal [preauth]
Jan  5 11:12:43 host sshd[17925]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 11:12:43 host sshd[17925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.247.60
Jan  5 11:12:45 host sshd[17925]: Failed password for invalid user terminal from 192.99.247.60 port 34192 ssh2
Jan  5 11:12:46 host sshd[17925]: Received disconnect from 192.99.247.60 port 34192:11: Bye Bye [preauth]
Jan  5 11:12:46 host sshd[17925]: Disconnected from 192.99.247.60 port 34192 [preauth]
Jan  5 11:13:16 host sshd[17979]: Invalid user lh from 178.154.225.109 port 53164
Jan  5 11:13:16 host sshd[17979]: input_userauth_request: invalid user lh [preauth]
Jan  5 11:13:16 host sshd[17979]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 11:13:16 host sshd[17979]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.154.225.109
Jan  5 11:13:18 host sshd[17979]: Failed password for invalid user lh from 178.154.225.109 port 53164 ssh2
Jan  5 11:13:19 host sshd[17979]: Received disconnect from 178.154.225.109 port 53164:11: Bye Bye [preauth]
Jan  5 11:13:19 host sshd[17979]: Disconnected from 178.154.225.109 port 53164 [preauth]
Jan  5 11:13:28 host sshd[18025]: Invalid user gaurav from 51.75.251.173 port 45032
Jan  5 11:13:28 host sshd[18025]: input_userauth_request: invalid user gaurav [preauth]
Jan  5 11:13:28 host sshd[18025]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 11:13:28 host sshd[18025]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.251.173
Jan  5 11:13:31 host sshd[18025]: Failed password for invalid user gaurav from 51.75.251.173 port 45032 ssh2
Jan  5 11:13:31 host sshd[18025]: Received disconnect from 51.75.251.173 port 45032:11: Bye Bye [preauth]
Jan  5 11:13:31 host sshd[18025]: Disconnected from 51.75.251.173 port 45032 [preauth]
Jan  5 11:13:38 host sshd[18041]: Invalid user gaurav from 115.79.115.145 port 36074
Jan  5 11:13:38 host sshd[18041]: input_userauth_request: invalid user gaurav [preauth]
Jan  5 11:13:38 host sshd[18041]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 11:13:38 host sshd[18041]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.79.115.145
Jan  5 11:13:40 host sshd[18041]: Failed password for invalid user gaurav from 115.79.115.145 port 36074 ssh2
Jan  5 11:13:40 host sshd[18041]: Received disconnect from 115.79.115.145 port 36074:11: Bye Bye [preauth]
Jan  5 11:13:40 host sshd[18041]: Disconnected from 115.79.115.145 port 36074 [preauth]
Jan  5 11:14:30 host sshd[18158]: User root from 184.15.25.249 not allowed because not listed in AllowUsers
Jan  5 11:14:30 host sshd[18158]: input_userauth_request: invalid user root [preauth]
Jan  5 11:14:30 host unix_chkpwd[18161]: password check failed for user (root)
Jan  5 11:14:30 host sshd[18158]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=184.15.25.249  user=root
Jan  5 11:14:30 host sshd[18158]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 11:14:32 host sshd[18158]: Failed password for invalid user root from 184.15.25.249 port 51064 ssh2
Jan  5 11:14:32 host sshd[18158]: Received disconnect from 184.15.25.249 port 51064:11: Bye Bye [preauth]
Jan  5 11:14:32 host sshd[18158]: Disconnected from 184.15.25.249 port 51064 [preauth]
Jan  5 11:15:08 host sshd[18229]: Invalid user test from 161.35.90.77 port 40142
Jan  5 11:15:08 host sshd[18229]: input_userauth_request: invalid user test [preauth]
Jan  5 11:15:08 host sshd[18229]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 11:15:08 host sshd[18229]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.90.77
Jan  5 11:15:10 host sshd[18229]: Failed password for invalid user test from 161.35.90.77 port 40142 ssh2
Jan  5 11:15:10 host sshd[18229]: Received disconnect from 161.35.90.77 port 40142:11: Bye Bye [preauth]
Jan  5 11:15:10 host sshd[18229]: Disconnected from 161.35.90.77 port 40142 [preauth]
Jan  5 11:16:24 host sshd[18481]: Invalid user user2 from 42.200.11.53 port 56590
Jan  5 11:16:24 host sshd[18481]: input_userauth_request: invalid user user2 [preauth]
Jan  5 11:16:24 host sshd[18481]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 11:16:24 host sshd[18481]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.200.11.53
Jan  5 11:16:26 host sshd[18481]: Failed password for invalid user user2 from 42.200.11.53 port 56590 ssh2
Jan  5 11:16:26 host sshd[18481]: Received disconnect from 42.200.11.53 port 56590:11: Bye Bye [preauth]
Jan  5 11:16:26 host sshd[18481]: Disconnected from 42.200.11.53 port 56590 [preauth]
Jan  5 11:16:28 host sshd[18514]: Invalid user ubuntu from 43.134.227.170 port 37754
Jan  5 11:16:28 host sshd[18514]: input_userauth_request: invalid user ubuntu [preauth]
Jan  5 11:16:28 host sshd[18514]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 11:16:28 host sshd[18514]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.134.227.170
Jan  5 11:16:29 host sshd[18514]: Failed password for invalid user ubuntu from 43.134.227.170 port 37754 ssh2
Jan  5 11:16:29 host sshd[18514]: Received disconnect from 43.134.227.170 port 37754:11: Bye Bye [preauth]
Jan  5 11:16:29 host sshd[18514]: Disconnected from 43.134.227.170 port 37754 [preauth]
Jan  5 11:16:38 host sshd[18532]: Invalid user frederick from 51.75.251.173 port 54174
Jan  5 11:16:38 host sshd[18532]: input_userauth_request: invalid user frederick [preauth]
Jan  5 11:16:38 host sshd[18532]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 11:16:38 host sshd[18532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.251.173
Jan  5 11:16:40 host sshd[18532]: Failed password for invalid user frederick from 51.75.251.173 port 54174 ssh2
Jan  5 11:16:40 host sshd[18532]: Received disconnect from 51.75.251.173 port 54174:11: Bye Bye [preauth]
Jan  5 11:16:40 host sshd[18532]: Disconnected from 51.75.251.173 port 54174 [preauth]
Jan  5 11:16:57 host sshd[18569]: Invalid user frederick from 161.35.90.77 port 43222
Jan  5 11:16:57 host sshd[18569]: input_userauth_request: invalid user frederick [preauth]
Jan  5 11:16:57 host sshd[18569]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 11:16:57 host sshd[18569]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.90.77
Jan  5 11:16:59 host sshd[18569]: Failed password for invalid user frederick from 161.35.90.77 port 43222 ssh2
Jan  5 11:16:59 host sshd[18569]: Received disconnect from 161.35.90.77 port 43222:11: Bye Bye [preauth]
Jan  5 11:16:59 host sshd[18569]: Disconnected from 161.35.90.77 port 43222 [preauth]
Jan  5 11:17:11 host sshd[18605]: Invalid user es from 192.99.247.60 port 50214
Jan  5 11:17:11 host sshd[18605]: input_userauth_request: invalid user es [preauth]
Jan  5 11:17:11 host sshd[18605]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 11:17:11 host sshd[18605]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.247.60
Jan  5 11:17:13 host sshd[18605]: Failed password for invalid user es from 192.99.247.60 port 50214 ssh2
Jan  5 11:17:14 host sshd[18605]: Received disconnect from 192.99.247.60 port 50214:11: Bye Bye [preauth]
Jan  5 11:17:14 host sshd[18605]: Disconnected from 192.99.247.60 port 50214 [preauth]
Jan  5 11:17:14 host sshd[18611]: Invalid user sanjay from 115.79.115.145 port 36426
Jan  5 11:17:14 host sshd[18611]: input_userauth_request: invalid user sanjay [preauth]
Jan  5 11:17:14 host sshd[18611]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 11:17:14 host sshd[18611]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.79.115.145
Jan  5 11:17:15 host sshd[18613]: User root from 178.154.225.109 not allowed because not listed in AllowUsers
Jan  5 11:17:15 host sshd[18613]: input_userauth_request: invalid user root [preauth]
Jan  5 11:17:15 host unix_chkpwd[18618]: password check failed for user (root)
Jan  5 11:17:15 host sshd[18613]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.154.225.109  user=root
Jan  5 11:17:15 host sshd[18613]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 11:17:16 host sshd[18616]: Invalid user team2 from 51.250.79.53 port 56158
Jan  5 11:17:16 host sshd[18616]: input_userauth_request: invalid user team2 [preauth]
Jan  5 11:17:16 host sshd[18616]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 11:17:16 host sshd[18616]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.250.79.53
Jan  5 11:17:16 host sshd[18611]: Failed password for invalid user sanjay from 115.79.115.145 port 36426 ssh2
Jan  5 11:17:16 host sshd[18611]: Received disconnect from 115.79.115.145 port 36426:11: Bye Bye [preauth]
Jan  5 11:17:16 host sshd[18611]: Disconnected from 115.79.115.145 port 36426 [preauth]
Jan  5 11:17:17 host sshd[18613]: Failed password for invalid user root from 178.154.225.109 port 41672 ssh2
Jan  5 11:17:17 host sshd[18613]: Received disconnect from 178.154.225.109 port 41672:11: Bye Bye [preauth]
Jan  5 11:17:17 host sshd[18613]: Disconnected from 178.154.225.109 port 41672 [preauth]
Jan  5 11:17:18 host sshd[18616]: Failed password for invalid user team2 from 51.250.79.53 port 56158 ssh2
Jan  5 11:17:18 host sshd[18616]: Received disconnect from 51.250.79.53 port 56158:11: Bye Bye [preauth]
Jan  5 11:17:18 host sshd[18616]: Disconnected from 51.250.79.53 port 56158 [preauth]
Jan  5 11:17:38 host sshd[18734]: User root from 184.15.25.249 not allowed because not listed in AllowUsers
Jan  5 11:17:38 host sshd[18734]: input_userauth_request: invalid user root [preauth]
Jan  5 11:17:38 host unix_chkpwd[18743]: password check failed for user (root)
Jan  5 11:17:38 host sshd[18734]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=184.15.25.249  user=root
Jan  5 11:17:38 host sshd[18734]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 11:17:40 host sshd[18734]: Failed password for invalid user root from 184.15.25.249 port 56774 ssh2
Jan  5 11:17:40 host sshd[18734]: Received disconnect from 184.15.25.249 port 56774:11: Bye Bye [preauth]
Jan  5 11:17:40 host sshd[18734]: Disconnected from 184.15.25.249 port 56774 [preauth]
Jan  5 11:17:52 host sshd[18786]: User root from 51.75.251.173 not allowed because not listed in AllowUsers
Jan  5 11:17:52 host sshd[18786]: input_userauth_request: invalid user root [preauth]
Jan  5 11:17:52 host unix_chkpwd[18790]: password check failed for user (root)
Jan  5 11:17:52 host sshd[18786]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.251.173  user=root
Jan  5 11:17:52 host sshd[18786]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 11:17:55 host sshd[18786]: Failed password for invalid user root from 51.75.251.173 port 33214 ssh2
Jan  5 11:17:55 host sshd[18786]: Received disconnect from 51.75.251.173 port 33214:11: Bye Bye [preauth]
Jan  5 11:17:55 host sshd[18786]: Disconnected from 51.75.251.173 port 33214 [preauth]
Jan  5 11:18:07 host sshd[18843]: User root from 161.35.90.77 not allowed because not listed in AllowUsers
Jan  5 11:18:07 host sshd[18843]: input_userauth_request: invalid user root [preauth]
Jan  5 11:18:07 host unix_chkpwd[18846]: password check failed for user (root)
Jan  5 11:18:07 host sshd[18843]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.90.77  user=root
Jan  5 11:18:07 host sshd[18843]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 11:18:08 host sshd[18878]: User root from 43.134.227.170 not allowed because not listed in AllowUsers
Jan  5 11:18:08 host sshd[18878]: input_userauth_request: invalid user root [preauth]
Jan  5 11:18:08 host unix_chkpwd[18880]: password check failed for user (root)
Jan  5 11:18:08 host sshd[18878]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.134.227.170  user=root
Jan  5 11:18:08 host sshd[18878]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 11:18:08 host sshd[18843]: Failed password for invalid user root from 161.35.90.77 port 42246 ssh2
Jan  5 11:18:10 host sshd[18878]: Failed password for invalid user root from 43.134.227.170 port 50700 ssh2
Jan  5 11:18:10 host sshd[18878]: Received disconnect from 43.134.227.170 port 50700:11: Bye Bye [preauth]
Jan  5 11:18:10 host sshd[18878]: Disconnected from 43.134.227.170 port 50700 [preauth]
Jan  5 11:18:20 host sshd[18923]: Invalid user user from 192.99.247.60 port 56724
Jan  5 11:18:20 host sshd[18923]: input_userauth_request: invalid user user [preauth]
Jan  5 11:18:20 host sshd[18923]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 11:18:20 host sshd[18923]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.247.60
Jan  5 11:18:22 host sshd[18923]: Failed password for invalid user user from 192.99.247.60 port 56724 ssh2
Jan  5 11:18:22 host sshd[18923]: Received disconnect from 192.99.247.60 port 56724:11: Bye Bye [preauth]
Jan  5 11:18:22 host sshd[18923]: Disconnected from 192.99.247.60 port 56724 [preauth]
Jan  5 11:18:35 host sshd[18997]: User root from 42.200.11.53 not allowed because not listed in AllowUsers
Jan  5 11:18:35 host sshd[18997]: input_userauth_request: invalid user root [preauth]
Jan  5 11:18:35 host unix_chkpwd[18999]: password check failed for user (root)
Jan  5 11:18:35 host sshd[18997]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.200.11.53  user=root
Jan  5 11:18:35 host sshd[18997]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 11:18:37 host sshd[18997]: Failed password for invalid user root from 42.200.11.53 port 57476 ssh2
Jan  5 11:18:37 host sshd[18997]: Received disconnect from 42.200.11.53 port 57476:11: Bye Bye [preauth]
Jan  5 11:18:37 host sshd[18997]: Disconnected from 42.200.11.53 port 57476 [preauth]
Jan  5 11:18:48 host sshd[19043]: Invalid user dst from 115.79.115.145 port 49824
Jan  5 11:18:48 host sshd[19043]: input_userauth_request: invalid user dst [preauth]
Jan  5 11:18:48 host sshd[19043]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 11:18:48 host sshd[19043]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.79.115.145
Jan  5 11:18:48 host sshd[19003]: Connection closed by 94.102.61.20 port 58902 [preauth]
Jan  5 11:18:49 host sshd[19043]: Failed password for invalid user dst from 115.79.115.145 port 49824 ssh2
Jan  5 11:18:50 host sshd[19043]: Received disconnect from 115.79.115.145 port 49824:11: Bye Bye [preauth]
Jan  5 11:18:50 host sshd[19043]: Disconnected from 115.79.115.145 port 49824 [preauth]
Jan  5 11:18:55 host sshd[19081]: Invalid user admin from 109.236.44.151 port 50065
Jan  5 11:18:55 host sshd[19081]: input_userauth_request: invalid user admin [preauth]
Jan  5 11:18:55 host sshd[19081]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 11:18:55 host sshd[19081]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.236.44.151
Jan  5 11:18:56 host sshd[19081]: Failed password for invalid user admin from 109.236.44.151 port 50065 ssh2
Jan  5 11:18:57 host sshd[19081]: Connection closed by 109.236.44.151 port 50065 [preauth]
Jan  5 11:20:23 host sshd[19286]: User root from 191.242.105.133 not allowed because not listed in AllowUsers
Jan  5 11:20:23 host sshd[19286]: input_userauth_request: invalid user root [preauth]
Jan  5 11:20:23 host unix_chkpwd[19291]: password check failed for user (root)
Jan  5 11:20:23 host sshd[19286]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.242.105.133  user=root
Jan  5 11:20:23 host sshd[19286]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 11:20:25 host sshd[19286]: Failed password for invalid user root from 191.242.105.133 port 53986 ssh2
Jan  5 11:20:26 host sshd[19286]: Received disconnect from 191.242.105.133 port 53986:11: Bye Bye [preauth]
Jan  5 11:20:26 host sshd[19286]: Disconnected from 191.242.105.133 port 53986 [preauth]
Jan  5 11:20:26 host sshd[19292]: User root from 177.92.16.186 not allowed because not listed in AllowUsers
Jan  5 11:20:26 host sshd[19292]: input_userauth_request: invalid user root [preauth]
Jan  5 11:20:26 host unix_chkpwd[19319]: password check failed for user (root)
Jan  5 11:20:26 host sshd[19292]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.92.16.186  user=root
Jan  5 11:20:26 host sshd[19292]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 11:20:28 host sshd[19292]: Failed password for invalid user root from 177.92.16.186 port 10457 ssh2
Jan  5 11:20:28 host sshd[19292]: Received disconnect from 177.92.16.186 port 10457:11: Bye Bye [preauth]
Jan  5 11:20:28 host sshd[19292]: Disconnected from 177.92.16.186 port 10457 [preauth]
Jan  5 11:20:57 host sshd[19422]: User root from 103.146.158.169 not allowed because not listed in AllowUsers
Jan  5 11:20:57 host sshd[19422]: input_userauth_request: invalid user root [preauth]
Jan  5 11:20:57 host unix_chkpwd[19424]: password check failed for user (root)
Jan  5 11:20:57 host sshd[19422]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.146.158.169  user=root
Jan  5 11:20:57 host sshd[19422]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 11:20:59 host sshd[19422]: Failed password for invalid user root from 103.146.158.169 port 48538 ssh2
Jan  5 11:20:59 host sshd[19422]: Received disconnect from 103.146.158.169 port 48538:11: Bye Bye [preauth]
Jan  5 11:20:59 host sshd[19422]: Disconnected from 103.146.158.169 port 48538 [preauth]
Jan  5 11:21:11 host sshd[19486]: Invalid user ftptest from 195.239.97.254 port 60148
Jan  5 11:21:11 host sshd[19486]: input_userauth_request: invalid user ftptest [preauth]
Jan  5 11:21:11 host sshd[19486]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 11:21:11 host sshd[19486]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.239.97.254
Jan  5 11:21:11 host sshd[19490]: Invalid user cms from 42.96.45.52 port 28130
Jan  5 11:21:11 host sshd[19490]: input_userauth_request: invalid user cms [preauth]
Jan  5 11:21:11 host sshd[19490]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 11:21:11 host sshd[19490]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.96.45.52
Jan  5 11:21:13 host sshd[19486]: Failed password for invalid user ftptest from 195.239.97.254 port 60148 ssh2
Jan  5 11:21:13 host sshd[19486]: Received disconnect from 195.239.97.254 port 60148:11: Bye Bye [preauth]
Jan  5 11:21:13 host sshd[19486]: Disconnected from 195.239.97.254 port 60148 [preauth]
Jan  5 11:21:13 host sshd[19490]: Failed password for invalid user cms from 42.96.45.52 port 28130 ssh2
Jan  5 11:21:14 host sshd[19490]: Received disconnect from 42.96.45.52 port 28130:11: Bye Bye [preauth]
Jan  5 11:21:14 host sshd[19490]: Disconnected from 42.96.45.52 port 28130 [preauth]
Jan  5 11:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  5 11:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 11:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 11:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  5 11:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 11:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 11:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  5 11:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 11:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 11:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  5 11:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 11:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 11:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  5 11:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 11:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 11:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  5 11:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 11:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 11:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  5 11:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 11:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 11:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  5 11:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 11:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 11:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  5 11:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 11:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 11:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  5 11:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 11:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 11:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  5 11:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 11:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 11:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  5 11:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 11:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 11:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  5 11:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 11:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 11:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=travelboniface user-3=wwwresourcehunte user-4=keralaholi user-5=wwwrmswll user-6=ugotscom user-7=wwwkaretakers user-8=cochintaxi user-9=a2zgroup user-10=dartsimp user-11=laundryboniface user-12=bonifacegroup user-13=wwwevmhonda user-14=wwwletsstalkfood user-15=straightcurve user-16=palco123 user-17=gifterman user-18=kottayamcalldriv user-19=phmetals user-20=mrsclean user-21=wwwnexidigital user-22=disposeat user-23=wwwkmaorg user-24=remysagr user-25=wwwkapin user-26=woodpeck user-27=vfmassets user-28=shalinijames user-29=wwwtestugo user-30=pmcresources feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  5 11:21:53 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  5 11:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 11:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 11:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  5 11:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 11:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 11:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-YnAckuxnup96WxZS.~
Jan  5 11:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 11:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 11:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-YnAckuxnup96WxZS.~'
Jan  5 11:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 11:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 11:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-YnAckuxnup96WxZS.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  5 11:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 11:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 11:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  5 11:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 11:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 11:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  5 11:21:56 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 11:21:56 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 11:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  5 11:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 11:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 11:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  5 11:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 11:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 11:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  5 11:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 11:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 11:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  5 11:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 11:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 11:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  5 11:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 11:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 11:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  5 11:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  5 11:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  5 11:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  5 11:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  5 11:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  5 11:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  5 11:22:01 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  5 11:22:03 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  5 11:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  5 11:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 11:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 11:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  5 11:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 11:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 11:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  5 11:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 11:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 11:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  5 11:22:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 11:22:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 11:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  5 11:22:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 11:22:10 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 11:23:45 host sshd[20020]: Invalid user rd from 116.193.190.120 port 52912
Jan  5 11:23:45 host sshd[20020]: input_userauth_request: invalid user rd [preauth]
Jan  5 11:23:45 host sshd[20020]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 11:23:45 host sshd[20020]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.193.190.120
Jan  5 11:23:47 host sshd[20020]: Failed password for invalid user rd from 116.193.190.120 port 52912 ssh2
Jan  5 11:23:47 host sshd[20020]: Received disconnect from 116.193.190.120 port 52912:11: Bye Bye [preauth]
Jan  5 11:23:47 host sshd[20020]: Disconnected from 116.193.190.120 port 52912 [preauth]
Jan  5 11:25:15 host sshd[20205]: User root from 191.242.105.133 not allowed because not listed in AllowUsers
Jan  5 11:25:15 host sshd[20205]: input_userauth_request: invalid user root [preauth]
Jan  5 11:25:15 host unix_chkpwd[20209]: password check failed for user (root)
Jan  5 11:25:15 host sshd[20205]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.242.105.133  user=root
Jan  5 11:25:15 host sshd[20205]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 11:25:16 host sshd[20205]: Failed password for invalid user root from 191.242.105.133 port 48966 ssh2
Jan  5 11:25:16 host sshd[20205]: Received disconnect from 191.242.105.133 port 48966:11: Bye Bye [preauth]
Jan  5 11:25:16 host sshd[20205]: Disconnected from 191.242.105.133 port 48966 [preauth]
Jan  5 11:25:18 host sshd[20231]: Invalid user kiran from 103.146.158.169 port 50784
Jan  5 11:25:18 host sshd[20231]: input_userauth_request: invalid user kiran [preauth]
Jan  5 11:25:18 host sshd[20231]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 11:25:18 host sshd[20231]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.146.158.169
Jan  5 11:25:20 host sshd[20231]: Failed password for invalid user kiran from 103.146.158.169 port 50784 ssh2
Jan  5 11:25:20 host sshd[20231]: Received disconnect from 103.146.158.169 port 50784:11: Bye Bye [preauth]
Jan  5 11:25:20 host sshd[20231]: Disconnected from 103.146.158.169 port 50784 [preauth]
Jan  5 11:25:27 host sshd[20305]: Invalid user ftptest from 42.96.45.52 port 34228
Jan  5 11:25:27 host sshd[20305]: input_userauth_request: invalid user ftptest [preauth]
Jan  5 11:25:27 host sshd[20305]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 11:25:27 host sshd[20305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.96.45.52
Jan  5 11:25:28 host sshd[20305]: Failed password for invalid user ftptest from 42.96.45.52 port 34228 ssh2
Jan  5 11:25:29 host sshd[20305]: Received disconnect from 42.96.45.52 port 34228:11: Bye Bye [preauth]
Jan  5 11:25:29 host sshd[20305]: Disconnected from 42.96.45.52 port 34228 [preauth]
Jan  5 11:25:30 host sshd[20321]: Invalid user test02 from 195.239.97.254 port 50150
Jan  5 11:25:30 host sshd[20321]: input_userauth_request: invalid user test02 [preauth]
Jan  5 11:25:30 host sshd[20321]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 11:25:30 host sshd[20321]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.239.97.254
Jan  5 11:25:32 host sshd[20321]: Failed password for invalid user test02 from 195.239.97.254 port 50150 ssh2
Jan  5 11:25:33 host sshd[20321]: Received disconnect from 195.239.97.254 port 50150:11: Bye Bye [preauth]
Jan  5 11:25:33 host sshd[20321]: Disconnected from 195.239.97.254 port 50150 [preauth]
Jan  5 11:25:59 host sshd[20405]: User root from 177.92.16.186 not allowed because not listed in AllowUsers
Jan  5 11:25:59 host sshd[20405]: input_userauth_request: invalid user root [preauth]
Jan  5 11:25:59 host unix_chkpwd[20410]: password check failed for user (root)
Jan  5 11:25:59 host sshd[20405]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.92.16.186  user=root
Jan  5 11:25:59 host sshd[20405]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 11:26:01 host sshd[20405]: Failed password for invalid user root from 177.92.16.186 port 40906 ssh2
Jan  5 11:26:01 host sshd[20405]: Received disconnect from 177.92.16.186 port 40906:11: Bye Bye [preauth]
Jan  5 11:26:01 host sshd[20405]: Disconnected from 177.92.16.186 port 40906 [preauth]
Jan  5 11:26:02 host sshd[20421]: User root from 116.193.190.120 not allowed because not listed in AllowUsers
Jan  5 11:26:02 host sshd[20421]: input_userauth_request: invalid user root [preauth]
Jan  5 11:26:02 host unix_chkpwd[20425]: password check failed for user (root)
Jan  5 11:26:02 host sshd[20421]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.193.190.120  user=root
Jan  5 11:26:02 host sshd[20421]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 11:26:04 host sshd[20421]: Failed password for invalid user root from 116.193.190.120 port 39666 ssh2
Jan  5 11:26:04 host sshd[20421]: Received disconnect from 116.193.190.120 port 39666:11: Bye Bye [preauth]
Jan  5 11:26:04 host sshd[20421]: Disconnected from 116.193.190.120 port 39666 [preauth]
Jan  5 11:26:55 host sshd[20664]: Invalid user vpn from 195.239.97.254 port 49648
Jan  5 11:26:55 host sshd[20664]: input_userauth_request: invalid user vpn [preauth]
Jan  5 11:26:55 host sshd[20664]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 11:26:55 host sshd[20664]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.239.97.254
Jan  5 11:26:57 host sshd[20669]: Invalid user informix from 42.96.45.52 port 33588
Jan  5 11:26:57 host sshd[20669]: input_userauth_request: invalid user informix [preauth]
Jan  5 11:26:57 host sshd[20669]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 11:26:57 host sshd[20669]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.96.45.52
Jan  5 11:26:57 host sshd[20664]: Failed password for invalid user vpn from 195.239.97.254 port 49648 ssh2
Jan  5 11:26:57 host sshd[20664]: Received disconnect from 195.239.97.254 port 49648:11: Bye Bye [preauth]
Jan  5 11:26:57 host sshd[20664]: Disconnected from 195.239.97.254 port 49648 [preauth]
Jan  5 11:26:59 host sshd[20669]: Failed password for invalid user informix from 42.96.45.52 port 33588 ssh2
Jan  5 11:37:35 host sshd[22498]: Invalid user larry from 209.141.56.48 port 42788
Jan  5 11:37:35 host sshd[22498]: input_userauth_request: invalid user larry [preauth]
Jan  5 11:37:35 host sshd[22498]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 11:37:35 host sshd[22498]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48
Jan  5 11:37:37 host sshd[22498]: Failed password for invalid user larry from 209.141.56.48 port 42788 ssh2
Jan  5 11:37:37 host sshd[22498]: Connection closed by 209.141.56.48 port 42788 [preauth]
Jan  5 11:38:04 host sshd[22558]: Invalid user postgres from 178.62.50.191 port 50940
Jan  5 11:38:04 host sshd[22558]: input_userauth_request: invalid user postgres [preauth]
Jan  5 11:38:04 host sshd[22558]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 11:38:04 host sshd[22558]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.50.191
Jan  5 11:38:06 host sshd[22558]: Failed password for invalid user postgres from 178.62.50.191 port 50940 ssh2
Jan  5 11:38:06 host sshd[22558]: Received disconnect from 178.62.50.191 port 50940:11: Bye Bye [preauth]
Jan  5 11:38:06 host sshd[22558]: Disconnected from 178.62.50.191 port 50940 [preauth]
Jan  5 11:38:07 host sshd[22562]: Invalid user ac from 194.110.203.109 port 58878
Jan  5 11:38:07 host sshd[22562]: input_userauth_request: invalid user ac [preauth]
Jan  5 11:38:07 host sshd[22562]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 11:38:07 host sshd[22562]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109
Jan  5 11:38:07 host sshd[22565]: Invalid user larry from 209.141.56.48 port 34292
Jan  5 11:38:07 host sshd[22565]: input_userauth_request: invalid user larry [preauth]
Jan  5 11:38:07 host sshd[22565]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 11:38:07 host sshd[22565]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48
Jan  5 11:38:09 host sshd[22562]: Failed password for invalid user ac from 194.110.203.109 port 58878 ssh2
Jan  5 11:38:10 host sshd[22565]: Failed password for invalid user larry from 209.141.56.48 port 34292 ssh2
Jan  5 11:38:12 host sshd[22562]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 11:38:15 host sshd[22562]: Failed password for invalid user ac from 194.110.203.109 port 58878 ssh2
Jan  5 11:38:18 host sshd[22562]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 11:38:20 host sshd[22562]: Failed password for invalid user ac from 194.110.203.109 port 58878 ssh2
Jan  5 11:38:23 host sshd[22562]: Connection closed by 194.110.203.109 port 58878 [preauth]
Jan  5 11:38:23 host sshd[22562]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109
Jan  5 11:38:51 host sshd[22667]: Invalid user es from 87.15.73.152 port 49953
Jan  5 11:38:51 host sshd[22667]: input_userauth_request: invalid user es [preauth]
Jan  5 11:38:51 host sshd[22667]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 11:38:51 host sshd[22667]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.15.73.152
Jan  5 11:38:53 host sshd[22667]: Failed password for invalid user es from 87.15.73.152 port 49953 ssh2
Jan  5 11:38:53 host sshd[22667]: Received disconnect from 87.15.73.152 port 49953:11: Bye Bye [preauth]
Jan  5 11:38:53 host sshd[22667]: Disconnected from 87.15.73.152 port 49953 [preauth]
Jan  5 11:40:34 host sshd[22939]: User root from 103.13.40.2 not allowed because not listed in AllowUsers
Jan  5 11:40:34 host sshd[22939]: input_userauth_request: invalid user root [preauth]
Jan  5 11:40:34 host unix_chkpwd[22941]: password check failed for user (root)
Jan  5 11:40:34 host sshd[22939]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2  user=root
Jan  5 11:40:34 host sshd[22939]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 11:40:36 host sshd[22939]: Failed password for invalid user root from 103.13.40.2 port 49102 ssh2
Jan  5 11:40:36 host sshd[22939]: Connection closed by 103.13.40.2 port 49102 [preauth]
Jan  5 11:42:50 host sshd[23232]: Invalid user server from 87.15.73.152 port 45453
Jan  5 11:42:50 host sshd[23232]: input_userauth_request: invalid user server [preauth]
Jan  5 11:42:50 host sshd[23232]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 11:42:50 host sshd[23232]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.15.73.152
Jan  5 11:42:53 host sshd[23232]: Failed password for invalid user server from 87.15.73.152 port 45453 ssh2
Jan  5 11:42:53 host sshd[23232]: Received disconnect from 87.15.73.152 port 45453:11: Bye Bye [preauth]
Jan  5 11:42:53 host sshd[23232]: Disconnected from 87.15.73.152 port 45453 [preauth]
Jan  5 11:43:34 host sshd[23320]: Invalid user znc from 178.62.50.191 port 46478
Jan  5 11:43:34 host sshd[23320]: input_userauth_request: invalid user znc [preauth]
Jan  5 11:43:34 host sshd[23320]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 11:43:34 host sshd[23320]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.50.191
Jan  5 11:43:36 host sshd[23320]: Failed password for invalid user znc from 178.62.50.191 port 46478 ssh2
Jan  5 11:43:36 host sshd[23320]: Received disconnect from 178.62.50.191 port 46478:11: Bye Bye [preauth]
Jan  5 11:43:36 host sshd[23320]: Disconnected from 178.62.50.191 port 46478 [preauth]
Jan  5 11:44:05 host sshd[23403]: Invalid user toor from 87.15.73.152 port 59816
Jan  5 11:44:05 host sshd[23403]: input_userauth_request: invalid user toor [preauth]
Jan  5 11:44:05 host sshd[23403]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 11:44:05 host sshd[23403]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.15.73.152
Jan  5 11:44:06 host sshd[23403]: Failed password for invalid user toor from 87.15.73.152 port 59816 ssh2
Jan  5 11:44:07 host sshd[23403]: Received disconnect from 87.15.73.152 port 59816:11: Bye Bye [preauth]
Jan  5 11:44:07 host sshd[23403]: Disconnected from 87.15.73.152 port 59816 [preauth]
Jan  5 11:44:39 host sshd[23586]: Invalid user admin from 178.62.50.191 port 41954
Jan  5 11:44:39 host sshd[23586]: input_userauth_request: invalid user admin [preauth]
Jan  5 11:44:39 host sshd[23586]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 11:44:39 host sshd[23586]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.50.191
Jan  5 11:44:41 host sshd[23586]: Failed password for invalid user admin from 178.62.50.191 port 41954 ssh2
Jan  5 11:44:41 host sshd[23586]: Received disconnect from 178.62.50.191 port 41954:11: Bye Bye [preauth]
Jan  5 11:44:41 host sshd[23586]: Disconnected from 178.62.50.191 port 41954 [preauth]
Jan  5 11:53:04 host sshd[24757]: Did not receive identification string from 107.182.129.219 port 38596
Jan  5 11:53:49 host sshd[24842]: Invalid user admin from 107.182.129.219 port 60154
Jan  5 11:53:49 host sshd[24842]: input_userauth_request: invalid user admin [preauth]
Jan  5 11:53:49 host sshd[24842]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 11:53:49 host sshd[24842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.182.129.219
Jan  5 11:53:51 host sshd[24842]: Failed password for invalid user admin from 107.182.129.219 port 60154 ssh2
Jan  5 11:53:51 host sshd[24842]: Connection closed by 107.182.129.219 port 60154 [preauth]
Jan  5 11:54:42 host sshd[24956]: Invalid user admin from 107.182.129.219 port 54312
Jan  5 11:54:42 host sshd[24956]: input_userauth_request: invalid user admin [preauth]
Jan  5 11:54:42 host sshd[24956]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 11:54:42 host sshd[24956]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.182.129.219
Jan  5 11:54:43 host sshd[24956]: Failed password for invalid user admin from 107.182.129.219 port 54312 ssh2
Jan  5 11:54:44 host sshd[24956]: Connection closed by 107.182.129.219 port 54312 [preauth]
Jan  5 11:58:24 host sshd[25400]: Bad protocol version identification '\026\003\001\001\t\001' from 152.32.150.182 port 55512
Jan  5 11:58:29 host sshd[25402]: Invalid user support from 103.71.225.35 port 53270
Jan  5 11:58:29 host sshd[25402]: input_userauth_request: invalid user support [preauth]
Jan  5 11:58:31 host sshd[25402]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 11:58:31 host sshd[25402]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.71.225.35
Jan  5 11:58:33 host sshd[25402]: Failed password for invalid user support from 103.71.225.35 port 53270 ssh2
Jan  5 11:58:34 host sshd[25402]: Connection closed by 103.71.225.35 port 53270 [preauth]
Jan  5 11:58:45 host sshd[25408]: Did not receive identification string from 152.32.150.182 port 56974
Jan  5 11:58:57 host sshd[25485]: Connection closed by 152.32.150.182 port 44914 [preauth]
Jan  5 11:58:59 host sshd[25595]: Protocol major versions differ for 152.32.150.182 port 48106: SSH-2.0-OpenSSH_7.4 vs. SSH-1.5-Server
Jan  5 12:17:44 host sshd[29172]: Connection closed by 66.175.213.4 port 11138 [preauth]
Jan  5 12:17:46 host sshd[29178]: Connection closed by 66.175.213.4 port 22720 [preauth]
Jan  5 12:17:47 host sshd[29181]: Connection closed by 66.175.213.4 port 22736 [preauth]
Jan  5 12:18:48 host sshd[29303]: User root from 90.142.36.248 not allowed because not listed in AllowUsers
Jan  5 12:18:48 host sshd[29303]: input_userauth_request: invalid user root [preauth]
Jan  5 12:18:48 host unix_chkpwd[29306]: password check failed for user (root)
Jan  5 12:18:48 host sshd[29303]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=90.142.36.248  user=root
Jan  5 12:18:48 host sshd[29303]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 12:18:50 host sshd[29303]: Failed password for invalid user root from 90.142.36.248 port 58670 ssh2
Jan  5 12:18:51 host sshd[29303]: Connection closed by 90.142.36.248 port 58670 [preauth]
Jan  5 12:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  5 12:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 12:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 12:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  5 12:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 12:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 12:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  5 12:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 12:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 12:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  5 12:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 12:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 12:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  5 12:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 12:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 12:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  5 12:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 12:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 12:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  5 12:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 12:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 12:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  5 12:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 12:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 12:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  5 12:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 12:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 12:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  5 12:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 12:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 12:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  5 12:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 12:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 12:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  5 12:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 12:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 12:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  5 12:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 12:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 12:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwrmswll user-2=keralaholi user-3=wwwresourcehunte user-4=ugotscom user-5=travelboniface user-6=wwwpmcresource user-7=laundryboniface user-8=dartsimp user-9=a2zgroup user-10=wwwkaretakers user-11=cochintaxi user-12=wwwnexidigital user-13=mrsclean user-14=gifterman user-15=palco123 user-16=phmetals user-17=kottayamcalldriv user-18=straightcurve user-19=wwwletsstalkfood user-20=bonifacegroup user-21=wwwevmhonda user-22=pmcresources user-23=vfmassets user-24=wwwtestugo user-25=shalinijames user-26=woodpeck user-27=wwwkapin user-28=disposeat user-29=wwwkmaorg user-30=remysagr feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  5 12:21:54 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  5 12:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 12:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 12:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  5 12:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 12:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 12:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-MMJJETlE3C0VPGeS.~
Jan  5 12:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 12:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 12:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-MMJJETlE3C0VPGeS.~'
Jan  5 12:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 12:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 12:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-MMJJETlE3C0VPGeS.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  5 12:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 12:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 12:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  5 12:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 12:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 12:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  5 12:21:57 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 12:21:57 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 12:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  5 12:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 12:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 12:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  5 12:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 12:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 12:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  5 12:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 12:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 12:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  5 12:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 12:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 12:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  5 12:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 12:21:59 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 12:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  5 12:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  5 12:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  5 12:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  5 12:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  5 12:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  5 12:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  5 12:22:01 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  5 12:22:03 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  5 12:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  5 12:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 12:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 12:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  5 12:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 12:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 12:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  5 12:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 12:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 12:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  5 12:22:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 12:22:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 12:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  5 12:22:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 12:22:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 12:24:23 host sshd[30214]: Invalid user oper from 161.35.79.199 port 49700
Jan  5 12:24:23 host sshd[30214]: input_userauth_request: invalid user oper [preauth]
Jan  5 12:24:23 host sshd[30214]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 12:24:23 host sshd[30214]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.79.199
Jan  5 12:24:24 host sshd[30214]: Failed password for invalid user oper from 161.35.79.199 port 49700 ssh2
Jan  5 12:24:24 host sshd[30214]: Received disconnect from 161.35.79.199 port 49700:11: Bye Bye [preauth]
Jan  5 12:24:24 host sshd[30214]: Disconnected from 161.35.79.199 port 49700 [preauth]
Jan  5 12:25:05 host sshd[30321]: User root from 104.248.150.150 not allowed because not listed in AllowUsers
Jan  5 12:25:05 host sshd[30321]: input_userauth_request: invalid user root [preauth]
Jan  5 12:25:05 host unix_chkpwd[30323]: password check failed for user (root)
Jan  5 12:25:05 host sshd[30321]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.150.150  user=root
Jan  5 12:25:05 host sshd[30321]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 12:25:07 host sshd[30321]: Failed password for invalid user root from 104.248.150.150 port 37582 ssh2
Jan  5 12:25:07 host sshd[30321]: Received disconnect from 104.248.150.150 port 37582:11: Bye Bye [preauth]
Jan  5 12:25:07 host sshd[30321]: Disconnected from 104.248.150.150 port 37582 [preauth]
Jan  5 12:25:37 host sshd[30392]: Invalid user user1 from 41.197.31.178 port 53570
Jan  5 12:25:37 host sshd[30392]: input_userauth_request: invalid user user1 [preauth]
Jan  5 12:25:38 host sshd[30392]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 12:25:38 host sshd[30392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178
Jan  5 12:25:40 host sshd[30392]: Failed password for invalid user user1 from 41.197.31.178 port 53570 ssh2
Jan  5 12:25:41 host sshd[30392]: Connection closed by 41.197.31.178 port 53570 [preauth]
Jan  5 12:27:43 host sshd[30783]: User root from 68.183.225.151 not allowed because not listed in AllowUsers
Jan  5 12:27:43 host sshd[30783]: input_userauth_request: invalid user root [preauth]
Jan  5 12:27:43 host unix_chkpwd[30785]: password check failed for user (root)
Jan  5 12:27:43 host sshd[30783]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.225.151  user=root
Jan  5 12:27:43 host sshd[30783]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 12:27:45 host sshd[30783]: Failed password for invalid user root from 68.183.225.151 port 35796 ssh2
Jan  5 12:27:45 host sshd[30783]: Received disconnect from 68.183.225.151 port 35796:11: Bye Bye [preauth]
Jan  5 12:27:45 host sshd[30783]: Disconnected from 68.183.225.151 port 35796 [preauth]
Jan  5 12:27:55 host sshd[30798]: User root from 8.222.128.121 not allowed because not listed in AllowUsers
Jan  5 12:27:55 host sshd[30798]: input_userauth_request: invalid user root [preauth]
Jan  5 12:27:55 host unix_chkpwd[30800]: password check failed for user (root)
Jan  5 12:27:55 host sshd[30798]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=8.222.128.121  user=root
Jan  5 12:27:55 host sshd[30798]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 12:27:57 host sshd[30798]: Failed password for invalid user root from 8.222.128.121 port 43824 ssh2
Jan  5 12:27:57 host sshd[30798]: Received disconnect from 8.222.128.121 port 43824:11: Bye Bye [preauth]
Jan  5 12:27:57 host sshd[30798]: Disconnected from 8.222.128.121 port 43824 [preauth]
Jan  5 12:30:06 host sshd[31073]: Invalid user hive from 164.92.79.95 port 47280
Jan  5 12:30:06 host sshd[31073]: input_userauth_request: invalid user hive [preauth]
Jan  5 12:30:06 host sshd[31073]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 12:30:06 host sshd[31073]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.79.95
Jan  5 12:30:08 host sshd[31073]: Failed password for invalid user hive from 164.92.79.95 port 47280 ssh2
Jan  5 12:30:08 host sshd[31073]: Received disconnect from 164.92.79.95 port 47280:11: Bye Bye [preauth]
Jan  5 12:30:08 host sshd[31073]: Disconnected from 164.92.79.95 port 47280 [preauth]
Jan  5 12:30:18 host sshd[31091]: Invalid user joyce from 161.35.79.199 port 52146
Jan  5 12:30:18 host sshd[31091]: input_userauth_request: invalid user joyce [preauth]
Jan  5 12:30:18 host sshd[31091]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 12:30:18 host sshd[31091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.79.199
Jan  5 12:30:19 host sshd[31091]: Failed password for invalid user joyce from 161.35.79.199 port 52146 ssh2
Jan  5 12:30:20 host sshd[31091]: Received disconnect from 161.35.79.199 port 52146:11: Bye Bye [preauth]
Jan  5 12:30:20 host sshd[31091]: Disconnected from 161.35.79.199 port 52146 [preauth]
Jan  5 12:30:25 host sshd[31117]: Invalid user nginx from 104.248.150.150 port 34608
Jan  5 12:30:25 host sshd[31117]: input_userauth_request: invalid user nginx [preauth]
Jan  5 12:30:25 host sshd[31117]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 12:30:25 host sshd[31117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.150.150
Jan  5 12:30:27 host sshd[31117]: Failed password for invalid user nginx from 104.248.150.150 port 34608 ssh2
Jan  5 12:30:27 host sshd[31117]: Received disconnect from 104.248.150.150 port 34608:11: Bye Bye [preauth]
Jan  5 12:30:27 host sshd[31117]: Disconnected from 104.248.150.150 port 34608 [preauth]
Jan  5 12:31:05 host sshd[31251]: User root from 68.183.225.151 not allowed because not listed in AllowUsers
Jan  5 12:31:05 host sshd[31251]: input_userauth_request: invalid user root [preauth]
Jan  5 12:31:05 host unix_chkpwd[31253]: password check failed for user (root)
Jan  5 12:31:05 host sshd[31251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.225.151  user=root
Jan  5 12:31:05 host sshd[31251]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 12:31:08 host sshd[31251]: Failed password for invalid user root from 68.183.225.151 port 48728 ssh2
Jan  5 12:31:08 host sshd[31251]: Received disconnect from 68.183.225.151 port 48728:11: Bye Bye [preauth]
Jan  5 12:31:08 host sshd[31251]: Disconnected from 68.183.225.151 port 48728 [preauth]
Jan  5 12:31:30 host sshd[31450]: Invalid user alex from 161.35.79.199 port 51280
Jan  5 12:31:30 host sshd[31450]: input_userauth_request: invalid user alex [preauth]
Jan  5 12:31:30 host sshd[31450]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 12:31:30 host sshd[31450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.79.199
Jan  5 12:31:32 host sshd[31450]: Failed password for invalid user alex from 161.35.79.199 port 51280 ssh2
Jan  5 12:31:32 host sshd[31450]: Received disconnect from 161.35.79.199 port 51280:11: Bye Bye [preauth]
Jan  5 12:31:32 host sshd[31450]: Disconnected from 161.35.79.199 port 51280 [preauth]
Jan  5 12:31:40 host sshd[31497]: User root from 43.131.30.155 not allowed because not listed in AllowUsers
Jan  5 12:31:40 host sshd[31497]: input_userauth_request: invalid user root [preauth]
Jan  5 12:31:41 host unix_chkpwd[31507]: password check failed for user (root)
Jan  5 12:31:41 host sshd[31497]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.131.30.155  user=root
Jan  5 12:31:41 host sshd[31497]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 12:31:43 host sshd[31497]: Failed password for invalid user root from 43.131.30.155 port 34322 ssh2
Jan  5 12:31:43 host sshd[31497]: Received disconnect from 43.131.30.155 port 34322:11: Bye Bye [preauth]
Jan  5 12:31:43 host sshd[31497]: Disconnected from 43.131.30.155 port 34322 [preauth]
Jan  5 12:31:47 host sshd[31515]: Invalid user dexter from 164.92.79.95 port 35410
Jan  5 12:31:47 host sshd[31515]: input_userauth_request: invalid user dexter [preauth]
Jan  5 12:31:47 host sshd[31515]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 12:31:47 host sshd[31515]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.79.95
Jan  5 12:31:50 host sshd[31515]: Failed password for invalid user dexter from 164.92.79.95 port 35410 ssh2
Jan  5 12:31:50 host sshd[31515]: Received disconnect from 164.92.79.95 port 35410:11: Bye Bye [preauth]
Jan  5 12:31:50 host sshd[31515]: Disconnected from 164.92.79.95 port 35410 [preauth]
Jan  5 12:32:55 host sshd[31692]: User root from 164.92.79.95 not allowed because not listed in AllowUsers
Jan  5 12:32:55 host sshd[31692]: input_userauth_request: invalid user root [preauth]
Jan  5 12:32:55 host unix_chkpwd[31698]: password check failed for user (root)
Jan  5 12:32:55 host sshd[31692]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.79.95  user=root
Jan  5 12:32:55 host sshd[31692]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 12:32:57 host sshd[31692]: Failed password for invalid user root from 164.92.79.95 port 56190 ssh2
Jan  5 12:32:57 host sshd[31692]: Received disconnect from 164.92.79.95 port 56190:11: Bye Bye [preauth]
Jan  5 12:32:57 host sshd[31692]: Disconnected from 164.92.79.95 port 56190 [preauth]
Jan  5 12:33:21 host sshd[31785]: Invalid user elena from 43.131.30.155 port 59026
Jan  5 12:33:21 host sshd[31785]: input_userauth_request: invalid user elena [preauth]
Jan  5 12:33:21 host sshd[31785]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 12:33:21 host sshd[31785]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.131.30.155
Jan  5 12:33:23 host sshd[31785]: Failed password for invalid user elena from 43.131.30.155 port 59026 ssh2
Jan  5 12:33:23 host sshd[31785]: Received disconnect from 43.131.30.155 port 59026:11: Bye Bye [preauth]
Jan  5 12:33:23 host sshd[31785]: Disconnected from 43.131.30.155 port 59026 [preauth]
Jan  5 12:35:54 host sshd[32156]: Invalid user sistemas from 8.222.128.121 port 50952
Jan  5 12:35:54 host sshd[32156]: input_userauth_request: invalid user sistemas [preauth]
Jan  5 12:35:54 host sshd[32156]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 12:35:54 host sshd[32156]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=8.222.128.121
Jan  5 12:35:55 host sshd[32156]: Failed password for invalid user sistemas from 8.222.128.121 port 50952 ssh2
Jan  5 12:35:56 host sshd[32156]: Received disconnect from 8.222.128.121 port 50952:11: Bye Bye [preauth]
Jan  5 12:35:56 host sshd[32156]: Disconnected from 8.222.128.121 port 50952 [preauth]
Jan  5 12:38:20 host sshd[32430]: User root from 124.222.38.102 not allowed because not listed in AllowUsers
Jan  5 12:38:20 host sshd[32430]: input_userauth_request: invalid user root [preauth]
Jan  5 12:38:21 host unix_chkpwd[32437]: password check failed for user (root)
Jan  5 12:38:21 host sshd[32430]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.222.38.102  user=root
Jan  5 12:38:21 host sshd[32430]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 12:38:23 host sshd[32430]: Failed password for invalid user root from 124.222.38.102 port 47152 ssh2
Jan  5 12:38:24 host sshd[32430]: Connection closed by 124.222.38.102 port 47152 [preauth]
Jan  5 12:38:27 host sshd[32442]: Invalid user albert from 107.189.30.59 port 55048
Jan  5 12:38:27 host sshd[32442]: input_userauth_request: invalid user albert [preauth]
Jan  5 12:38:27 host sshd[32442]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 12:38:27 host sshd[32442]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59
Jan  5 12:38:30 host sshd[32442]: Failed password for invalid user albert from 107.189.30.59 port 55048 ssh2
Jan  5 12:38:30 host sshd[32442]: Connection closed by 107.189.30.59 port 55048 [preauth]
Jan  5 12:56:49 host sshd[2702]: Invalid user es from 92.46.108.20 port 45652
Jan  5 12:56:49 host sshd[2702]: input_userauth_request: invalid user es [preauth]
Jan  5 12:56:50 host sshd[2702]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 12:56:50 host sshd[2702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20
Jan  5 12:56:52 host sshd[2702]: Failed password for invalid user es from 92.46.108.20 port 45652 ssh2
Jan  5 12:56:53 host sshd[2702]: Connection closed by 92.46.108.20 port 45652 [preauth]
Jan  5 12:58:12 host sshd[2863]: Invalid user user from 94.41.0.165 port 51134
Jan  5 12:58:12 host sshd[2863]: input_userauth_request: invalid user user [preauth]
Jan  5 12:58:12 host sshd[2863]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 12:58:12 host sshd[2863]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.41.0.165
Jan  5 12:58:15 host sshd[2863]: Failed password for invalid user user from 94.41.0.165 port 51134 ssh2
Jan  5 12:58:28 host sshd[2906]: Invalid user roberto from 167.99.213.35 port 57364
Jan  5 12:58:28 host sshd[2906]: input_userauth_request: invalid user roberto [preauth]
Jan  5 12:58:28 host sshd[2906]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 12:58:28 host sshd[2906]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.213.35
Jan  5 12:58:29 host sshd[2906]: Failed password for invalid user roberto from 167.99.213.35 port 57364 ssh2
Jan  5 12:58:30 host sshd[2906]: Received disconnect from 167.99.213.35 port 57364:11: Bye Bye [preauth]
Jan  5 12:58:30 host sshd[2906]: Disconnected from 167.99.213.35 port 57364 [preauth]
Jan  5 13:01:44 host sshd[3465]: Invalid user ubuntu from 167.99.213.35 port 53946
Jan  5 13:01:44 host sshd[3465]: input_userauth_request: invalid user ubuntu [preauth]
Jan  5 13:01:44 host sshd[3465]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 13:01:44 host sshd[3465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.213.35
Jan  5 13:01:46 host sshd[3465]: Failed password for invalid user ubuntu from 167.99.213.35 port 53946 ssh2
Jan  5 13:01:46 host sshd[3465]: Received disconnect from 167.99.213.35 port 53946:11: Bye Bye [preauth]
Jan  5 13:01:46 host sshd[3465]: Disconnected from 167.99.213.35 port 53946 [preauth]
Jan  5 13:03:06 host sshd[3610]: User root from 167.99.213.35 not allowed because not listed in AllowUsers
Jan  5 13:03:06 host sshd[3610]: input_userauth_request: invalid user root [preauth]
Jan  5 13:03:06 host unix_chkpwd[3613]: password check failed for user (root)
Jan  5 13:03:06 host sshd[3610]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.213.35  user=root
Jan  5 13:03:06 host sshd[3610]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 13:03:08 host sshd[3610]: Failed password for invalid user root from 167.99.213.35 port 43426 ssh2
Jan  5 13:04:23 host sshd[3770]: Did not receive identification string from 107.148.0.124 port 48976
Jan  5 13:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  5 13:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 13:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 13:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  5 13:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 13:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 13:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  5 13:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 13:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 13:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  5 13:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 13:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 13:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  5 13:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 13:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 13:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  5 13:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 13:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 13:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  5 13:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 13:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 13:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  5 13:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 13:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 13:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  5 13:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 13:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 13:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  5 13:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 13:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 13:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  5 13:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 13:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 13:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  5 13:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 13:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 13:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  5 13:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 13:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 13:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkaretakers user-2=cochintaxi user-3=laundryboniface user-4=a2zgroup user-5=dartsimp user-6=wwwpmcresource user-7=ugotscom user-8=wwwresourcehunte user-9=keralaholi user-10=wwwrmswll user-11=travelboniface user-12=woodpeck user-13=wwwkapin user-14=disposeat user-15=wwwkmaorg user-16=remysagr user-17=pmcresources user-18=shalinijames user-19=wwwtestugo user-20=vfmassets user-21=wwwletsstalkfood user-22=straightcurve user-23=wwwevmhonda user-24=bonifacegroup user-25=mrsclean user-26=wwwnexidigital user-27=kottayamcalldriv user-28=phmetals user-29=palco123 user-30=gifterman feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  5 13:21:53 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  5 13:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 13:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 13:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  5 13:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 13:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 13:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ChEZ6faPEWpNTiZK.~
Jan  5 13:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 13:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 13:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ChEZ6faPEWpNTiZK.~'
Jan  5 13:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 13:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 13:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ChEZ6faPEWpNTiZK.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  5 13:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 13:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 13:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  5 13:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 13:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 13:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  5 13:21:54 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 13:21:54 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 13:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  5 13:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 13:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 13:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  5 13:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 13:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 13:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  5 13:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 13:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 13:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  5 13:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 13:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 13:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  5 13:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 13:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 13:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  5 13:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  5 13:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  5 13:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  5 13:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  5 13:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  5 13:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  5 13:21:59 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  5 13:22:00 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  5 13:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  5 13:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 13:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 13:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  5 13:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 13:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 13:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  5 13:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 13:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 13:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  5 13:22:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 13:22:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 13:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  5 13:22:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 13:22:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 13:38:09 host sshd[8502]: Invalid user ubnt from 206.253.93.53 port 46154
Jan  5 13:38:09 host sshd[8502]: input_userauth_request: invalid user ubnt [preauth]
Jan  5 13:38:09 host sshd[8502]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 13:38:09 host sshd[8502]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.253.93.53
Jan  5 13:38:11 host sshd[8502]: Failed password for invalid user ubnt from 206.253.93.53 port 46154 ssh2
Jan  5 13:38:11 host sshd[8502]: Connection closed by 206.253.93.53 port 46154 [preauth]
Jan  5 13:57:43 host sshd[11514]: User root from 111.225.204.158 not allowed because not listed in AllowUsers
Jan  5 13:57:43 host sshd[11514]: input_userauth_request: invalid user root [preauth]
Jan  5 13:57:44 host sshd[11514]: Failed none for invalid user root from 111.225.204.158 port 55350 ssh2
Jan  5 13:57:45 host sshd[11514]: Connection closed by 111.225.204.158 port 55350 [preauth]
Jan  5 13:59:48 host sshd[11774]: Invalid user ad from 194.110.203.109 port 48404
Jan  5 13:59:48 host sshd[11774]: input_userauth_request: invalid user ad [preauth]
Jan  5 13:59:48 host sshd[11774]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 13:59:48 host sshd[11774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109
Jan  5 13:59:50 host sshd[11774]: Failed password for invalid user ad from 194.110.203.109 port 48404 ssh2
Jan  5 13:59:53 host sshd[11774]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 13:59:55 host sshd[11774]: Failed password for invalid user ad from 194.110.203.109 port 48404 ssh2
Jan  5 13:59:59 host sshd[11774]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 14:00:01 host sshd[11774]: Failed password for invalid user ad from 194.110.203.109 port 48404 ssh2
Jan  5 14:00:04 host sshd[11774]: Connection closed by 194.110.203.109 port 48404 [preauth]
Jan  5 14:00:04 host sshd[11774]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109
Jan  5 14:16:11 host sshd[14299]: Invalid user admin from 46.66.165.252 port 52873
Jan  5 14:16:11 host sshd[14299]: input_userauth_request: invalid user admin [preauth]
Jan  5 14:16:12 host sshd[14299]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 14:16:12 host sshd[14299]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.66.165.252
Jan  5 14:16:14 host sshd[14299]: Failed password for invalid user admin from 46.66.165.252 port 52873 ssh2
Jan  5 14:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  5 14:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 14:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 14:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  5 14:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 14:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 14:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  5 14:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 14:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 14:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  5 14:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 14:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 14:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  5 14:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 14:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 14:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  5 14:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 14:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 14:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  5 14:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 14:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 14:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  5 14:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 14:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 14:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  5 14:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 14:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 14:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  5 14:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 14:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 14:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  5 14:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 14:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 14:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  5 14:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 14:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 14:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  5 14:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 14:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 14:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=laundryboniface user-2=a2zgroup user-3=dartsimp user-4=wwwkaretakers user-5=cochintaxi user-6=ugotscom user-7=wwwresourcehunte user-8=keralaholi user-9=wwwrmswll user-10=travelboniface user-11=wwwpmcresource user-12=pmcresources user-13=shalinijames user-14=wwwtestugo user-15=vfmassets user-16=wwwkapin user-17=woodpeck user-18=disposeat user-19=wwwkmaorg user-20=remysagr user-21=mrsclean user-22=wwwnexidigital user-23=kottayamcalldriv user-24=phmetals user-25=palco123 user-26=gifterman user-27=straightcurve user-28=wwwletsstalkfood user-29=wwwevmhonda user-30=bonifacegroup feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  5 14:21:53 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  5 14:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 14:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 14:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  5 14:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 14:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 14:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-L8b3yzswo1YKCtXO.~
Jan  5 14:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 14:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 14:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-L8b3yzswo1YKCtXO.~'
Jan  5 14:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 14:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 14:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-L8b3yzswo1YKCtXO.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  5 14:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 14:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 14:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  5 14:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 14:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 14:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  5 14:21:54 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 14:21:54 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 14:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  5 14:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 14:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 14:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  5 14:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 14:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 14:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  5 14:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 14:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 14:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  5 14:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 14:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 14:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  5 14:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 14:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 14:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  5 14:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  5 14:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  5 14:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  5 14:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  5 14:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  5 14:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  5 14:21:59 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  5 14:22:01 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  5 14:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  5 14:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 14:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 14:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  5 14:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 14:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 14:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  5 14:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 14:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 14:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  5 14:22:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 14:22:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 14:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  5 14:22:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 14:22:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 14:23:58 host sshd[15388]: Invalid user nexidigital from 5.14.46.159 port 53408
Jan  5 14:23:58 host sshd[15388]: input_userauth_request: invalid user nexidigital [preauth]
Jan  5 14:23:59 host sshd[15388]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 14:23:59 host sshd[15388]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.14.46.159
Jan  5 14:24:01 host sshd[15388]: Failed password for invalid user nexidigital from 5.14.46.159 port 53408 ssh2
Jan  5 14:24:01 host sshd[15388]: Connection closed by 5.14.46.159 port 53408 [preauth]
Jan  5 14:26:27 host sshd[15791]: Invalid user admin from 59.26.145.206 port 44651
Jan  5 14:26:27 host sshd[15791]: input_userauth_request: invalid user admin [preauth]
Jan  5 14:26:27 host sshd[15791]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 14:26:27 host sshd[15791]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.26.145.206
Jan  5 14:26:29 host sshd[15791]: Failed password for invalid user admin from 59.26.145.206 port 44651 ssh2
Jan  5 14:26:29 host sshd[15791]: Connection closed by 59.26.145.206 port 44651 [preauth]
Jan  5 14:43:10 host sshd[18125]: Invalid user ftpuser2 from 93.43.56.134 port 56918
Jan  5 14:43:10 host sshd[18125]: input_userauth_request: invalid user ftpuser2 [preauth]
Jan  5 14:43:10 host sshd[18125]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 14:43:10 host sshd[18125]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.43.56.134
Jan  5 14:43:13 host sshd[18125]: Failed password for invalid user ftpuser2 from 93.43.56.134 port 56918 ssh2
Jan  5 14:43:13 host sshd[18125]: Received disconnect from 93.43.56.134 port 56918:11: Bye Bye [preauth]
Jan  5 14:43:13 host sshd[18125]: Disconnected from 93.43.56.134 port 56918 [preauth]
Jan  5 14:48:02 host sshd[18806]: User root from 190.160.149.241 not allowed because not listed in AllowUsers
Jan  5 14:48:02 host sshd[18806]: input_userauth_request: invalid user root [preauth]
Jan  5 14:48:02 host unix_chkpwd[18820]: password check failed for user (root)
Jan  5 14:48:02 host sshd[18806]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.160.149.241  user=root
Jan  5 14:48:02 host sshd[18806]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 14:48:04 host sshd[18806]: Failed password for invalid user root from 190.160.149.241 port 33887 ssh2
Jan  5 14:48:04 host sshd[18806]: Received disconnect from 190.160.149.241 port 33887:11: Bye Bye [preauth]
Jan  5 14:48:04 host sshd[18806]: Disconnected from 190.160.149.241 port 33887 [preauth]
Jan  5 14:48:30 host sshd[18878]: Did not receive identification string from 139.99.30.169 port 60260
Jan  5 14:48:57 host sshd[18917]: User root from 93.43.56.134 not allowed because not listed in AllowUsers
Jan  5 14:48:57 host sshd[18917]: input_userauth_request: invalid user root [preauth]
Jan  5 14:48:57 host unix_chkpwd[18924]: password check failed for user (root)
Jan  5 14:48:57 host sshd[18917]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.43.56.134  user=root
Jan  5 14:48:57 host sshd[18917]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 14:48:59 host sshd[18917]: Failed password for invalid user root from 93.43.56.134 port 42366 ssh2
Jan  5 14:49:00 host sshd[18917]: Received disconnect from 93.43.56.134 port 42366:11: Bye Bye [preauth]
Jan  5 14:49:00 host sshd[18917]: Disconnected from 93.43.56.134 port 42366 [preauth]
Jan  5 14:49:37 host sshd[19038]: Invalid user saurabh from 190.160.149.241 port 48155
Jan  5 14:49:37 host sshd[19038]: input_userauth_request: invalid user saurabh [preauth]
Jan  5 14:49:37 host sshd[19038]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 14:49:37 host sshd[19038]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.160.149.241
Jan  5 14:49:39 host sshd[19038]: Failed password for invalid user saurabh from 190.160.149.241 port 48155 ssh2
Jan  5 14:49:39 host sshd[19038]: Received disconnect from 190.160.149.241 port 48155:11: Bye Bye [preauth]
Jan  5 14:49:39 host sshd[19038]: Disconnected from 190.160.149.241 port 48155 [preauth]
Jan  5 14:56:57 host sshd[20166]: Invalid user 1234 from 138.84.15.1 port 34951
Jan  5 14:56:57 host sshd[20166]: input_userauth_request: invalid user 1234 [preauth]
Jan  5 14:56:57 host sshd[20166]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 14:56:57 host sshd[20166]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.84.15.1
Jan  5 14:56:59 host sshd[20166]: Failed password for invalid user 1234 from 138.84.15.1 port 34951 ssh2
Jan  5 14:57:00 host sshd[20166]: Connection closed by 138.84.15.1 port 34951 [preauth]
Jan  5 15:10:08 host sshd[21822]: User root from 104.131.55.236 not allowed because not listed in AllowUsers
Jan  5 15:10:08 host sshd[21822]: input_userauth_request: invalid user root [preauth]
Jan  5 15:10:08 host unix_chkpwd[21825]: password check failed for user (root)
Jan  5 15:10:08 host sshd[21822]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.55.236  user=root
Jan  5 15:10:08 host sshd[21822]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 15:10:10 host sshd[21822]: Failed password for invalid user root from 104.131.55.236 port 41551 ssh2
Jan  5 15:10:10 host sshd[21822]: Received disconnect from 104.131.55.236 port 41551:11: Bye Bye [preauth]
Jan  5 15:10:10 host sshd[21822]: Disconnected from 104.131.55.236 port 41551 [preauth]
Jan  5 15:10:40 host sshd[21895]: User root from 134.122.25.146 not allowed because not listed in AllowUsers
Jan  5 15:10:40 host sshd[21895]: input_userauth_request: invalid user root [preauth]
Jan  5 15:10:40 host unix_chkpwd[21898]: password check failed for user (root)
Jan  5 15:10:40 host sshd[21895]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.25.146  user=root
Jan  5 15:10:40 host sshd[21895]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 15:10:42 host sshd[21895]: Failed password for invalid user root from 134.122.25.146 port 36552 ssh2
Jan  5 15:10:42 host sshd[21895]: Received disconnect from 134.122.25.146 port 36552:11: Bye Bye [preauth]
Jan  5 15:10:42 host sshd[21895]: Disconnected from 134.122.25.146 port 36552 [preauth]
Jan  5 15:11:00 host sshd[21923]: Invalid user Joshua from 157.230.178.127 port 35440
Jan  5 15:11:00 host sshd[21923]: input_userauth_request: invalid user Joshua [preauth]
Jan  5 15:11:00 host sshd[21923]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 15:11:00 host sshd[21923]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.178.127
Jan  5 15:11:00 host sshd[21925]: Invalid user mq from 178.62.2.24 port 50634
Jan  5 15:11:00 host sshd[21925]: input_userauth_request: invalid user mq [preauth]
Jan  5 15:11:00 host sshd[21925]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 15:11:00 host sshd[21925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.2.24
Jan  5 15:11:02 host sshd[21923]: Failed password for invalid user Joshua from 157.230.178.127 port 35440 ssh2
Jan  5 15:11:03 host sshd[21925]: Failed password for invalid user mq from 178.62.2.24 port 50634 ssh2
Jan  5 15:11:03 host sshd[21923]: Received disconnect from 157.230.178.127 port 35440:11: Bye Bye [preauth]
Jan  5 15:11:03 host sshd[21923]: Disconnected from 157.230.178.127 port 35440 [preauth]
Jan  5 15:11:03 host sshd[21925]: Received disconnect from 178.62.2.24 port 50634:11: Bye Bye [preauth]
Jan  5 15:11:03 host sshd[21925]: Disconnected from 178.62.2.24 port 50634 [preauth]
Jan  5 15:11:25 host sshd[22031]: Connection reset by 78.94.232.255 port 58164 [preauth]
Jan  5 15:14:06 host sshd[22377]: User root from 104.131.55.236 not allowed because not listed in AllowUsers
Jan  5 15:14:06 host sshd[22377]: input_userauth_request: invalid user root [preauth]
Jan  5 15:14:06 host unix_chkpwd[22382]: password check failed for user (root)
Jan  5 15:14:06 host sshd[22377]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.55.236  user=root
Jan  5 15:14:06 host sshd[22377]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 15:14:08 host sshd[22377]: Failed password for invalid user root from 104.131.55.236 port 36745 ssh2
Jan  5 15:14:08 host sshd[22377]: Received disconnect from 104.131.55.236 port 36745:11: Bye Bye [preauth]
Jan  5 15:14:08 host sshd[22377]: Disconnected from 104.131.55.236 port 36745 [preauth]
Jan  5 15:14:28 host sshd[22461]: Invalid user gerrit from 157.230.178.127 port 46454
Jan  5 15:14:28 host sshd[22461]: input_userauth_request: invalid user gerrit [preauth]
Jan  5 15:14:28 host sshd[22461]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 15:14:28 host sshd[22461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.178.127
Jan  5 15:14:29 host sshd[22461]: Failed password for invalid user gerrit from 157.230.178.127 port 46454 ssh2
Jan  5 15:14:30 host sshd[22461]: Received disconnect from 157.230.178.127 port 46454:11: Bye Bye [preauth]
Jan  5 15:14:30 host sshd[22461]: Disconnected from 157.230.178.127 port 46454 [preauth]
Jan  5 15:14:34 host sshd[22470]: Invalid user nagios from 178.62.2.24 port 33964
Jan  5 15:14:34 host sshd[22470]: input_userauth_request: invalid user nagios [preauth]
Jan  5 15:14:34 host sshd[22470]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 15:14:34 host sshd[22470]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.2.24
Jan  5 15:14:36 host sshd[22473]: Invalid user richard from 134.122.25.146 port 50762
Jan  5 15:14:36 host sshd[22473]: input_userauth_request: invalid user richard [preauth]
Jan  5 15:14:36 host sshd[22473]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 15:14:36 host sshd[22473]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.25.146
Jan  5 15:14:36 host sshd[22470]: Failed password for invalid user nagios from 178.62.2.24 port 33964 ssh2
Jan  5 15:14:36 host sshd[22470]: Received disconnect from 178.62.2.24 port 33964:11: Bye Bye [preauth]
Jan  5 15:14:36 host sshd[22470]: Disconnected from 178.62.2.24 port 33964 [preauth]
Jan  5 15:14:38 host sshd[22473]: Failed password for invalid user richard from 134.122.25.146 port 50762 ssh2
Jan  5 15:14:38 host sshd[22473]: Received disconnect from 134.122.25.146 port 50762:11: Bye Bye [preauth]
Jan  5 15:14:38 host sshd[22473]: Disconnected from 134.122.25.146 port 50762 [preauth]
Jan  5 15:15:30 host sshd[22620]: User root from 157.230.178.127 not allowed because not listed in AllowUsers
Jan  5 15:15:30 host sshd[22620]: input_userauth_request: invalid user root [preauth]
Jan  5 15:15:30 host unix_chkpwd[22623]: password check failed for user (root)
Jan  5 15:15:30 host sshd[22620]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.178.127  user=root
Jan  5 15:15:30 host sshd[22620]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 15:15:32 host sshd[22620]: Failed password for invalid user root from 157.230.178.127 port 41500 ssh2
Jan  5 15:15:36 host sshd[22659]: User root from 178.62.2.24 not allowed because not listed in AllowUsers
Jan  5 15:15:36 host sshd[22659]: input_userauth_request: invalid user root [preauth]
Jan  5 15:15:36 host unix_chkpwd[22674]: password check failed for user (root)
Jan  5 15:15:36 host sshd[22659]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.2.24  user=root
Jan  5 15:15:36 host sshd[22659]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 15:15:38 host sshd[22659]: Failed password for invalid user root from 178.62.2.24 port 57118 ssh2
Jan  5 15:15:38 host sshd[22659]: Received disconnect from 178.62.2.24 port 57118:11: Bye Bye [preauth]
Jan  5 15:15:38 host sshd[22659]: Disconnected from 178.62.2.24 port 57118 [preauth]
Jan  5 15:17:10 host sshd[22980]: Invalid user admin from 186.239.155.106 port 59664
Jan  5 15:17:10 host sshd[22980]: input_userauth_request: invalid user admin [preauth]
Jan  5 15:17:10 host sshd[22980]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 15:17:10 host sshd[22980]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.239.155.106
Jan  5 15:17:13 host sshd[22980]: Failed password for invalid user admin from 186.239.155.106 port 59664 ssh2
Jan  5 15:17:14 host sshd[22980]: Connection closed by 186.239.155.106 port 59664 [preauth]
Jan  5 15:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  5 15:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 15:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 15:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  5 15:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 15:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 15:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  5 15:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 15:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 15:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  5 15:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 15:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 15:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  5 15:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 15:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 15:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  5 15:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 15:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 15:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  5 15:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 15:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 15:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  5 15:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 15:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 15:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  5 15:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 15:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 15:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  5 15:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 15:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 15:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  5 15:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 15:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 15:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  5 15:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 15:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 15:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  5 15:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 15:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 15:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=wwwrmswll user-3=keralaholi user-4=wwwresourcehunte user-5=ugotscom user-6=travelboniface user-7=wwwkaretakers user-8=cochintaxi user-9=laundryboniface user-10=dartsimp user-11=a2zgroup user-12=wwwletsstalkfood user-13=straightcurve user-14=bonifacegroup user-15=wwwevmhonda user-16=mrsclean user-17=wwwnexidigital user-18=gifterman user-19=palco123 user-20=phmetals user-21=kottayamcalldriv user-22=woodpeck user-23=wwwkapin user-24=remysagr user-25=disposeat user-26=wwwkmaorg user-27=pmcresources user-28=vfmassets user-29=wwwtestugo user-30=shalinijames feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  5 15:21:54 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  5 15:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 15:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 15:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  5 15:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 15:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 15:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-IbVNeyj9xXllBbjQ.~
Jan  5 15:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 15:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 15:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-IbVNeyj9xXllBbjQ.~'
Jan  5 15:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 15:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 15:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-IbVNeyj9xXllBbjQ.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  5 15:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 15:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 15:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  5 15:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 15:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 15:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  5 15:21:57 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 15:21:57 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 15:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  5 15:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 15:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 15:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  5 15:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 15:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 15:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  5 15:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 15:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 15:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  5 15:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 15:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 15:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  5 15:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 15:21:59 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 15:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  5 15:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  5 15:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  5 15:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  5 15:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  5 15:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  5 15:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  5 15:22:02 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  5 15:22:04 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  5 15:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  5 15:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 15:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 15:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  5 15:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 15:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 15:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  5 15:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 15:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 15:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  5 15:22:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 15:22:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 15:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  5 15:22:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 15:22:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 15:35:57 host sshd[25920]: Connection closed by 92.246.84.108 port 36202 [preauth]
Jan  5 15:37:16 host sshd[26062]: Invalid user user from 177.85.254.2 port 48402
Jan  5 15:37:16 host sshd[26062]: input_userauth_request: invalid user user [preauth]
Jan  5 15:37:16 host sshd[26062]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 15:37:16 host sshd[26062]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.85.254.2
Jan  5 15:37:18 host sshd[26062]: Failed password for invalid user user from 177.85.254.2 port 48402 ssh2
Jan  5 15:37:19 host sshd[26062]: Connection closed by 177.85.254.2 port 48402 [preauth]
Jan  5 15:39:06 host sshd[26296]: Did not receive identification string from 171.236.38.59 port 43214
Jan  5 15:41:20 host sshd[26626]: Connection closed by 192.241.202.29 port 41986 [preauth]
Jan  5 15:57:01 host sshd[28636]: Invalid user admin from 123.21.51.234 port 59791
Jan  5 15:57:01 host sshd[28636]: input_userauth_request: invalid user admin [preauth]
Jan  5 15:57:02 host sshd[28636]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 15:57:02 host sshd[28636]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.21.51.234
Jan  5 15:57:04 host sshd[28636]: Failed password for invalid user admin from 123.21.51.234 port 59791 ssh2
Jan  5 15:57:06 host sshd[28636]: Connection closed by 123.21.51.234 port 59791 [preauth]
Jan  5 16:02:13 host sshd[29427]: Invalid user 0aduserPgND2xfL2xEVobFLPr__wasadmin from 194.110.203.109 port 42616
Jan  5 16:02:13 host sshd[29427]: input_userauth_request: invalid user 0aduserPgND2xfL2xEVobFLPr__wasadmin [preauth]
Jan  5 16:02:13 host sshd[29427]: Failed none for invalid user 0aduserPgND2xfL2xEVobFLPr__wasadmin from 194.110.203.109 port 42616 ssh2
Jan  5 16:02:17 host sshd[29427]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 16:02:17 host sshd[29427]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109
Jan  5 16:02:19 host sshd[29427]: Failed password for invalid user 0aduserPgND2xfL2xEVobFLPr__wasadmin from 194.110.203.109 port 42616 ssh2
Jan  5 16:02:22 host sshd[29427]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 16:02:24 host sshd[29427]: Failed password for invalid user 0aduserPgND2xfL2xEVobFLPr__wasadmin from 194.110.203.109 port 42616 ssh2
Jan  5 16:02:28 host sshd[29427]: Connection closed by 194.110.203.109 port 42616 [preauth]
Jan  5 16:02:28 host sshd[29427]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109
Jan  5 16:06:40 host sshd[29986]: User root from 49.88.112.65 not allowed because not listed in AllowUsers
Jan  5 16:06:40 host sshd[29986]: input_userauth_request: invalid user root [preauth]
Jan  5 16:06:40 host unix_chkpwd[30002]: password check failed for user (root)
Jan  5 16:06:40 host sshd[29986]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.65  user=root
Jan  5 16:06:40 host sshd[29986]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 16:06:42 host sshd[29986]: Failed password for invalid user root from 49.88.112.65 port 58531 ssh2
Jan  5 16:06:42 host unix_chkpwd[30004]: password check failed for user (root)
Jan  5 16:06:42 host sshd[29986]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 16:06:44 host sshd[29986]: Failed password for invalid user root from 49.88.112.65 port 58531 ssh2
Jan  5 16:06:45 host unix_chkpwd[30007]: password check failed for user (root)
Jan  5 16:06:45 host sshd[29986]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 16:06:47 host sshd[29986]: Failed password for invalid user root from 49.88.112.65 port 58531 ssh2
Jan  5 16:06:47 host sshd[29986]: Received disconnect from 49.88.112.65 port 58531:11:  [preauth]
Jan  5 16:06:47 host sshd[29986]: Disconnected from 49.88.112.65 port 58531 [preauth]
Jan  5 16:06:47 host sshd[29986]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.65  user=root
Jan  5 16:16:28 host sshd[31320]: Invalid user guest from 158.140.240.181 port 41382
Jan  5 16:16:28 host sshd[31320]: input_userauth_request: invalid user guest [preauth]
Jan  5 16:16:28 host sshd[31320]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 16:16:28 host sshd[31320]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.140.240.181
Jan  5 16:16:30 host sshd[31320]: Failed password for invalid user guest from 158.140.240.181 port 41382 ssh2
Jan  5 16:16:31 host sshd[31320]: Connection closed by 158.140.240.181 port 41382 [preauth]
Jan  5 16:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  5 16:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 16:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 16:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  5 16:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 16:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 16:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  5 16:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 16:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 16:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  5 16:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 16:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 16:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  5 16:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 16:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 16:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  5 16:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 16:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 16:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  5 16:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 16:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 16:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  5 16:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 16:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 16:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  5 16:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 16:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 16:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  5 16:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 16:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 16:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  5 16:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 16:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 16:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  5 16:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 16:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 16:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  5 16:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 16:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 16:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=vfmassets user-2=wwwtestugo user-3=shalinijames user-4=pmcresources user-5=remysagr user-6=disposeat user-7=wwwkmaorg user-8=woodpeck user-9=wwwkapin user-10=gifterman user-11=palco123 user-12=phmetals user-13=kottayamcalldriv user-14=wwwnexidigital user-15=mrsclean user-16=bonifacegroup user-17=wwwevmhonda user-18=straightcurve user-19=wwwletsstalkfood user-20=dartsimp user-21=a2zgroup user-22=laundryboniface user-23=cochintaxi user-24=wwwkaretakers user-25=travelboniface user-26=wwwrmswll user-27=keralaholi user-28=wwwresourcehunte user-29=ugotscom user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  5 16:21:53 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  5 16:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 16:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 16:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  5 16:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 16:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 16:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-8LzEYbTM4z0nQEJl.~
Jan  5 16:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 16:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 16:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-8LzEYbTM4z0nQEJl.~'
Jan  5 16:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 16:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 16:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-8LzEYbTM4z0nQEJl.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  5 16:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 16:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 16:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  5 16:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 16:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 16:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  5 16:21:54 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 16:21:54 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 16:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  5 16:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 16:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 16:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  5 16:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 16:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 16:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  5 16:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 16:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 16:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  5 16:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 16:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 16:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  5 16:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 16:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 16:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  5 16:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  5 16:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  5 16:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  5 16:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  5 16:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  5 16:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  5 16:21:58 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  5 16:22:03 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  5 16:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  5 16:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 16:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 16:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  5 16:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 16:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 16:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  5 16:22:08 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 16:22:13 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 16:22:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  5 16:22:13 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 16:22:14 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 16:22:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  5 16:22:14 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 16:22:18 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 16:36:15 host sshd[1754]: Invalid user squid from 38.44.69.149 port 45732
Jan  5 16:36:15 host sshd[1754]: input_userauth_request: invalid user squid [preauth]
Jan  5 16:36:15 host sshd[1754]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 16:36:15 host sshd[1754]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=38.44.69.149
Jan  5 16:36:17 host sshd[1754]: Failed password for invalid user squid from 38.44.69.149 port 45732 ssh2
Jan  5 16:36:18 host sshd[1754]: Connection closed by 38.44.69.149 port 45732 [preauth]
Jan  5 16:51:59 host sshd[3794]: Invalid user 0aduserPgND2xfL2xEVobFLPr__wasadmin from 176.111.173.164 port 36706
Jan  5 16:51:59 host sshd[3794]: input_userauth_request: invalid user 0aduserPgND2xfL2xEVobFLPr__wasadmin [preauth]
Jan  5 16:51:59 host sshd[3794]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 16:51:59 host sshd[3794]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.111.173.164
Jan  5 16:52:01 host sshd[3794]: Failed password for invalid user 0aduserPgND2xfL2xEVobFLPr__wasadmin from 176.111.173.164 port 36706 ssh2
Jan  5 16:52:04 host sshd[3794]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 16:52:06 host sshd[3794]: Failed password for invalid user 0aduserPgND2xfL2xEVobFLPr__wasadmin from 176.111.173.164 port 36706 ssh2
Jan  5 16:52:10 host sshd[3794]: Failed password for invalid user 0aduserPgND2xfL2xEVobFLPr__wasadmin from 176.111.173.164 port 36706 ssh2
Jan  5 16:52:13 host sshd[3794]: Connection closed by 176.111.173.164 port 36706 [preauth]
Jan  5 16:52:13 host sshd[3794]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.111.173.164
Jan  5 16:56:02 host sshd[4346]: User root from 192.141.104.62 not allowed because not listed in AllowUsers
Jan  5 16:56:02 host sshd[4346]: input_userauth_request: invalid user root [preauth]
Jan  5 16:56:03 host unix_chkpwd[4362]: password check failed for user (root)
Jan  5 16:56:03 host sshd[4346]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.141.104.62  user=root
Jan  5 16:56:03 host sshd[4346]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 16:56:05 host sshd[4346]: Failed password for invalid user root from 192.141.104.62 port 52670 ssh2
Jan  5 16:56:05 host sshd[4346]: Connection closed by 192.141.104.62 port 52670 [preauth]
Jan  5 16:58:57 host sshd[4683]: Did not receive identification string from 185.231.222.57 port 51563
Jan  5 17:14:31 host sshd[6903]: User ftp from 49.73.6.132 not allowed because not listed in AllowUsers
Jan  5 17:14:31 host sshd[6903]: input_userauth_request: invalid user ftp [preauth]
Jan  5 17:14:31 host unix_chkpwd[6908]: password check failed for user (ftp)
Jan  5 17:14:31 host sshd[6903]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.73.6.132  user=ftp
Jan  5 17:14:31 host sshd[6903]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp"
Jan  5 17:14:33 host sshd[6903]: Failed password for invalid user ftp from 49.73.6.132 port 45437 ssh2
Jan  5 17:14:34 host sshd[6903]: Connection closed by 49.73.6.132 port 45437 [preauth]
Jan  5 17:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  5 17:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 17:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 17:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  5 17:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 17:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 17:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  5 17:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 17:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 17:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  5 17:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 17:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 17:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  5 17:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 17:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 17:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  5 17:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 17:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 17:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  5 17:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 17:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 17:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  5 17:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 17:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 17:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  5 17:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 17:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 17:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  5 17:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 17:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 17:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  5 17:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 17:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 17:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  5 17:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 17:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 17:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  5 17:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 17:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 17:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=laundryboniface user-2=a2zgroup user-3=dartsimp user-4=wwwkaretakers user-5=cochintaxi user-6=keralaholi user-7=wwwresourcehunte user-8=wwwrmswll user-9=ugotscom user-10=travelboniface user-11=wwwpmcresource user-12=pmcresources user-13=vfmassets user-14=shalinijames user-15=wwwtestugo user-16=woodpeck user-17=wwwkapin user-18=disposeat user-19=remysagr user-20=wwwkmaorg user-21=mrsclean user-22=wwwnexidigital user-23=palco123 user-24=gifterman user-25=phmetals user-26=kottayamcalldriv user-27=straightcurve user-28=wwwletsstalkfood user-29=bonifacegroup user-30=wwwevmhonda feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  5 17:21:53 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  5 17:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 17:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 17:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  5 17:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 17:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 17:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-1JswYMUfPC8Htojh.~
Jan  5 17:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 17:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 17:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-1JswYMUfPC8Htojh.~'
Jan  5 17:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 17:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 17:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-1JswYMUfPC8Htojh.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  5 17:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 17:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 17:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  5 17:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 17:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 17:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  5 17:21:54 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 17:21:54 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 17:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  5 17:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 17:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 17:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  5 17:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 17:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 17:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  5 17:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 17:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 17:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  5 17:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 17:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 17:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  5 17:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 17:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 17:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  5 17:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  5 17:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  5 17:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  5 17:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  5 17:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  5 17:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  5 17:21:58 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  5 17:22:00 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  5 17:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  5 17:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 17:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 17:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  5 17:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 17:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 17:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  5 17:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 17:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 17:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  5 17:22:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 17:22:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 17:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  5 17:22:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 17:22:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 17:33:20 host sshd[9615]: Invalid user admin from 222.75.13.182 port 52966
Jan  5 17:33:20 host sshd[9615]: input_userauth_request: invalid user admin [preauth]
Jan  5 17:33:20 host sshd[9615]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 17:33:20 host sshd[9615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.75.13.182
Jan  5 17:33:22 host sshd[9615]: Failed password for invalid user admin from 222.75.13.182 port 52966 ssh2
Jan  5 17:33:22 host sshd[9615]: Connection closed by 222.75.13.182 port 52966 [preauth]
Jan  5 17:35:21 host sshd[9947]: User root from 200.97.195.140 not allowed because not listed in AllowUsers
Jan  5 17:35:21 host sshd[9947]: input_userauth_request: invalid user root [preauth]
Jan  5 17:35:21 host unix_chkpwd[9952]: password check failed for user (root)
Jan  5 17:35:21 host sshd[9947]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.97.195.140  user=root
Jan  5 17:35:21 host sshd[9947]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 17:35:23 host sshd[9947]: Failed password for invalid user root from 200.97.195.140 port 42162 ssh2
Jan  5 17:35:23 host sshd[9947]: Received disconnect from 200.97.195.140 port 42162:11: Bye Bye [preauth]
Jan  5 17:35:23 host sshd[9947]: Disconnected from 200.97.195.140 port 42162 [preauth]
Jan  5 17:41:17 host sshd[10748]: User root from 200.97.195.140 not allowed because not listed in AllowUsers
Jan  5 17:41:17 host sshd[10748]: input_userauth_request: invalid user root [preauth]
Jan  5 17:41:17 host unix_chkpwd[10752]: password check failed for user (root)
Jan  5 17:41:17 host sshd[10748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.97.195.140  user=root
Jan  5 17:41:17 host sshd[10748]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 17:41:19 host sshd[10748]: Failed password for invalid user root from 200.97.195.140 port 38318 ssh2
Jan  5 17:41:19 host sshd[10748]: Received disconnect from 200.97.195.140 port 38318:11: Bye Bye [preauth]
Jan  5 17:41:19 host sshd[10748]: Disconnected from 200.97.195.140 port 38318 [preauth]
Jan  5 17:45:04 host sshd[11290]: Invalid user jonathan from 107.189.30.59 port 41508
Jan  5 17:45:04 host sshd[11290]: input_userauth_request: invalid user jonathan [preauth]
Jan  5 17:45:04 host sshd[11290]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 17:45:04 host sshd[11290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59
Jan  5 17:45:06 host sshd[11290]: Failed password for invalid user jonathan from 107.189.30.59 port 41508 ssh2
Jan  5 17:45:06 host sshd[11290]: Connection closed by 107.189.30.59 port 41508 [preauth]
Jan  5 17:47:36 host sshd[11577]: Invalid user service from 194.169.175.102 port 50540
Jan  5 17:47:36 host sshd[11577]: input_userauth_request: invalid user service [preauth]
Jan  5 17:47:36 host sshd[11577]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 17:47:36 host sshd[11577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.169.175.102
Jan  5 17:47:38 host sshd[11577]: Failed password for invalid user service from 194.169.175.102 port 50540 ssh2
Jan  5 17:47:38 host sshd[11577]: Received disconnect from 194.169.175.102 port 50540:11: Client disconnecting normally [preauth]
Jan  5 17:47:38 host sshd[11577]: Disconnected from 194.169.175.102 port 50540 [preauth]
Jan  5 17:48:29 host sshd[11675]: Invalid user dani from 201.17.20.16 port 46056
Jan  5 17:48:29 host sshd[11675]: input_userauth_request: invalid user dani [preauth]
Jan  5 17:48:29 host sshd[11675]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 17:48:29 host sshd[11675]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.17.20.16
Jan  5 17:48:30 host sshd[11675]: Failed password for invalid user dani from 201.17.20.16 port 46056 ssh2
Jan  5 17:48:31 host sshd[11675]: Received disconnect from 201.17.20.16 port 46056:11: Bye Bye [preauth]
Jan  5 17:48:31 host sshd[11675]: Disconnected from 201.17.20.16 port 46056 [preauth]
Jan  5 17:49:59 host sshd[11917]: Invalid user aditya from 201.17.20.16 port 40924
Jan  5 17:49:59 host sshd[11917]: input_userauth_request: invalid user aditya [preauth]
Jan  5 17:49:59 host sshd[11917]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 17:49:59 host sshd[11917]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.17.20.16
Jan  5 17:50:01 host sshd[11917]: Failed password for invalid user aditya from 201.17.20.16 port 40924 ssh2
Jan  5 17:50:01 host sshd[11917]: Received disconnect from 201.17.20.16 port 40924:11: Bye Bye [preauth]
Jan  5 17:50:01 host sshd[11917]: Disconnected from 201.17.20.16 port 40924 [preauth]
Jan  5 17:51:24 host sshd[12073]: Invalid user smart from 201.17.20.16 port 35794
Jan  5 17:51:24 host sshd[12073]: input_userauth_request: invalid user smart [preauth]
Jan  5 17:51:24 host sshd[12073]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 17:51:24 host sshd[12073]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.17.20.16
Jan  5 17:51:27 host sshd[12073]: Failed password for invalid user smart from 201.17.20.16 port 35794 ssh2
Jan  5 17:51:49 host sshd[12168]: Invalid user admin from 111.235.254.73 port 37547
Jan  5 17:51:49 host sshd[12168]: input_userauth_request: invalid user admin [preauth]
Jan  5 17:51:50 host sshd[12168]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 17:51:50 host sshd[12168]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.235.254.73
Jan  5 17:51:52 host sshd[12168]: Failed password for invalid user admin from 111.235.254.73 port 37547 ssh2
Jan  5 17:51:53 host sshd[12168]: Connection closed by 111.235.254.73 port 37547 [preauth]
Jan  5 18:05:03 host sshd[13944]: Did not receive identification string from 58.72.18.130 port 14726
Jan  5 18:10:11 host sshd[14695]: Invalid user test from 101.100.165.23 port 55269
Jan  5 18:10:11 host sshd[14695]: input_userauth_request: invalid user test [preauth]
Jan  5 18:10:11 host sshd[14695]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 18:10:11 host sshd[14695]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.100.165.23
Jan  5 18:10:13 host sshd[14695]: Failed password for invalid user test from 101.100.165.23 port 55269 ssh2
Jan  5 18:10:14 host sshd[14695]: Connection closed by 101.100.165.23 port 55269 [preauth]
Jan  5 18:14:43 host sshd[15195]: Connection closed by 66.175.213.4 port 39064 [preauth]
Jan  5 18:14:45 host sshd[15199]: Connection closed by 66.175.213.4 port 39070 [preauth]
Jan  5 18:14:47 host sshd[15202]: Connection closed by 66.175.213.4 port 8790 [preauth]
Jan  5 18:16:44 host sshd[15556]: Invalid user sanjay from 51.38.38.239 port 42436
Jan  5 18:16:44 host sshd[15556]: input_userauth_request: invalid user sanjay [preauth]
Jan  5 18:16:44 host sshd[15556]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 18:16:44 host sshd[15556]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.38.239
Jan  5 18:16:46 host sshd[15556]: Failed password for invalid user sanjay from 51.38.38.239 port 42436 ssh2
Jan  5 18:16:46 host sshd[15556]: Received disconnect from 51.38.38.239 port 42436:11: Bye Bye [preauth]
Jan  5 18:16:46 host sshd[15556]: Disconnected from 51.38.38.239 port 42436 [preauth]
Jan  5 18:16:56 host sshd[15574]: Invalid user dst from 104.248.46.82 port 47348
Jan  5 18:16:56 host sshd[15574]: input_userauth_request: invalid user dst [preauth]
Jan  5 18:16:56 host sshd[15574]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 18:16:56 host sshd[15574]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.46.82
Jan  5 18:16:57 host sshd[15574]: Failed password for invalid user dst from 104.248.46.82 port 47348 ssh2
Jan  5 18:16:58 host sshd[15574]: Received disconnect from 104.248.46.82 port 47348:11: Bye Bye [preauth]
Jan  5 18:16:58 host sshd[15574]: Disconnected from 104.248.46.82 port 47348 [preauth]
Jan  5 18:17:04 host sshd[15603]: Invalid user erick from 161.35.0.70 port 42724
Jan  5 18:17:04 host sshd[15603]: input_userauth_request: invalid user erick [preauth]
Jan  5 18:17:04 host sshd[15603]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 18:17:04 host sshd[15603]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.0.70
Jan  5 18:17:06 host sshd[15603]: Failed password for invalid user erick from 161.35.0.70 port 42724 ssh2
Jan  5 18:17:06 host sshd[15603]: Received disconnect from 161.35.0.70 port 42724:11: Bye Bye [preauth]
Jan  5 18:17:06 host sshd[15603]: Disconnected from 161.35.0.70 port 42724 [preauth]
Jan  5 18:17:06 host sshd[15610]: User root from 139.59.25.164 not allowed because not listed in AllowUsers
Jan  5 18:17:06 host sshd[15610]: input_userauth_request: invalid user root [preauth]
Jan  5 18:17:06 host unix_chkpwd[15612]: password check failed for user (root)
Jan  5 18:17:06 host sshd[15610]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.25.164  user=root
Jan  5 18:17:06 host sshd[15610]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 18:17:08 host sshd[15610]: Failed password for invalid user root from 139.59.25.164 port 39506 ssh2
Jan  5 18:17:08 host sshd[15610]: Received disconnect from 139.59.25.164 port 39506:11: Bye Bye [preauth]
Jan  5 18:17:08 host sshd[15610]: Disconnected from 139.59.25.164 port 39506 [preauth]
Jan  5 18:17:30 host sshd[15662]: Invalid user sanjay from 104.248.252.80 port 42868
Jan  5 18:17:30 host sshd[15662]: input_userauth_request: invalid user sanjay [preauth]
Jan  5 18:17:30 host sshd[15662]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 18:17:30 host sshd[15662]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.252.80
Jan  5 18:17:32 host sshd[15662]: Failed password for invalid user sanjay from 104.248.252.80 port 42868 ssh2
Jan  5 18:17:32 host sshd[15662]: Received disconnect from 104.248.252.80 port 42868:11: Bye Bye [preauth]
Jan  5 18:17:32 host sshd[15662]: Disconnected from 104.248.252.80 port 42868 [preauth]
Jan  5 18:17:35 host sshd[15669]: User root from 69.140.116.168 not allowed because not listed in AllowUsers
Jan  5 18:17:35 host sshd[15669]: input_userauth_request: invalid user root [preauth]
Jan  5 18:17:36 host unix_chkpwd[15672]: password check failed for user (root)
Jan  5 18:17:36 host sshd[15669]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.140.116.168  user=root
Jan  5 18:17:36 host sshd[15669]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 18:17:38 host sshd[15669]: Failed password for invalid user root from 69.140.116.168 port 54336 ssh2
Jan  5 18:17:38 host sshd[15669]: Received disconnect from 69.140.116.168 port 54336:11: Bye Bye [preauth]
Jan  5 18:17:38 host sshd[15669]: Disconnected from 69.140.116.168 port 54336 [preauth]
Jan  5 18:17:42 host sshd[15683]: User centos from 93.125.114.51 not allowed because not listed in AllowUsers
Jan  5 18:17:42 host sshd[15683]: input_userauth_request: invalid user centos [preauth]
Jan  5 18:17:42 host unix_chkpwd[15686]: password check failed for user (centos)
Jan  5 18:17:42 host sshd[15683]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.125.114.51  user=centos
Jan  5 18:17:44 host sshd[15683]: Failed password for invalid user centos from 93.125.114.51 port 56422 ssh2
Jan  5 18:17:44 host sshd[15683]: Received disconnect from 93.125.114.51 port 56422:11: Bye Bye [preauth]
Jan  5 18:17:44 host sshd[15683]: Disconnected from 93.125.114.51 port 56422 [preauth]
Jan  5 18:17:45 host sshd[15688]: Invalid user user from 64.225.48.16 port 50918
Jan  5 18:17:45 host sshd[15688]: input_userauth_request: invalid user user [preauth]
Jan  5 18:17:45 host sshd[15688]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 18:17:45 host sshd[15688]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.225.48.16
Jan  5 18:17:47 host sshd[15688]: Failed password for invalid user user from 64.225.48.16 port 50918 ssh2
Jan  5 18:17:47 host sshd[15688]: Received disconnect from 64.225.48.16 port 50918:11: Bye Bye [preauth]
Jan  5 18:17:47 host sshd[15688]: Disconnected from 64.225.48.16 port 50918 [preauth]
Jan  5 18:18:10 host sshd[15729]: Invalid user web from 112.78.134.11 port 48135
Jan  5 18:18:10 host sshd[15729]: input_userauth_request: invalid user web [preauth]
Jan  5 18:18:10 host sshd[15729]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 18:18:10 host sshd[15729]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.78.134.11
Jan  5 18:18:12 host sshd[15729]: Failed password for invalid user web from 112.78.134.11 port 48135 ssh2
Jan  5 18:18:12 host sshd[15729]: Received disconnect from 112.78.134.11 port 48135:11: Bye Bye [preauth]
Jan  5 18:18:12 host sshd[15729]: Disconnected from 112.78.134.11 port 48135 [preauth]
Jan  5 18:19:08 host sshd[15835]: User root from 178.128.154.172 not allowed because not listed in AllowUsers
Jan  5 18:19:08 host sshd[15835]: input_userauth_request: invalid user root [preauth]
Jan  5 18:19:08 host unix_chkpwd[15838]: password check failed for user (root)
Jan  5 18:19:08 host sshd[15835]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.154.172  user=root
Jan  5 18:19:08 host sshd[15835]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 18:19:10 host sshd[15835]: Failed password for invalid user root from 178.128.154.172 port 42338 ssh2
Jan  5 18:19:11 host sshd[15835]: Received disconnect from 178.128.154.172 port 42338:11: Bye Bye [preauth]
Jan  5 18:19:11 host sshd[15835]: Disconnected from 178.128.154.172 port 42338 [preauth]
Jan  5 18:19:54 host sshd[15933]: Invalid user aaron from 143.198.8.62 port 45148
Jan  5 18:19:54 host sshd[15933]: input_userauth_request: invalid user aaron [preauth]
Jan  5 18:19:54 host sshd[15933]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 18:19:54 host sshd[15933]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.8.62
Jan  5 18:19:55 host sshd[15931]: Invalid user terminal from 187.235.65.53 port 45850
Jan  5 18:19:55 host sshd[15931]: input_userauth_request: invalid user terminal [preauth]
Jan  5 18:19:55 host sshd[15931]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 18:19:55 host sshd[15931]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.235.65.53
Jan  5 18:19:57 host sshd[15933]: Failed password for invalid user aaron from 143.198.8.62 port 45148 ssh2
Jan  5 18:19:57 host sshd[15933]: Received disconnect from 143.198.8.62 port 45148:11: Bye Bye [preauth]
Jan  5 18:19:57 host sshd[15933]: Disconnected from 143.198.8.62 port 45148 [preauth]
Jan  5 18:19:57 host sshd[15931]: Failed password for invalid user terminal from 187.235.65.53 port 45850 ssh2
Jan  5 18:19:57 host sshd[15931]: Received disconnect from 187.235.65.53 port 45850:11: Bye Bye [preauth]
Jan  5 18:19:57 host sshd[15931]: Disconnected from 187.235.65.53 port 45850 [preauth]
Jan  5 18:20:03 host sshd[15977]: User root from 103.183.74.59 not allowed because not listed in AllowUsers
Jan  5 18:20:03 host sshd[15977]: input_userauth_request: invalid user root [preauth]
Jan  5 18:20:03 host unix_chkpwd[15979]: password check failed for user (root)
Jan  5 18:20:03 host sshd[15977]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.183.74.59  user=root
Jan  5 18:20:03 host sshd[15977]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 18:20:05 host sshd[15977]: Failed password for invalid user root from 103.183.74.59 port 57042 ssh2
Jan  5 18:20:05 host sshd[15977]: Received disconnect from 103.183.74.59 port 57042:11: Bye Bye [preauth]
Jan  5 18:20:05 host sshd[15977]: Disconnected from 103.183.74.59 port 57042 [preauth]
Jan  5 18:20:53 host sshd[16069]: Invalid user admin from 103.66.206.219 port 54814
Jan  5 18:20:53 host sshd[16069]: input_userauth_request: invalid user admin [preauth]
Jan  5 18:20:53 host sshd[16069]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 18:20:53 host sshd[16069]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.66.206.219
Jan  5 18:20:55 host sshd[16069]: Failed password for invalid user admin from 103.66.206.219 port 54814 ssh2
Jan  5 18:20:55 host sshd[16069]: Received disconnect from 103.66.206.219 port 54814:11: Bye Bye [preauth]
Jan  5 18:20:55 host sshd[16069]: Disconnected from 103.66.206.219 port 54814 [preauth]
Jan  5 18:21:24 host sshd[16115]: User root from 104.248.46.82 not allowed because not listed in AllowUsers
Jan  5 18:21:24 host sshd[16115]: input_userauth_request: invalid user root [preauth]
Jan  5 18:21:24 host unix_chkpwd[16120]: password check failed for user (root)
Jan  5 18:21:24 host sshd[16115]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.46.82  user=root
Jan  5 18:21:24 host sshd[16115]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 18:21:25 host sshd[16118]: User root from 161.35.0.70 not allowed because not listed in AllowUsers
Jan  5 18:21:25 host sshd[16118]: input_userauth_request: invalid user root [preauth]
Jan  5 18:21:25 host unix_chkpwd[16122]: password check failed for user (root)
Jan  5 18:21:25 host sshd[16118]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.0.70  user=root
Jan  5 18:21:25 host sshd[16118]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 18:21:26 host sshd[16115]: Failed password for invalid user root from 104.248.46.82 port 41528 ssh2
Jan  5 18:21:26 host sshd[16115]: Received disconnect from 104.248.46.82 port 41528:11: Bye Bye [preauth]
Jan  5 18:21:26 host sshd[16115]: Disconnected from 104.248.46.82 port 41528 [preauth]
Jan  5 18:21:27 host sshd[16118]: Failed password for invalid user root from 161.35.0.70 port 37018 ssh2
Jan  5 18:21:27 host sshd[16118]: Received disconnect from 161.35.0.70 port 37018:11: Bye Bye [preauth]
Jan  5 18:21:27 host sshd[16118]: Disconnected from 161.35.0.70 port 37018 [preauth]
Jan  5 18:21:28 host sshd[16146]: Invalid user user from 104.248.252.80 port 37390
Jan  5 18:21:28 host sshd[16146]: input_userauth_request: invalid user user [preauth]
Jan  5 18:21:28 host sshd[16146]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 18:21:28 host sshd[16146]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.252.80
Jan  5 18:21:30 host sshd[16146]: Failed password for invalid user user from 104.248.252.80 port 37390 ssh2
Jan  5 18:21:30 host sshd[16146]: Received disconnect from 104.248.252.80 port 37390:11: Bye Bye [preauth]
Jan  5 18:21:30 host sshd[16146]: Disconnected from 104.248.252.80 port 37390 [preauth]
Jan  5 18:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  5 18:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 18:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 18:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  5 18:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 18:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 18:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  5 18:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 18:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 18:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  5 18:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 18:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 18:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  5 18:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 18:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 18:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  5 18:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 18:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 18:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  5 18:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 18:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 18:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  5 18:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 18:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 18:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  5 18:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 18:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 18:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  5 18:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 18:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 18:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  5 18:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 18:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 18:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  5 18:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 18:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 18:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  5 18:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 18:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 18:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=laundryboniface user-2=a2zgroup user-3=dartsimp user-4=cochintaxi user-5=wwwkaretakers user-6=ugotscom user-7=wwwresourcehunte user-8=keralaholi user-9=wwwrmswll user-10=travelboniface user-11=wwwpmcresource user-12=pmcresources user-13=shalinijames user-14=wwwtestugo user-15=vfmassets user-16=wwwkapin user-17=woodpeck user-18=disposeat user-19=wwwkmaorg user-20=remysagr user-21=mrsclean user-22=wwwnexidigital user-23=phmetals user-24=kottayamcalldriv user-25=palco123 user-26=gifterman user-27=wwwletsstalkfood user-28=straightcurve user-29=wwwevmhonda user-30=bonifacegroup feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  5 18:21:53 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  5 18:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 18:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 18:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  5 18:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 18:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 18:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-AWEU7ldmQ7NT397j.~
Jan  5 18:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 18:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 18:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-AWEU7ldmQ7NT397j.~'
Jan  5 18:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 18:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 18:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-AWEU7ldmQ7NT397j.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  5 18:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 18:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 18:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  5 18:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 18:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 18:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  5 18:21:54 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 18:21:54 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 18:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  5 18:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 18:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 18:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  5 18:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 18:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 18:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  5 18:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 18:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 18:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  5 18:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 18:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 18:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  5 18:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 18:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 18:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  5 18:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  5 18:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  5 18:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  5 18:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  5 18:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  5 18:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  5 18:21:59 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  5 18:22:00 host sshd[16505]: User root from 139.59.25.164 not allowed because not listed in AllowUsers
Jan  5 18:22:00 host sshd[16505]: input_userauth_request: invalid user root [preauth]
Jan  5 18:22:00 host unix_chkpwd[16507]: password check failed for user (root)
Jan  5 18:22:00 host sshd[16505]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.25.164  user=root
Jan  5 18:22:00 host sshd[16505]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 18:22:01 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  5 18:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  5 18:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 18:22:01 host sshd[16505]: Failed password for invalid user root from 139.59.25.164 port 39526 ssh2
Jan  5 18:22:01 host sshd[16505]: Received disconnect from 139.59.25.164 port 39526:11: Bye Bye [preauth]
Jan  5 18:22:01 host sshd[16505]: Disconnected from 139.59.25.164 port 39526 [preauth]
Jan  5 18:22:02 host sshd[16509]: Invalid user team2 from 187.235.65.53 port 50874
Jan  5 18:22:02 host sshd[16509]: input_userauth_request: invalid user team2 [preauth]
Jan  5 18:22:02 host sshd[16509]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 18:22:02 host sshd[16509]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.235.65.53
Jan  5 18:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 18:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  5 18:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 18:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 18:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  5 18:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 18:22:05 host sshd[16509]: Failed password for invalid user team2 from 187.235.65.53 port 50874 ssh2
Jan  5 18:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 18:22:05 host sshd[16509]: Received disconnect from 187.235.65.53 port 50874:11: Bye Bye [preauth]
Jan  5 18:22:05 host sshd[16509]: Disconnected from 187.235.65.53 port 50874 [preauth]
Jan  5 18:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  5 18:22:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 18:22:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 18:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  5 18:22:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 18:22:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 18:22:27 host sshd[16624]: Invalid user ys from 67.207.85.118 port 50382
Jan  5 18:22:27 host sshd[16624]: input_userauth_request: invalid user ys [preauth]
Jan  5 18:22:27 host sshd[16624]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 18:22:27 host sshd[16624]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.207.85.118
Jan  5 18:22:28 host sshd[16624]: Failed password for invalid user ys from 67.207.85.118 port 50382 ssh2
Jan  5 18:22:29 host sshd[16624]: Received disconnect from 67.207.85.118 port 50382:11: Bye Bye [preauth]
Jan  5 18:22:29 host sshd[16624]: Disconnected from 67.207.85.118 port 50382 [preauth]
Jan  5 18:22:40 host sshd[16657]: Invalid user dst from 104.248.252.80 port 53946
Jan  5 18:22:40 host sshd[16657]: input_userauth_request: invalid user dst [preauth]
Jan  5 18:22:40 host sshd[16657]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 18:22:40 host sshd[16657]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.252.80
Jan  5 18:22:42 host sshd[16657]: Failed password for invalid user dst from 104.248.252.80 port 53946 ssh2
Jan  5 18:22:48 host sshd[16704]: Invalid user rustserver from 112.78.134.11 port 42464
Jan  5 18:22:48 host sshd[16704]: input_userauth_request: invalid user rustserver [preauth]
Jan  5 18:22:48 host sshd[16704]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 18:22:48 host sshd[16704]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.78.134.11
Jan  5 18:22:51 host sshd[16704]: Failed password for invalid user rustserver from 112.78.134.11 port 42464 ssh2
Jan  5 18:22:51 host sshd[16704]: Received disconnect from 112.78.134.11 port 42464:11: Bye Bye [preauth]
Jan  5 18:22:51 host sshd[16704]: Disconnected from 112.78.134.11 port 42464 [preauth]
Jan  5 18:22:53 host sshd[16717]: Invalid user dst from 51.38.38.239 port 42422
Jan  5 18:22:53 host sshd[16717]: input_userauth_request: invalid user dst [preauth]
Jan  5 18:22:53 host sshd[16717]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 18:22:53 host sshd[16717]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.38.239
Jan  5 18:22:53 host sshd[16715]: User root from 64.225.48.16 not allowed because not listed in AllowUsers
Jan  5 18:22:53 host sshd[16715]: input_userauth_request: invalid user root [preauth]
Jan  5 18:22:53 host unix_chkpwd[16720]: password check failed for user (root)
Jan  5 18:22:53 host sshd[16715]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.225.48.16  user=root
Jan  5 18:22:53 host sshd[16715]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 18:22:55 host sshd[16717]: Failed password for invalid user dst from 51.38.38.239 port 42422 ssh2
Jan  5 18:22:55 host sshd[16715]: Failed password for invalid user root from 64.225.48.16 port 43424 ssh2
Jan  5 18:22:56 host sshd[16717]: Received disconnect from 51.38.38.239 port 42422:11: Bye Bye [preauth]
Jan  5 18:22:56 host sshd[16717]: Disconnected from 51.38.38.239 port 42422 [preauth]
Jan  5 18:22:56 host sshd[16715]: Received disconnect from 64.225.48.16 port 43424:11: Bye Bye [preauth]
Jan  5 18:22:56 host sshd[16715]: Disconnected from 64.225.48.16 port 43424 [preauth]
Jan  5 18:22:56 host sshd[16729]: User root from 103.66.206.219 not allowed because not listed in AllowUsers
Jan  5 18:22:56 host sshd[16729]: input_userauth_request: invalid user root [preauth]
Jan  5 18:22:56 host unix_chkpwd[16744]: password check failed for user (root)
Jan  5 18:22:56 host sshd[16729]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.66.206.219  user=root
Jan  5 18:22:56 host sshd[16729]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 18:22:58 host sshd[16729]: Failed password for invalid user root from 103.66.206.219 port 60506 ssh2
Jan  5 18:22:58 host sshd[16729]: Received disconnect from 103.66.206.219 port 60506:11: Bye Bye [preauth]
Jan  5 18:22:58 host sshd[16729]: Disconnected from 103.66.206.219 port 60506 [preauth]
Jan  5 18:23:05 host sshd[16804]: Invalid user raquel from 93.125.114.51 port 57510
Jan  5 18:23:05 host sshd[16804]: input_userauth_request: invalid user raquel [preauth]
Jan  5 18:23:05 host sshd[16804]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 18:23:05 host sshd[16804]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.125.114.51
Jan  5 18:23:07 host sshd[16804]: Failed password for invalid user raquel from 93.125.114.51 port 57510 ssh2
Jan  5 18:23:07 host sshd[16804]: Received disconnect from 93.125.114.51 port 57510:11: Bye Bye [preauth]
Jan  5 18:23:07 host sshd[16804]: Disconnected from 93.125.114.51 port 57510 [preauth]
Jan  5 18:23:21 host sshd[16858]: Invalid user raquel from 143.198.8.62 port 55714
Jan  5 18:23:21 host sshd[16858]: input_userauth_request: invalid user raquel [preauth]
Jan  5 18:23:21 host sshd[16858]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 18:23:21 host sshd[16858]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.8.62
Jan  5 18:23:22 host sshd[16858]: Failed password for invalid user raquel from 143.198.8.62 port 55714 ssh2
Jan  5 18:23:22 host sshd[16861]: Invalid user sanjay from 187.235.65.53 port 50784
Jan  5 18:23:22 host sshd[16861]: input_userauth_request: invalid user sanjay [preauth]
Jan  5 18:23:22 host sshd[16861]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 18:23:22 host sshd[16861]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.235.65.53
Jan  5 18:23:23 host sshd[16858]: Received disconnect from 143.198.8.62 port 55714:11: Bye Bye [preauth]
Jan  5 18:23:23 host sshd[16858]: Disconnected from 143.198.8.62 port 55714 [preauth]
Jan  5 18:23:24 host sshd[16863]: Connection closed by 78.94.232.255 port 36118 [preauth]
Jan  5 18:23:24 host sshd[16861]: Failed password for invalid user sanjay from 187.235.65.53 port 50784 ssh2
Jan  5 18:23:25 host sshd[16861]: Received disconnect from 187.235.65.53 port 50784:11: Bye Bye [preauth]
Jan  5 18:23:25 host sshd[16861]: Disconnected from 187.235.65.53 port 50784 [preauth]
Jan  5 18:23:34 host sshd[16929]: User root from 69.140.116.168 not allowed because not listed in AllowUsers
Jan  5 18:23:34 host sshd[16929]: input_userauth_request: invalid user root [preauth]
Jan  5 18:23:34 host unix_chkpwd[16932]: password check failed for user (root)
Jan  5 18:23:34 host sshd[16929]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.140.116.168  user=root
Jan  5 18:23:34 host sshd[16929]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 18:23:36 host sshd[16929]: Failed password for invalid user root from 69.140.116.168 port 44924 ssh2
Jan  5 18:23:37 host sshd[16929]: Received disconnect from 69.140.116.168 port 44924:11: Bye Bye [preauth]
Jan  5 18:23:37 host sshd[16929]: Disconnected from 69.140.116.168 port 44924 [preauth]
Jan  5 18:23:37 host sshd[16940]: User centos from 178.128.154.172 not allowed because not listed in AllowUsers
Jan  5 18:23:37 host sshd[16940]: input_userauth_request: invalid user centos [preauth]
Jan  5 18:23:37 host unix_chkpwd[16967]: password check failed for user (centos)
Jan  5 18:23:37 host sshd[16940]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.154.172  user=centos
Jan  5 18:23:39 host sshd[16940]: Failed password for invalid user centos from 178.128.154.172 port 33976 ssh2
Jan  5 18:23:40 host sshd[16940]: Received disconnect from 178.128.154.172 port 33976:11: Bye Bye [preauth]
Jan  5 18:23:40 host sshd[16940]: Disconnected from 178.128.154.172 port 33976 [preauth]
Jan  5 18:23:43 host sshd[16997]: Invalid user rustserver from 67.207.85.118 port 33206
Jan  5 18:23:43 host sshd[16997]: input_userauth_request: invalid user rustserver [preauth]
Jan  5 18:23:43 host sshd[16997]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 18:23:43 host sshd[16997]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.207.85.118
Jan  5 18:23:45 host sshd[16997]: Failed password for invalid user rustserver from 67.207.85.118 port 33206 ssh2
Jan  5 18:23:45 host sshd[16997]: Received disconnect from 67.207.85.118 port 33206:11: Bye Bye [preauth]
Jan  5 18:23:45 host sshd[16997]: Disconnected from 67.207.85.118 port 33206 [preauth]
Jan  5 18:23:58 host sshd[17025]: Invalid user jonas from 51.38.38.239 port 37098
Jan  5 18:23:58 host sshd[17025]: input_userauth_request: invalid user jonas [preauth]
Jan  5 18:23:58 host sshd[17025]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 18:23:58 host sshd[17025]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.38.239
Jan  5 18:24:00 host sshd[17028]: Invalid user ad from 194.110.203.109 port 35238
Jan  5 18:24:00 host sshd[17028]: input_userauth_request: invalid user ad [preauth]
Jan  5 18:24:00 host sshd[17028]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 18:24:00 host sshd[17028]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109
Jan  5 18:24:00 host sshd[17025]: Failed password for invalid user jonas from 51.38.38.239 port 37098 ssh2
Jan  5 18:24:01 host sshd[17025]: Received disconnect from 51.38.38.239 port 37098:11: Bye Bye [preauth]
Jan  5 18:24:01 host sshd[17025]: Disconnected from 51.38.38.239 port 37098 [preauth]
Jan  5 18:24:02 host sshd[17028]: Failed password for invalid user ad from 194.110.203.109 port 35238 ssh2
Jan  5 18:24:06 host sshd[17028]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 18:24:07 host sshd[17076]: User ftp from 103.183.74.59 not allowed because not listed in AllowUsers
Jan  5 18:24:07 host sshd[17076]: input_userauth_request: invalid user ftp [preauth]
Jan  5 18:24:07 host unix_chkpwd[17079]: password check failed for user (ftp)
Jan  5 18:24:07 host sshd[17076]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.183.74.59  user=ftp
Jan  5 18:24:07 host sshd[17076]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp"
Jan  5 18:24:07 host sshd[17028]: Failed password for invalid user ad from 194.110.203.109 port 35238 ssh2
Jan  5 18:24:09 host sshd[17076]: Failed password for invalid user ftp from 103.183.74.59 port 41816 ssh2
Jan  5 18:24:10 host sshd[17076]: Received disconnect from 103.183.74.59 port 41816:11: Bye Bye [preauth]
Jan  5 18:24:10 host sshd[17076]: Disconnected from 103.183.74.59 port 41816 [preauth]
Jan  5 18:24:11 host sshd[17028]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 18:24:13 host sshd[17028]: Failed password for invalid user ad from 194.110.203.109 port 35238 ssh2
Jan  5 18:24:16 host sshd[17028]: Connection closed by 194.110.203.109 port 35238 [preauth]
Jan  5 18:24:16 host sshd[17028]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109
Jan  5 18:24:19 host sshd[17123]: User root from 112.78.134.11 not allowed because not listed in AllowUsers
Jan  5 18:24:19 host sshd[17123]: input_userauth_request: invalid user root [preauth]
Jan  5 18:24:19 host unix_chkpwd[17125]: password check failed for user (root)
Jan  5 18:24:19 host sshd[17123]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.78.134.11  user=root
Jan  5 18:24:19 host sshd[17123]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 18:24:21 host sshd[17123]: Failed password for invalid user root from 112.78.134.11 port 54173 ssh2
Jan  5 18:24:21 host sshd[17123]: Received disconnect from 112.78.134.11 port 54173:11: Bye Bye [preauth]
Jan  5 18:24:21 host sshd[17123]: Disconnected from 112.78.134.11 port 54173 [preauth]
Jan  5 18:24:25 host sshd[17164]: Invalid user jenkins from 143.198.8.62 port 50600
Jan  5 18:24:25 host sshd[17164]: input_userauth_request: invalid user jenkins [preauth]
Jan  5 18:24:25 host sshd[17164]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 18:24:25 host sshd[17164]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.8.62
Jan  5 18:24:27 host sshd[17164]: Failed password for invalid user jenkins from 143.198.8.62 port 50600 ssh2
Jan  5 18:24:47 host sshd[17255]: User root from 67.207.85.118 not allowed because not listed in AllowUsers
Jan  5 18:24:47 host sshd[17255]: input_userauth_request: invalid user root [preauth]
Jan  5 18:24:47 host unix_chkpwd[17258]: password check failed for user (root)
Jan  5 18:24:47 host sshd[17255]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.207.85.118  user=root
Jan  5 18:24:47 host sshd[17255]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 18:24:49 host sshd[17255]: Failed password for invalid user root from 67.207.85.118 port 41250 ssh2
Jan  5 18:24:50 host sshd[17255]: Received disconnect from 67.207.85.118 port 41250:11: Bye Bye [preauth]
Jan  5 18:24:50 host sshd[17255]: Disconnected from 67.207.85.118 port 41250 [preauth]
Jan  5 18:31:54 host sshd[18248]: Invalid user cups-pk-helper from 104.244.74.6 port 34594
Jan  5 18:31:54 host sshd[18248]: input_userauth_request: invalid user cups-pk-helper [preauth]
Jan  5 18:31:54 host sshd[18248]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 18:31:54 host sshd[18248]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6
Jan  5 18:31:56 host sshd[18248]: Failed password for invalid user cups-pk-helper from 104.244.74.6 port 34594 ssh2
Jan  5 18:31:56 host sshd[18248]: Connection closed by 104.244.74.6 port 34594 [preauth]
Jan  5 18:47:04 host sshd[20290]: Invalid user username from 71.36.120.77 port 58008
Jan  5 18:47:04 host sshd[20290]: input_userauth_request: invalid user username [preauth]
Jan  5 18:47:04 host sshd[20290]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 18:47:04 host sshd[20290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=71.36.120.77
Jan  5 18:47:07 host sshd[20290]: Failed password for invalid user username from 71.36.120.77 port 58008 ssh2
Jan  5 18:47:08 host sshd[20290]: Connection closed by 71.36.120.77 port 58008 [preauth]
Jan  5 19:15:33 host sshd[27482]: Did not receive identification string from 27.71.231.21 port 57108
Jan  5 19:15:34 host sshd[27484]: Invalid user gitlab-runner from 27.71.231.21 port 57138
Jan  5 19:15:34 host sshd[27485]: Invalid user hello from 27.71.231.21 port 57364
Jan  5 19:15:34 host sshd[27483]: Invalid user emqx from 27.71.231.21 port 57252
Jan  5 19:15:34 host sshd[27487]: Invalid user elastic from 27.71.231.21 port 57414
Jan  5 19:15:34 host sshd[27485]: input_userauth_request: invalid user hello [preauth]
Jan  5 19:15:34 host sshd[27483]: input_userauth_request: invalid user emqx [preauth]
Jan  5 19:15:34 host sshd[27484]: input_userauth_request: invalid user gitlab-runner [preauth]
Jan  5 19:15:34 host sshd[27487]: input_userauth_request: invalid user elastic [preauth]
Jan  5 19:15:34 host sshd[27491]: Invalid user ansadmin from 27.71.231.21 port 57198
Jan  5 19:15:34 host sshd[27488]: Invalid user ansible from 27.71.231.21 port 57170
Jan  5 19:15:34 host sshd[27488]: input_userauth_request: invalid user ansible [preauth]
Jan  5 19:15:34 host sshd[27491]: input_userauth_request: invalid user ansadmin [preauth]
Jan  5 19:15:34 host sshd[27493]: Invalid user steam from 27.71.231.21 port 57270
Jan  5 19:15:34 host sshd[27490]: Invalid user emqx from 27.71.231.21 port 57368
Jan  5 19:15:34 host sshd[27493]: input_userauth_request: invalid user steam [preauth]
Jan  5 19:15:34 host sshd[27490]: input_userauth_request: invalid user emqx [preauth]
Jan  5 19:15:34 host sshd[27494]: Invalid user git from 27.71.231.21 port 57210
Jan  5 19:15:34 host sshd[27494]: input_userauth_request: invalid user git [preauth]
Jan  5 19:15:34 host sshd[27486]: Invalid user tester from 27.71.231.21 port 57230
Jan  5 19:15:34 host sshd[27486]: input_userauth_request: invalid user tester [preauth]
Jan  5 19:15:34 host sshd[27489]: Invalid user postgres from 27.71.231.21 port 57290
Jan  5 19:15:34 host sshd[27489]: input_userauth_request: invalid user postgres [preauth]
Jan  5 19:15:34 host sshd[27492]: Invalid user oracle from 27.71.231.21 port 57318
Jan  5 19:15:34 host sshd[27495]: Invalid user www from 27.71.231.21 port 57454
Jan  5 19:15:34 host sshd[27483]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 19:15:34 host sshd[27485]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 19:15:34 host sshd[27483]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  5 19:15:34 host sshd[27485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  5 19:15:34 host sshd[27492]: input_userauth_request: invalid user oracle [preauth]
Jan  5 19:15:34 host sshd[27497]: Invalid user elastic from 27.71.231.21 port 57274
Jan  5 19:15:34 host sshd[27497]: input_userauth_request: invalid user elastic [preauth]
Jan  5 19:15:34 host sshd[27495]: input_userauth_request: invalid user www [preauth]
Jan  5 19:15:34 host sshd[27487]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 19:15:34 host sshd[27487]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  5 19:15:34 host sshd[27496]: Invalid user admin from 27.71.231.21 port 57246
Jan  5 19:15:34 host sshd[27496]: input_userauth_request: invalid user admin [preauth]
Jan  5 19:15:34 host sshd[27484]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 19:15:34 host sshd[27484]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  5 19:15:34 host sshd[27488]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 19:15:34 host sshd[27488]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  5 19:15:34 host sshd[27498]: Invalid user guest from 27.71.231.21 port 57420
Jan  5 19:15:34 host sshd[27500]: Invalid user tester from 27.71.231.21 port 57332
Jan  5 19:15:34 host sshd[27498]: input_userauth_request: invalid user guest [preauth]
Jan  5 19:15:34 host sshd[27491]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 19:15:34 host sshd[27491]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  5 19:15:34 host sshd[27500]: input_userauth_request: invalid user tester [preauth]
Jan  5 19:15:34 host sshd[27499]: Invalid user test from 27.71.231.21 port 57122
Jan  5 19:15:34 host sshd[27499]: input_userauth_request: invalid user test [preauth]
Jan  5 19:15:34 host sshd[27490]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 19:15:34 host sshd[27490]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  5 19:15:34 host sshd[27493]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 19:15:34 host sshd[27493]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  5 19:15:34 host sshd[27494]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 19:15:34 host sshd[27494]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  5 19:15:34 host sshd[27486]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 19:15:34 host sshd[27486]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  5 19:15:34 host sshd[27489]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 19:15:34 host sshd[27489]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  5 19:15:34 host sshd[27492]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 19:15:34 host sshd[27492]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  5 19:15:34 host sshd[27497]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 19:15:34 host sshd[27495]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 19:15:34 host sshd[27497]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  5 19:15:34 host sshd[27495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  5 19:15:34 host sshd[27496]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 19:15:34 host sshd[27496]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  5 19:15:34 host sshd[27498]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 19:15:34 host sshd[27498]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  5 19:15:34 host sshd[27500]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 19:15:34 host sshd[27499]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 19:15:34 host sshd[27500]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  5 19:15:34 host sshd[27499]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  5 19:15:35 host sshd[27525]: Invalid user oracle from 27.71.231.21 port 57416
Jan  5 19:15:35 host sshd[27525]: input_userauth_request: invalid user oracle [preauth]
Jan  5 19:15:35 host sshd[27525]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 19:15:35 host sshd[27525]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  5 19:15:35 host sshd[27485]: Failed password for invalid user hello from 27.71.231.21 port 57364 ssh2
Jan  5 19:15:35 host sshd[27483]: Failed password for invalid user emqx from 27.71.231.21 port 57252 ssh2
Jan  5 19:15:35 host sshd[27487]: Failed password for invalid user elastic from 27.71.231.21 port 57414 ssh2
Jan  5 19:15:35 host sshd[27484]: Failed password for invalid user gitlab-runner from 27.71.231.21 port 57138 ssh2
Jan  5 19:15:35 host sshd[27488]: Failed password for invalid user ansible from 27.71.231.21 port 57170 ssh2
Jan  5 19:15:35 host sshd[27491]: Failed password for invalid user ansadmin from 27.71.231.21 port 57198 ssh2
Jan  5 19:15:35 host sshd[27490]: Failed password for invalid user emqx from 27.71.231.21 port 57368 ssh2
Jan  5 19:15:35 host sshd[27493]: Failed password for invalid user steam from 27.71.231.21 port 57270 ssh2
Jan  5 19:15:35 host sshd[27494]: Failed password for invalid user git from 27.71.231.21 port 57210 ssh2
Jan  5 19:15:35 host sshd[27486]: Failed password for invalid user tester from 27.71.231.21 port 57230 ssh2
Jan  5 19:15:35 host sshd[27489]: Failed password for invalid user postgres from 27.71.231.21 port 57290 ssh2
Jan  5 19:15:35 host sshd[27485]: Connection closed by 27.71.231.21 port 57364 [preauth]
Jan  5 19:15:35 host sshd[27483]: Connection closed by 27.71.231.21 port 57252 [preauth]
Jan  5 19:15:35 host sshd[27492]: Failed password for invalid user oracle from 27.71.231.21 port 57318 ssh2
Jan  5 19:15:35 host sshd[27495]: Failed password for invalid user www from 27.71.231.21 port 57454 ssh2
Jan  5 19:15:35 host sshd[27497]: Failed password for invalid user elastic from 27.71.231.21 port 57274 ssh2
Jan  5 19:15:35 host sshd[27487]: Connection closed by 27.71.231.21 port 57414 [preauth]
Jan  5 19:15:35 host sshd[27484]: Connection closed by 27.71.231.21 port 57138 [preauth]
Jan  5 19:15:35 host sshd[27488]: Connection closed by 27.71.231.21 port 57170 [preauth]
Jan  5 19:15:35 host sshd[27498]: Failed password for invalid user guest from 27.71.231.21 port 57420 ssh2
Jan  5 19:15:35 host sshd[27500]: Failed password for invalid user tester from 27.71.231.21 port 57332 ssh2
Jan  5 19:15:35 host sshd[27496]: Failed password for invalid user admin from 27.71.231.21 port 57246 ssh2
Jan  5 19:15:35 host sshd[27491]: Connection closed by 27.71.231.21 port 57198 [preauth]
Jan  5 19:15:35 host sshd[27499]: Failed password for invalid user test from 27.71.231.21 port 57122 ssh2
Jan  5 19:15:35 host sshd[27490]: Connection closed by 27.71.231.21 port 57368 [preauth]
Jan  5 19:15:35 host sshd[27493]: Connection closed by 27.71.231.21 port 57270 [preauth]
Jan  5 19:15:35 host sshd[27494]: Connection closed by 27.71.231.21 port 57210 [preauth]
Jan  5 19:15:35 host sshd[27486]: Connection closed by 27.71.231.21 port 57230 [preauth]
Jan  5 19:15:35 host sshd[27489]: Connection closed by 27.71.231.21 port 57290 [preauth]
Jan  5 19:15:35 host sshd[27492]: Connection closed by 27.71.231.21 port 57318 [preauth]
Jan  5 19:15:35 host sshd[27497]: Connection closed by 27.71.231.21 port 57274 [preauth]
Jan  5 19:15:35 host sshd[27495]: Connection closed by 27.71.231.21 port 57454 [preauth]
Jan  5 19:15:35 host sshd[27496]: Connection closed by 27.71.231.21 port 57246 [preauth]
Jan  5 19:15:35 host sshd[27498]: Connection closed by 27.71.231.21 port 57420 [preauth]
Jan  5 19:15:35 host sshd[27499]: Connection closed by 27.71.231.21 port 57122 [preauth]
Jan  5 19:15:35 host sshd[27500]: Connection closed by 27.71.231.21 port 57332 [preauth]
Jan  5 19:15:37 host sshd[27525]: Failed password for invalid user oracle from 27.71.231.21 port 57416 ssh2
Jan  5 19:15:37 host sshd[27532]: Invalid user ftpuser from 27.71.231.21 port 57446
Jan  5 19:15:37 host sshd[27532]: input_userauth_request: invalid user ftpuser [preauth]
Jan  5 19:15:37 host sshd[27533]: Invalid user test from 27.71.231.21 port 57124
Jan  5 19:15:37 host sshd[27533]: input_userauth_request: invalid user test [preauth]
Jan  5 19:15:37 host sshd[27534]: User centos from 27.71.231.21 not allowed because not listed in AllowUsers
Jan  5 19:15:37 host sshd[27534]: input_userauth_request: invalid user centos [preauth]
Jan  5 19:15:37 host sshd[27525]: Connection closed by 27.71.231.21 port 57416 [preauth]
Jan  5 19:15:37 host sshd[27536]: Invalid user oracle from 27.71.231.21 port 57218
Jan  5 19:15:37 host sshd[27535]: Invalid user hadoop from 27.71.231.21 port 57382
Jan  5 19:15:37 host sshd[27535]: input_userauth_request: invalid user hadoop [preauth]
Jan  5 19:15:37 host sshd[27536]: input_userauth_request: invalid user oracle [preauth]
Jan  5 19:15:37 host sshd[27539]: Invalid user guest from 27.71.231.21 port 57392
Jan  5 19:15:37 host sshd[27537]: Invalid user linaro from 27.71.231.21 port 57174
Jan  5 19:15:37 host sshd[27538]: Invalid user dspace from 27.71.231.21 port 57348
Jan  5 19:15:37 host sshd[27539]: input_userauth_request: invalid user guest [preauth]
Jan  5 19:15:37 host sshd[27537]: input_userauth_request: invalid user linaro [preauth]
Jan  5 19:15:37 host sshd[27538]: input_userauth_request: invalid user dspace [preauth]
Jan  5 19:15:37 host sshd[27532]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 19:15:37 host sshd[27532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  5 19:15:37 host sshd[27533]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 19:15:37 host sshd[27533]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  5 19:15:37 host sshd[27535]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 19:15:37 host sshd[27535]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  5 19:15:37 host sshd[27536]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 19:15:37 host sshd[27536]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  5 19:15:37 host unix_chkpwd[27550]: password check failed for user (centos)
Jan  5 19:15:37 host sshd[27534]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21  user=centos
Jan  5 19:15:37 host sshd[27538]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 19:15:37 host sshd[27538]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  5 19:15:37 host sshd[27539]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 19:15:37 host sshd[27539]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  5 19:15:37 host sshd[27537]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 19:15:37 host sshd[27537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  5 19:15:39 host sshd[27532]: Failed password for invalid user ftpuser from 27.71.231.21 port 57446 ssh2
Jan  5 19:15:39 host sshd[27533]: Failed password for invalid user test from 27.71.231.21 port 57124 ssh2
Jan  5 19:15:39 host sshd[27535]: Failed password for invalid user hadoop from 27.71.231.21 port 57382 ssh2
Jan  5 19:15:39 host sshd[27536]: Failed password for invalid user oracle from 27.71.231.21 port 57218 ssh2
Jan  5 19:15:39 host sshd[27534]: Failed password for invalid user centos from 27.71.231.21 port 57434 ssh2
Jan  5 19:15:39 host sshd[27537]: Failed password for invalid user linaro from 27.71.231.21 port 57174 ssh2
Jan  5 19:15:39 host sshd[27538]: Failed password for invalid user dspace from 27.71.231.21 port 57348 ssh2
Jan  5 19:15:39 host sshd[27539]: Failed password for invalid user guest from 27.71.231.21 port 57392 ssh2
Jan  5 19:16:28 host sshd[27862]: Invalid user admin from 98.164.126.194 port 36856
Jan  5 19:16:28 host sshd[27862]: input_userauth_request: invalid user admin [preauth]
Jan  5 19:16:28 host sshd[27862]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 19:16:28 host sshd[27862]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.164.126.194
Jan  5 19:16:29 host sshd[27862]: Failed password for invalid user admin from 98.164.126.194 port 36856 ssh2
Jan  5 19:16:31 host sshd[27862]: Connection reset by 98.164.126.194 port 36856 [preauth]
Jan  5 19:16:45 host sshd[27950]: Connection reset by 98.164.126.194 port 36985 [preauth]
Jan  5 19:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  5 19:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 19:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 19:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  5 19:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 19:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 19:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  5 19:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 19:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 19:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  5 19:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 19:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 19:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  5 19:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 19:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 19:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  5 19:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 19:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 19:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  5 19:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 19:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 19:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  5 19:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 19:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 19:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  5 19:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 19:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 19:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  5 19:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 19:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 19:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  5 19:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 19:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 19:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  5 19:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 19:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 19:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  5 19:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 19:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 19:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=mrsclean user-2=wwwnexidigital user-3=gifterman user-4=palco123 user-5=phmetals user-6=kottayamcalldriv user-7=wwwletsstalkfood user-8=straightcurve user-9=bonifacegroup user-10=wwwevmhonda user-11=pmcresources user-12=vfmassets user-13=wwwtestugo user-14=shalinijames user-15=wwwkapin user-16=woodpeck user-17=disposeat user-18=wwwkmaorg user-19=remysagr user-20=wwwrmswll user-21=keralaholi user-22=wwwresourcehunte user-23=ugotscom user-24=travelboniface user-25=wwwpmcresource user-26=laundryboniface user-27=dartsimp user-28=a2zgroup user-29=cochintaxi user-30=wwwkaretakers feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  5 19:21:58 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  5 19:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 19:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 19:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  5 19:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 19:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 19:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-VokiaSRMD4oPhNEO.~
Jan  5 19:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 19:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 19:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-VokiaSRMD4oPhNEO.~'
Jan  5 19:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 19:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 19:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-VokiaSRMD4oPhNEO.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  5 19:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 19:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 19:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  5 19:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 19:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 19:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  5 19:21:58 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 19:21:58 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 19:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  5 19:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 19:21:59 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 19:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  5 19:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 19:21:59 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 19:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  5 19:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 19:21:59 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 19:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  5 19:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 19:21:59 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 19:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  5 19:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 19:22:00 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 19:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  5 19:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  5 19:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  5 19:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  5 19:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  5 19:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  5 19:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  5 19:22:08 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  5 19:22:10 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  5 19:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  5 19:22:10 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 19:22:14 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 19:22:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  5 19:22:14 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 19:22:15 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 19:22:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  5 19:22:15 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 19:22:17 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 19:22:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  5 19:22:17 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 19:22:21 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 19:22:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  5 19:22:21 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 19:22:27 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 19:22:31 host sshd[30166]: Invalid user editor from 179.104.17.9 port 54112
Jan  5 19:22:31 host sshd[30166]: input_userauth_request: invalid user editor [preauth]
Jan  5 19:22:31 host sshd[30166]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 19:22:31 host sshd[30166]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.104.17.9
Jan  5 19:22:33 host sshd[30166]: Failed password for invalid user editor from 179.104.17.9 port 54112 ssh2
Jan  5 19:22:34 host sshd[30166]: Received disconnect from 179.104.17.9 port 54112:11: Bye Bye [preauth]
Jan  5 19:22:34 host sshd[30166]: Disconnected from 179.104.17.9 port 54112 [preauth]
Jan  5 19:22:38 host sshd[30206]: Did not receive identification string from 112.111.16.92 port 53267
Jan  5 19:22:40 host sshd[30207]: Invalid user ubuntu from 112.111.16.92 port 54117
Jan  5 19:22:40 host sshd[30207]: input_userauth_request: invalid user ubuntu [preauth]
Jan  5 19:22:40 host sshd[30208]: Invalid user postgres from 112.111.16.92 port 54121
Jan  5 19:22:40 host sshd[30208]: input_userauth_request: invalid user postgres [preauth]
Jan  5 19:22:40 host sshd[30209]: Invalid user gitlab-runner from 112.111.16.92 port 54119
Jan  5 19:22:40 host sshd[30209]: input_userauth_request: invalid user gitlab-runner [preauth]
Jan  5 19:22:40 host sshd[30211]: Invalid user support from 112.111.16.92 port 54123
Jan  5 19:22:40 host sshd[30211]: input_userauth_request: invalid user support [preauth]
Jan  5 19:22:40 host sshd[30207]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 19:22:40 host sshd[30207]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.111.16.92
Jan  5 19:22:40 host sshd[30208]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 19:22:40 host sshd[30208]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.111.16.92
Jan  5 19:22:40 host sshd[30209]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 19:22:40 host sshd[30209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.111.16.92
Jan  5 19:22:40 host sshd[30211]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 19:22:40 host sshd[30211]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.111.16.92
Jan  5 19:22:41 host sshd[30207]: Failed password for invalid user ubuntu from 112.111.16.92 port 54117 ssh2
Jan  5 19:22:41 host sshd[30208]: Failed password for invalid user postgres from 112.111.16.92 port 54121 ssh2
Jan  5 19:22:41 host sshd[30209]: Failed password for invalid user gitlab-runner from 112.111.16.92 port 54119 ssh2
Jan  5 19:22:41 host sshd[30211]: Failed password for invalid user support from 112.111.16.92 port 54123 ssh2
Jan  5 19:22:42 host sshd[30207]: Connection closed by 112.111.16.92 port 54117 [preauth]
Jan  5 19:22:42 host sshd[30208]: Connection closed by 112.111.16.92 port 54121 [preauth]
Jan  5 19:22:42 host sshd[30209]: Connection closed by 112.111.16.92 port 54119 [preauth]
Jan  5 19:22:42 host sshd[30211]: Connection closed by 112.111.16.92 port 54123 [preauth]
Jan  5 19:23:44 host sshd[30574]: Invalid user ubnt from 122.166.187.112 port 35526
Jan  5 19:23:44 host sshd[30574]: input_userauth_request: invalid user ubnt [preauth]
Jan  5 19:23:44 host sshd[30574]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 19:23:44 host sshd[30574]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.166.187.112
Jan  5 19:23:46 host sshd[30574]: Failed password for invalid user ubnt from 122.166.187.112 port 35526 ssh2
Jan  5 19:23:46 host sshd[30574]: Connection closed by 122.166.187.112 port 35526 [preauth]
Jan  5 19:24:39 host sshd[30880]: Invalid user liwei from 179.104.17.9 port 40081
Jan  5 19:24:39 host sshd[30880]: input_userauth_request: invalid user liwei [preauth]
Jan  5 19:24:39 host sshd[30880]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 19:24:39 host sshd[30880]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.104.17.9
Jan  5 19:24:41 host sshd[30880]: Failed password for invalid user liwei from 179.104.17.9 port 40081 ssh2
Jan  5 19:24:42 host sshd[30880]: Received disconnect from 179.104.17.9 port 40081:11: Bye Bye [preauth]
Jan  5 19:24:42 host sshd[30880]: Disconnected from 179.104.17.9 port 40081 [preauth]
Jan  5 19:26:04 host sshd[31458]: Invalid user tester from 179.104.17.9 port 52048
Jan  5 19:26:04 host sshd[31458]: input_userauth_request: invalid user tester [preauth]
Jan  5 19:26:04 host sshd[31458]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 19:26:04 host sshd[31458]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.104.17.9
Jan  5 19:26:06 host sshd[31458]: Failed password for invalid user tester from 179.104.17.9 port 52048 ssh2
Jan  5 19:26:06 host sshd[31458]: Received disconnect from 179.104.17.9 port 52048:11: Bye Bye [preauth]
Jan  5 19:26:06 host sshd[31458]: Disconnected from 179.104.17.9 port 52048 [preauth]
Jan  5 19:44:13 host sshd[5150]: Invalid user pedro from 115.77.187.194 port 57914
Jan  5 19:44:13 host sshd[5150]: input_userauth_request: invalid user pedro [preauth]
Jan  5 19:44:13 host sshd[5150]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 19:44:13 host sshd[5150]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.77.187.194
Jan  5 19:44:15 host sshd[5150]: Failed password for invalid user pedro from 115.77.187.194 port 57914 ssh2
Jan  5 19:44:16 host sshd[5150]: Received disconnect from 115.77.187.194 port 57914:11: Bye Bye [preauth]
Jan  5 19:44:16 host sshd[5150]: Disconnected from 115.77.187.194 port 57914 [preauth]
Jan  5 19:45:02 host sshd[5430]: Invalid user ventas from 162.243.136.58 port 54836
Jan  5 19:45:02 host sshd[5430]: input_userauth_request: invalid user ventas [preauth]
Jan  5 19:45:02 host sshd[5430]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 19:45:02 host sshd[5430]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.136.58
Jan  5 19:45:04 host sshd[5430]: Failed password for invalid user ventas from 162.243.136.58 port 54836 ssh2
Jan  5 19:45:04 host sshd[5430]: Received disconnect from 162.243.136.58 port 54836:11: Bye Bye [preauth]
Jan  5 19:45:04 host sshd[5430]: Disconnected from 162.243.136.58 port 54836 [preauth]
Jan  5 19:45:26 host sshd[5579]: Invalid user thomas from 24.199.104.140 port 58518
Jan  5 19:45:26 host sshd[5579]: input_userauth_request: invalid user thomas [preauth]
Jan  5 19:45:26 host sshd[5579]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 19:45:26 host sshd[5579]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.199.104.140
Jan  5 19:45:28 host sshd[5579]: Failed password for invalid user thomas from 24.199.104.140 port 58518 ssh2
Jan  5 19:45:28 host sshd[5579]: Received disconnect from 24.199.104.140 port 58518:11: Bye Bye [preauth]
Jan  5 19:45:28 host sshd[5579]: Disconnected from 24.199.104.140 port 58518 [preauth]
Jan  5 19:45:37 host sshd[5653]: Invalid user jon from 146.59.195.105 port 36540
Jan  5 19:45:37 host sshd[5653]: input_userauth_request: invalid user jon [preauth]
Jan  5 19:45:37 host sshd[5653]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 19:45:37 host sshd[5653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.59.195.105
Jan  5 19:45:39 host sshd[5653]: Failed password for invalid user jon from 146.59.195.105 port 36540 ssh2
Jan  5 19:45:39 host sshd[5653]: Received disconnect from 146.59.195.105 port 36540:11: Bye Bye [preauth]
Jan  5 19:45:39 host sshd[5653]: Disconnected from 146.59.195.105 port 36540 [preauth]
Jan  5 19:46:54 host sshd[6174]: Invalid user admin from 45.232.244.5 port 51122
Jan  5 19:46:54 host sshd[6174]: input_userauth_request: invalid user admin [preauth]
Jan  5 19:46:54 host sshd[6174]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 19:46:54 host sshd[6174]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.232.244.5
Jan  5 19:46:56 host sshd[6174]: Failed password for invalid user admin from 45.232.244.5 port 51122 ssh2
Jan  5 19:46:57 host sshd[6174]: Received disconnect from 45.232.244.5 port 51122:11: Bye Bye [preauth]
Jan  5 19:46:57 host sshd[6174]: Disconnected from 45.232.244.5 port 51122 [preauth]
Jan  5 19:46:57 host sshd[6197]: Invalid user jorge from 43.153.85.195 port 48422
Jan  5 19:46:57 host sshd[6197]: input_userauth_request: invalid user jorge [preauth]
Jan  5 19:46:57 host sshd[6197]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 19:46:57 host sshd[6197]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.85.195
Jan  5 19:46:58 host sshd[6197]: Failed password for invalid user jorge from 43.153.85.195 port 48422 ssh2
Jan  5 19:46:59 host sshd[6197]: Received disconnect from 43.153.85.195 port 48422:11: Bye Bye [preauth]
Jan  5 19:46:59 host sshd[6197]: Disconnected from 43.153.85.195 port 48422 [preauth]
Jan  5 19:48:07 host sshd[6577]: Invalid user user from 162.243.136.58 port 41752
Jan  5 19:48:07 host sshd[6577]: input_userauth_request: invalid user user [preauth]
Jan  5 19:48:07 host sshd[6577]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 19:48:07 host sshd[6577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.136.58
Jan  5 19:48:09 host sshd[6577]: Failed password for invalid user user from 162.243.136.58 port 41752 ssh2
Jan  5 19:48:09 host sshd[6577]: Received disconnect from 162.243.136.58 port 41752:11: Bye Bye [preauth]
Jan  5 19:48:09 host sshd[6577]: Disconnected from 162.243.136.58 port 41752 [preauth]
Jan  5 19:48:45 host sshd[6772]: Invalid user admin from 162.243.136.58 port 36544
Jan  5 19:48:45 host sshd[6772]: input_userauth_request: invalid user admin [preauth]
Jan  5 19:48:45 host sshd[6772]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 19:48:45 host sshd[6772]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.136.58
Jan  5 19:48:47 host sshd[6772]: Failed password for invalid user admin from 162.243.136.58 port 36544 ssh2
Jan  5 19:48:48 host sshd[6772]: Received disconnect from 162.243.136.58 port 36544:11: Bye Bye [preauth]
Jan  5 19:48:48 host sshd[6772]: Disconnected from 162.243.136.58 port 36544 [preauth]
Jan  5 19:49:48 host sshd[7122]: User root from 94.130.227.246 not allowed because not listed in AllowUsers
Jan  5 19:49:48 host sshd[7122]: input_userauth_request: invalid user root [preauth]
Jan  5 19:49:48 host unix_chkpwd[7128]: password check failed for user (root)
Jan  5 19:49:48 host sshd[7122]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.130.227.246  user=root
Jan  5 19:49:48 host sshd[7122]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 19:49:50 host sshd[7122]: Failed password for invalid user root from 94.130.227.246 port 50158 ssh2
Jan  5 19:49:50 host sshd[7122]: Received disconnect from 94.130.227.246 port 50158:11: Bye Bye [preauth]
Jan  5 19:49:50 host sshd[7122]: Disconnected from 94.130.227.246 port 50158 [preauth]
Jan  5 19:50:13 host sshd[7272]: Invalid user alberto from 146.59.195.105 port 60194
Jan  5 19:50:13 host sshd[7272]: input_userauth_request: invalid user alberto [preauth]
Jan  5 19:50:13 host sshd[7272]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 19:50:13 host sshd[7272]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.59.195.105
Jan  5 19:50:15 host sshd[7272]: Failed password for invalid user alberto from 146.59.195.105 port 60194 ssh2
Jan  5 19:50:15 host sshd[7272]: Received disconnect from 146.59.195.105 port 60194:11: Bye Bye [preauth]
Jan  5 19:50:15 host sshd[7272]: Disconnected from 146.59.195.105 port 60194 [preauth]
Jan  5 19:50:19 host sshd[7297]: Invalid user client from 24.199.104.140 port 56914
Jan  5 19:50:19 host sshd[7297]: input_userauth_request: invalid user client [preauth]
Jan  5 19:50:19 host sshd[7297]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 19:50:19 host sshd[7297]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.199.104.140
Jan  5 19:50:21 host sshd[7297]: Failed password for invalid user client from 24.199.104.140 port 56914 ssh2
Jan  5 19:50:21 host sshd[7297]: Received disconnect from 24.199.104.140 port 56914:11: Bye Bye [preauth]
Jan  5 19:50:21 host sshd[7297]: Disconnected from 24.199.104.140 port 56914 [preauth]
Jan  5 19:51:03 host sshd[7541]: Invalid user minecraft from 115.77.187.194 port 38144
Jan  5 19:51:03 host sshd[7541]: input_userauth_request: invalid user minecraft [preauth]
Jan  5 19:51:03 host sshd[7541]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 19:51:03 host sshd[7541]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.77.187.194
Jan  5 19:51:05 host sshd[7541]: Failed password for invalid user minecraft from 115.77.187.194 port 38144 ssh2
Jan  5 19:51:05 host sshd[7541]: Received disconnect from 115.77.187.194 port 38144:11: Bye Bye [preauth]
Jan  5 19:51:05 host sshd[7541]: Disconnected from 115.77.187.194 port 38144 [preauth]
Jan  5 19:51:14 host sshd[7587]: Invalid user oracle from 45.232.244.5 port 42986
Jan  5 19:51:14 host sshd[7587]: input_userauth_request: invalid user oracle [preauth]
Jan  5 19:51:14 host sshd[7587]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 19:51:14 host sshd[7587]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.232.244.5
Jan  5 19:51:16 host sshd[7587]: Failed password for invalid user oracle from 45.232.244.5 port 42986 ssh2
Jan  5 19:51:16 host sshd[7587]: Received disconnect from 45.232.244.5 port 42986:11: Bye Bye [preauth]
Jan  5 19:51:16 host sshd[7587]: Disconnected from 45.232.244.5 port 42986 [preauth]
Jan  5 19:51:28 host sshd[7684]: Invalid user admin from 146.59.195.105 port 59938
Jan  5 19:51:28 host sshd[7684]: input_userauth_request: invalid user admin [preauth]
Jan  5 19:51:28 host sshd[7684]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 19:51:28 host sshd[7684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.59.195.105
Jan  5 19:51:29 host sshd[7687]: User root from 24.199.104.140 not allowed because not listed in AllowUsers
Jan  5 19:51:29 host sshd[7687]: input_userauth_request: invalid user root [preauth]
Jan  5 19:51:29 host unix_chkpwd[7695]: password check failed for user (root)
Jan  5 19:51:29 host sshd[7687]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.199.104.140  user=root
Jan  5 19:51:29 host sshd[7687]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 19:51:30 host sshd[7684]: Failed password for invalid user admin from 146.59.195.105 port 59938 ssh2
Jan  5 19:51:30 host sshd[7687]: Failed password for invalid user root from 24.199.104.140 port 36316 ssh2
Jan  5 19:51:44 host sshd[7921]: User root from 94.130.227.246 not allowed because not listed in AllowUsers
Jan  5 19:51:44 host sshd[7921]: input_userauth_request: invalid user root [preauth]
Jan  5 19:51:44 host unix_chkpwd[7929]: password check failed for user (root)
Jan  5 19:51:44 host sshd[7921]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.130.227.246  user=root
Jan  5 19:51:44 host sshd[7921]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 19:51:47 host sshd[7921]: Failed password for invalid user root from 94.130.227.246 port 41320 ssh2
Jan  5 19:51:47 host sshd[7921]: Received disconnect from 94.130.227.246 port 41320:11: Bye Bye [preauth]
Jan  5 19:51:47 host sshd[7921]: Disconnected from 94.130.227.246 port 41320 [preauth]
Jan  5 19:52:26 host sshd[8175]: Invalid user testuser from 115.77.187.194 port 55624
Jan  5 19:52:26 host sshd[8175]: input_userauth_request: invalid user testuser [preauth]
Jan  5 19:52:26 host sshd[8175]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 19:52:26 host sshd[8175]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.77.187.194
Jan  5 19:52:28 host sshd[8175]: Failed password for invalid user testuser from 115.77.187.194 port 55624 ssh2
Jan  5 19:52:29 host sshd[8175]: Received disconnect from 115.77.187.194 port 55624:11: Bye Bye [preauth]
Jan  5 19:52:29 host sshd[8175]: Disconnected from 115.77.187.194 port 55624 [preauth]
Jan  5 19:52:39 host sshd[8260]: User root from 45.232.244.5 not allowed because not listed in AllowUsers
Jan  5 19:52:39 host sshd[8260]: input_userauth_request: invalid user root [preauth]
Jan  5 19:52:39 host unix_chkpwd[8267]: password check failed for user (root)
Jan  5 19:52:39 host sshd[8260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.232.244.5  user=root
Jan  5 19:52:39 host sshd[8260]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 19:52:40 host sshd[8260]: Failed password for invalid user root from 45.232.244.5 port 42654 ssh2
Jan  5 19:55:29 host sshd[9256]: Invalid user pedro from 43.153.85.195 port 40640
Jan  5 19:55:29 host sshd[9256]: input_userauth_request: invalid user pedro [preauth]
Jan  5 19:55:29 host sshd[9256]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 19:55:29 host sshd[9256]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.85.195
Jan  5 19:55:31 host sshd[9256]: Failed password for invalid user pedro from 43.153.85.195 port 40640 ssh2
Jan  5 19:55:31 host sshd[9256]: Received disconnect from 43.153.85.195 port 40640:11: Bye Bye [preauth]
Jan  5 19:55:31 host sshd[9256]: Disconnected from 43.153.85.195 port 40640 [preauth]
Jan  5 19:56:42 host sshd[9716]: Invalid user ventas from 43.153.85.195 port 41016
Jan  5 19:56:42 host sshd[9716]: input_userauth_request: invalid user ventas [preauth]
Jan  5 19:56:42 host sshd[9716]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 19:56:42 host sshd[9716]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.85.195
Jan  5 19:56:44 host sshd[9716]: Failed password for invalid user ventas from 43.153.85.195 port 41016 ssh2
Jan  5 19:56:44 host sshd[9716]: Received disconnect from 43.153.85.195 port 41016:11: Bye Bye [preauth]
Jan  5 19:56:44 host sshd[9716]: Disconnected from 43.153.85.195 port 41016 [preauth]
Jan  5 20:00:24 host sshd[10958]: Invalid user default from 195.242.234.112 port 50735
Jan  5 20:00:24 host sshd[10958]: input_userauth_request: invalid user default [preauth]
Jan  5 20:00:24 host sshd[10958]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 20:00:24 host sshd[10958]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.242.234.112
Jan  5 20:00:26 host sshd[10958]: Failed password for invalid user default from 195.242.234.112 port 50735 ssh2
Jan  5 20:00:26 host sshd[10958]: Connection closed by 195.242.234.112 port 50735 [preauth]
Jan  5 20:06:42 host sshd[12284]: Invalid user myftp from 189.45.78.175 port 47986
Jan  5 20:06:42 host sshd[12284]: input_userauth_request: invalid user myftp [preauth]
Jan  5 20:06:42 host sshd[12284]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 20:06:42 host sshd[12284]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.45.78.175
Jan  5 20:06:43 host sshd[12284]: Failed password for invalid user myftp from 189.45.78.175 port 47986 ssh2
Jan  5 20:06:44 host sshd[12284]: Received disconnect from 189.45.78.175 port 47986:11: Bye Bye [preauth]
Jan  5 20:06:44 host sshd[12284]: Disconnected from 189.45.78.175 port 47986 [preauth]
Jan  5 20:11:39 host sshd[12950]: User root from 43.242.247.141 not allowed because not listed in AllowUsers
Jan  5 20:11:39 host sshd[12950]: input_userauth_request: invalid user root [preauth]
Jan  5 20:11:39 host unix_chkpwd[12952]: password check failed for user (root)
Jan  5 20:11:39 host sshd[12950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.242.247.141  user=root
Jan  5 20:11:39 host sshd[12950]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 20:11:42 host sshd[12950]: Failed password for invalid user root from 43.242.247.141 port 44652 ssh2
Jan  5 20:11:42 host sshd[12950]: Received disconnect from 43.242.247.141 port 44652:11: Bye Bye [preauth]
Jan  5 20:11:42 host sshd[12950]: Disconnected from 43.242.247.141 port 44652 [preauth]
Jan  5 20:12:34 host sshd[13078]: Invalid user test from 189.45.78.175 port 1990
Jan  5 20:12:34 host sshd[13078]: input_userauth_request: invalid user test [preauth]
Jan  5 20:12:34 host sshd[13078]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 20:12:34 host sshd[13078]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.45.78.175
Jan  5 20:12:36 host sshd[13078]: Failed password for invalid user test from 189.45.78.175 port 1990 ssh2
Jan  5 20:12:36 host sshd[13078]: Received disconnect from 189.45.78.175 port 1990:11: Bye Bye [preauth]
Jan  5 20:12:36 host sshd[13078]: Disconnected from 189.45.78.175 port 1990 [preauth]
Jan  5 20:13:54 host sshd[13314]: Invalid user userftp from 189.45.78.175 port 55015
Jan  5 20:13:54 host sshd[13314]: input_userauth_request: invalid user userftp [preauth]
Jan  5 20:13:54 host sshd[13314]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 20:13:54 host sshd[13314]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.45.78.175
Jan  5 20:13:56 host sshd[13314]: Failed password for invalid user userftp from 189.45.78.175 port 55015 ssh2
Jan  5 20:14:23 host sshd[13403]: Invalid user test from 43.242.247.141 port 50374
Jan  5 20:14:23 host sshd[13403]: input_userauth_request: invalid user test [preauth]
Jan  5 20:14:23 host sshd[13403]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 20:14:23 host sshd[13403]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.242.247.141
Jan  5 20:14:25 host sshd[13403]: Failed password for invalid user test from 43.242.247.141 port 50374 ssh2
Jan  5 20:14:25 host sshd[13403]: Received disconnect from 43.242.247.141 port 50374:11: Bye Bye [preauth]
Jan  5 20:14:25 host sshd[13403]: Disconnected from 43.242.247.141 port 50374 [preauth]
Jan  5 20:18:34 host sshd[13930]: User root from 201.172.191.247 not allowed because not listed in AllowUsers
Jan  5 20:18:34 host sshd[13930]: input_userauth_request: invalid user root [preauth]
Jan  5 20:18:34 host unix_chkpwd[13934]: password check failed for user (root)
Jan  5 20:18:34 host sshd[13930]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.172.191.247  user=root
Jan  5 20:18:34 host sshd[13930]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 20:18:36 host sshd[13930]: Failed password for invalid user root from 201.172.191.247 port 40098 ssh2
Jan  5 20:18:36 host sshd[13930]: Connection closed by 201.172.191.247 port 40098 [preauth]
Jan  5 20:20:12 host sshd[14234]: Invalid user ts3server from 172.174.232.89 port 54980
Jan  5 20:20:12 host sshd[14234]: input_userauth_request: invalid user ts3server [preauth]
Jan  5 20:20:12 host sshd[14234]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 20:20:12 host sshd[14234]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.174.232.89
Jan  5 20:20:14 host sshd[14234]: Failed password for invalid user ts3server from 172.174.232.89 port 54980 ssh2
Jan  5 20:20:14 host sshd[14234]: Received disconnect from 172.174.232.89 port 54980:11: Bye Bye [preauth]
Jan  5 20:20:14 host sshd[14234]: Disconnected from 172.174.232.89 port 54980 [preauth]
Jan  5 20:21:21 host sshd[14381]: User root from 182.75.216.74 not allowed because not listed in AllowUsers
Jan  5 20:21:21 host sshd[14381]: input_userauth_request: invalid user root [preauth]
Jan  5 20:21:21 host unix_chkpwd[14383]: password check failed for user (root)
Jan  5 20:21:21 host sshd[14381]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.75.216.74  user=root
Jan  5 20:21:21 host sshd[14381]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 20:21:23 host sshd[14381]: Failed password for invalid user root from 182.75.216.74 port 57595 ssh2
Jan  5 20:21:23 host sshd[14381]: Received disconnect from 182.75.216.74 port 57595:11: Bye Bye [preauth]
Jan  5 20:21:23 host sshd[14381]: Disconnected from 182.75.216.74 port 57595 [preauth]
Jan  5 20:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  5 20:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 20:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 20:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  5 20:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 20:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 20:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  5 20:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 20:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 20:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  5 20:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 20:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 20:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  5 20:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 20:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 20:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  5 20:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 20:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 20:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  5 20:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 20:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 20:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  5 20:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 20:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 20:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  5 20:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 20:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 20:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  5 20:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 20:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 20:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  5 20:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 20:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 20:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  5 20:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 20:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 20:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  5 20:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 20:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 20:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkapin user-2=woodpeck user-3=wwwkmaorg user-4=disposeat user-5=remysagr user-6=pmcresources user-7=wwwtestugo user-8=shalinijames user-9=vfmassets user-10=straightcurve user-11=wwwletsstalkfood user-12=wwwevmhonda user-13=bonifacegroup user-14=wwwnexidigital user-15=mrsclean user-16=kottayamcalldriv user-17=phmetals user-18=gifterman user-19=palco123 user-20=wwwkaretakers user-21=cochintaxi user-22=laundryboniface user-23=dartsimp user-24=a2zgroup user-25=wwwpmcresource user-26=ugotscom user-27=wwwrmswll user-28=keralaholi user-29=wwwresourcehunte user-30=travelboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  5 20:21:54 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  5 20:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 20:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 20:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  5 20:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 20:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 20:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-KJcrhrNjv9kdc5SJ.~
Jan  5 20:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 20:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 20:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-KJcrhrNjv9kdc5SJ.~'
Jan  5 20:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 20:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 20:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-KJcrhrNjv9kdc5SJ.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  5 20:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 20:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 20:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  5 20:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 20:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 20:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  5 20:21:54 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 20:21:54 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 20:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  5 20:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 20:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 20:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  5 20:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 20:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 20:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  5 20:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 20:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 20:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  5 20:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 20:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 20:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  5 20:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 20:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 20:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  5 20:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  5 20:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  5 20:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  5 20:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  5 20:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  5 20:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  5 20:21:59 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  5 20:22:01 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  5 20:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  5 20:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 20:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 20:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  5 20:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 20:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 20:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  5 20:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 20:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 20:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  5 20:22:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 20:22:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 20:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  5 20:22:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 20:22:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 20:22:24 host sshd[14695]: Invalid user guest from 119.92.70.82 port 42906
Jan  5 20:22:24 host sshd[14695]: input_userauth_request: invalid user guest [preauth]
Jan  5 20:22:24 host sshd[14695]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 20:22:24 host sshd[14695]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.92.70.82
Jan  5 20:22:27 host sshd[14695]: Failed password for invalid user guest from 119.92.70.82 port 42906 ssh2
Jan  5 20:22:27 host sshd[14695]: Received disconnect from 119.92.70.82 port 42906:11: Bye Bye [preauth]
Jan  5 20:22:27 host sshd[14695]: Disconnected from 119.92.70.82 port 42906 [preauth]
Jan  5 20:22:41 host sshd[14734]: Invalid user user from 176.102.38.41 port 54094
Jan  5 20:22:41 host sshd[14734]: input_userauth_request: invalid user user [preauth]
Jan  5 20:22:41 host sshd[14734]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 20:22:41 host sshd[14734]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.102.38.41
Jan  5 20:22:43 host sshd[14734]: Failed password for invalid user user from 176.102.38.41 port 54094 ssh2
Jan  5 20:22:43 host sshd[14734]: Received disconnect from 176.102.38.41 port 54094:11: Bye Bye [preauth]
Jan  5 20:22:43 host sshd[14734]: Disconnected from 176.102.38.41 port 54094 [preauth]
Jan  5 20:24:48 host sshd[15083]: Invalid user xq from 206.189.233.82 port 46728
Jan  5 20:24:48 host sshd[15083]: input_userauth_request: invalid user xq [preauth]
Jan  5 20:24:48 host sshd[15083]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 20:24:48 host sshd[15083]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.233.82
Jan  5 20:24:50 host sshd[15083]: Failed password for invalid user xq from 206.189.233.82 port 46728 ssh2
Jan  5 20:24:50 host sshd[15083]: Received disconnect from 206.189.233.82 port 46728:11: Bye Bye [preauth]
Jan  5 20:24:50 host sshd[15083]: Disconnected from 206.189.233.82 port 46728 [preauth]
Jan  5 20:26:03 host sshd[15244]: Invalid user dst from 172.174.232.89 port 41656
Jan  5 20:26:03 host sshd[15244]: input_userauth_request: invalid user dst [preauth]
Jan  5 20:26:03 host sshd[15244]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 20:26:03 host sshd[15244]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.174.232.89
Jan  5 20:26:05 host sshd[15244]: Failed password for invalid user dst from 172.174.232.89 port 41656 ssh2
Jan  5 20:26:05 host sshd[15244]: Received disconnect from 172.174.232.89 port 41656:11: Bye Bye [preauth]
Jan  5 20:26:05 host sshd[15244]: Disconnected from 172.174.232.89 port 41656 [preauth]
Jan  5 20:26:22 host sshd[15275]: User root from 182.75.216.74 not allowed because not listed in AllowUsers
Jan  5 20:26:22 host sshd[15275]: input_userauth_request: invalid user root [preauth]
Jan  5 20:26:22 host unix_chkpwd[15278]: password check failed for user (root)
Jan  5 20:26:22 host sshd[15275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.75.216.74  user=root
Jan  5 20:26:22 host sshd[15275]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 20:26:24 host sshd[15275]: Failed password for invalid user root from 182.75.216.74 port 17179 ssh2
Jan  5 20:26:24 host sshd[15275]: Received disconnect from 182.75.216.74 port 17179:11: Bye Bye [preauth]
Jan  5 20:26:24 host sshd[15275]: Disconnected from 182.75.216.74 port 17179 [preauth]
Jan  5 20:27:04 host sshd[15396]: Invalid user sftp from 117.103.2.146 port 52260
Jan  5 20:27:04 host sshd[15396]: input_userauth_request: invalid user sftp [preauth]
Jan  5 20:27:04 host sshd[15396]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 20:27:04 host sshd[15396]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.103.2.146
Jan  5 20:27:06 host sshd[15396]: Failed password for invalid user sftp from 117.103.2.146 port 52260 ssh2
Jan  5 20:27:07 host sshd[15396]: Received disconnect from 117.103.2.146 port 52260:11: Bye Bye [preauth]
Jan  5 20:27:07 host sshd[15396]: Disconnected from 117.103.2.146 port 52260 [preauth]
Jan  5 20:27:07 host sshd[15401]: Invalid user user from 172.174.232.89 port 40268
Jan  5 20:27:07 host sshd[15401]: input_userauth_request: invalid user user [preauth]
Jan  5 20:27:07 host sshd[15401]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 20:27:07 host sshd[15401]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.174.232.89
Jan  5 20:27:09 host sshd[15401]: Failed password for invalid user user from 172.174.232.89 port 40268 ssh2
Jan  5 20:27:09 host sshd[15401]: Received disconnect from 172.174.232.89 port 40268:11: Bye Bye [preauth]
Jan  5 20:27:09 host sshd[15401]: Disconnected from 172.174.232.89 port 40268 [preauth]
Jan  5 20:27:15 host sshd[15450]: User mysql from 119.92.70.82 not allowed because not listed in AllowUsers
Jan  5 20:27:15 host sshd[15450]: input_userauth_request: invalid user mysql [preauth]
Jan  5 20:27:15 host unix_chkpwd[15454]: password check failed for user (mysql)
Jan  5 20:27:15 host sshd[15450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.92.70.82  user=mysql
Jan  5 20:27:15 host sshd[15450]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "mysql"
Jan  5 20:27:17 host sshd[15450]: Failed password for invalid user mysql from 119.92.70.82 port 33046 ssh2
Jan  5 20:27:17 host sshd[15450]: Received disconnect from 119.92.70.82 port 33046:11: Bye Bye [preauth]
Jan  5 20:27:17 host sshd[15450]: Disconnected from 119.92.70.82 port 33046 [preauth]
Jan  5 20:28:08 host sshd[15599]: Invalid user casa from 206.189.233.82 port 54836
Jan  5 20:28:08 host sshd[15599]: input_userauth_request: invalid user casa [preauth]
Jan  5 20:28:08 host sshd[15599]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 20:28:08 host sshd[15599]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.233.82
Jan  5 20:28:10 host sshd[15599]: Failed password for invalid user casa from 206.189.233.82 port 54836 ssh2
Jan  5 20:28:11 host sshd[15599]: Received disconnect from 206.189.233.82 port 54836:11: Bye Bye [preauth]
Jan  5 20:28:11 host sshd[15599]: Disconnected from 206.189.233.82 port 54836 [preauth]
Jan  5 20:28:30 host sshd[15647]: Invalid user hadoop from 176.102.38.41 port 45586
Jan  5 20:28:30 host sshd[15647]: input_userauth_request: invalid user hadoop [preauth]
Jan  5 20:28:30 host sshd[15647]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 20:28:30 host sshd[15647]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.102.38.41
Jan  5 20:28:32 host sshd[15647]: Failed password for invalid user hadoop from 176.102.38.41 port 45586 ssh2
Jan  5 20:28:32 host sshd[15647]: Received disconnect from 176.102.38.41 port 45586:11: Bye Bye [preauth]
Jan  5 20:28:32 host sshd[15647]: Disconnected from 176.102.38.41 port 45586 [preauth]
Jan  5 20:29:19 host sshd[15710]: Invalid user admin from 206.189.233.82 port 49998
Jan  5 20:29:19 host sshd[15710]: input_userauth_request: invalid user admin [preauth]
Jan  5 20:29:19 host sshd[15710]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 20:29:19 host sshd[15710]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.233.82
Jan  5 20:29:22 host sshd[15710]: Failed password for invalid user admin from 206.189.233.82 port 49998 ssh2
Jan  5 20:29:22 host sshd[15714]: User mysql from 117.103.2.146 not allowed because not listed in AllowUsers
Jan  5 20:29:22 host sshd[15714]: input_userauth_request: invalid user mysql [preauth]
Jan  5 20:29:22 host unix_chkpwd[15802]: password check failed for user (mysql)
Jan  5 20:29:22 host sshd[15714]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.103.2.146  user=mysql
Jan  5 20:29:22 host sshd[15714]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "mysql"
Jan  5 20:29:24 host sshd[15714]: Failed password for invalid user mysql from 117.103.2.146 port 53296 ssh2
Jan  5 20:29:25 host sshd[15714]: Received disconnect from 117.103.2.146 port 53296:11: Bye Bye [preauth]
Jan  5 20:29:25 host sshd[15714]: Disconnected from 117.103.2.146 port 53296 [preauth]
Jan  5 20:29:51 host sshd[15934]: Invalid user jeff from 176.102.38.41 port 41582
Jan  5 20:29:51 host sshd[15934]: input_userauth_request: invalid user jeff [preauth]
Jan  5 20:29:51 host sshd[15934]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 20:29:51 host sshd[15934]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.102.38.41
Jan  5 20:29:53 host sshd[15934]: Failed password for invalid user jeff from 176.102.38.41 port 41582 ssh2
Jan  5 20:29:53 host sshd[15934]: Received disconnect from 176.102.38.41 port 41582:11: Bye Bye [preauth]
Jan  5 20:29:53 host sshd[15934]: Disconnected from 176.102.38.41 port 41582 [preauth]
Jan  5 20:36:15 host sshd[16809]: Invalid user admin from 93.172.12.123 port 46460
Jan  5 20:36:15 host sshd[16809]: input_userauth_request: invalid user admin [preauth]
Jan  5 20:36:15 host sshd[16809]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 20:36:15 host sshd[16809]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.172.12.123
Jan  5 20:36:18 host sshd[16809]: Failed password for invalid user admin from 93.172.12.123 port 46460 ssh2
Jan  5 20:36:18 host sshd[16809]: Connection closed by 93.172.12.123 port 46460 [preauth]
Jan  5 20:45:19 host sshd[18076]: Invalid user ae from 194.110.203.109 port 40424
Jan  5 20:45:19 host sshd[18076]: input_userauth_request: invalid user ae [preauth]
Jan  5 20:45:19 host sshd[18076]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 20:45:19 host sshd[18076]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109
Jan  5 20:45:21 host sshd[18076]: Failed password for invalid user ae from 194.110.203.109 port 40424 ssh2
Jan  5 20:45:25 host sshd[18076]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 20:45:26 host sshd[18076]: Failed password for invalid user ae from 194.110.203.109 port 40424 ssh2
Jan  5 20:45:30 host sshd[18076]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 20:45:31 host sshd[18076]: Failed password for invalid user ae from 194.110.203.109 port 40424 ssh2
Jan  5 20:45:34 host sshd[18076]: Connection closed by 194.110.203.109 port 40424 [preauth]
Jan  5 20:45:34 host sshd[18076]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109
Jan  5 20:54:00 host sshd[19226]: Invalid user admin from 143.110.209.158 port 32874
Jan  5 20:54:00 host sshd[19226]: input_userauth_request: invalid user admin [preauth]
Jan  5 20:54:00 host sshd[19226]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 20:54:00 host sshd[19226]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.209.158
Jan  5 20:54:02 host sshd[19226]: Failed password for invalid user admin from 143.110.209.158 port 32874 ssh2
Jan  5 20:54:03 host sshd[19226]: Connection closed by 143.110.209.158 port 32874 [preauth]
Jan  5 21:09:29 host sshd[21294]: Did not receive identification string from 46.101.97.107 port 61000
Jan  5 21:10:06 host sshd[21379]: Invalid user cups-pk-helper from 104.244.74.6 port 55392
Jan  5 21:10:06 host sshd[21379]: input_userauth_request: invalid user cups-pk-helper [preauth]
Jan  5 21:10:06 host sshd[21379]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 21:10:06 host sshd[21379]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6
Jan  5 21:10:07 host sshd[21379]: Failed password for invalid user cups-pk-helper from 104.244.74.6 port 55392 ssh2
Jan  5 21:10:08 host sshd[21379]: Connection closed by 104.244.74.6 port 55392 [preauth]
Jan  5 21:11:44 host sshd[21579]: Invalid user engineer from 59.48.40.6 port 38283
Jan  5 21:11:44 host sshd[21579]: input_userauth_request: invalid user engineer [preauth]
Jan  5 21:11:45 host sshd[21579]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 21:11:45 host sshd[21579]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.48.40.6
Jan  5 21:11:47 host sshd[21579]: Failed password for invalid user engineer from 59.48.40.6 port 38283 ssh2
Jan  5 21:11:47 host sshd[21579]: Connection closed by 59.48.40.6 port 38283 [preauth]
Jan  5 21:14:07 host sshd[21946]: Invalid user cups-pk-helper from 104.244.74.6 port 40724
Jan  5 21:14:07 host sshd[21946]: input_userauth_request: invalid user cups-pk-helper [preauth]
Jan  5 21:14:07 host sshd[21946]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 21:14:08 host sshd[21946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6
Jan  5 21:14:10 host sshd[21946]: Failed password for invalid user cups-pk-helper from 104.244.74.6 port 40724 ssh2
Jan  5 21:14:10 host sshd[21946]: Connection closed by 104.244.74.6 port 40724 [preauth]
Jan  5 21:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  5 21:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 21:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 21:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  5 21:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 21:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 21:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  5 21:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 21:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 21:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  5 21:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 21:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 21:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  5 21:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 21:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 21:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  5 21:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 21:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 21:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  5 21:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 21:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 21:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  5 21:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 21:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 21:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  5 21:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 21:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 21:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  5 21:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 21:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 21:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  5 21:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 21:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 21:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  5 21:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 21:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 21:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  5 21:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 21:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 21:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=keralaholi user-2=wwwresourcehunte user-3=wwwrmswll user-4=ugotscom user-5=travelboniface user-6=wwwpmcresource user-7=laundryboniface user-8=a2zgroup user-9=dartsimp user-10=wwwkaretakers user-11=cochintaxi user-12=mrsclean user-13=wwwnexidigital user-14=palco123 user-15=gifterman user-16=phmetals user-17=kottayamcalldriv user-18=straightcurve user-19=wwwletsstalkfood user-20=bonifacegroup user-21=wwwevmhonda user-22=pmcresources user-23=vfmassets user-24=shalinijames user-25=wwwtestugo user-26=woodpeck user-27=wwwkapin user-28=disposeat user-29=remysagr user-30=wwwkmaorg feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  5 21:21:54 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  5 21:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 21:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 21:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  5 21:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 21:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 21:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-puk4BASlg6dJGT5g.~
Jan  5 21:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 21:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 21:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-puk4BASlg6dJGT5g.~'
Jan  5 21:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 21:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 21:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-puk4BASlg6dJGT5g.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  5 21:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 21:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 21:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  5 21:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 21:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 21:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  5 21:21:54 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 21:21:54 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 21:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  5 21:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 21:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 21:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  5 21:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 21:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 21:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  5 21:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 21:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 21:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  5 21:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 21:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 21:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  5 21:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 21:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 21:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  5 21:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  5 21:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  5 21:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  5 21:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  5 21:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  5 21:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  5 21:21:59 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  5 21:22:00 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  5 21:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  5 21:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 21:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 21:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  5 21:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 21:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 21:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  5 21:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 21:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 21:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  5 21:22:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 21:22:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 21:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  5 21:22:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 21:22:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 21:29:57 host sshd[24189]: Invalid user admin from 183.230.226.124 port 36970
Jan  5 21:29:57 host sshd[24189]: input_userauth_request: invalid user admin [preauth]
Jan  5 21:29:58 host sshd[24189]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 21:29:58 host sshd[24189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.230.226.124
Jan  5 21:29:59 host sshd[24189]: Failed password for invalid user admin from 183.230.226.124 port 36970 ssh2
Jan  5 21:30:00 host sshd[24189]: Connection closed by 183.230.226.124 port 36970 [preauth]
Jan  5 21:43:57 host sshd[26095]: Invalid user cups-pk-helper from 104.244.74.6 port 45544
Jan  5 21:43:57 host sshd[26095]: input_userauth_request: invalid user cups-pk-helper [preauth]
Jan  5 21:43:57 host sshd[26095]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 21:43:57 host sshd[26095]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6
Jan  5 21:43:59 host sshd[26095]: Failed password for invalid user cups-pk-helper from 104.244.74.6 port 45544 ssh2
Jan  5 21:47:41 host sshd[26656]: Invalid user admin from 162.247.146.102 port 56781
Jan  5 21:47:41 host sshd[26656]: input_userauth_request: invalid user admin [preauth]
Jan  5 21:47:42 host sshd[26656]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 21:47:42 host sshd[26656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.247.146.102
Jan  5 21:47:44 host sshd[26656]: Failed password for invalid user admin from 162.247.146.102 port 56781 ssh2
Jan  5 21:47:44 host sshd[26656]: Connection closed by 162.247.146.102 port 56781 [preauth]
Jan  5 21:49:08 host sshd[26797]: Did not receive identification string from 124.65.241.66 port 38175
Jan  5 21:52:41 host sshd[27292]: Connection closed by 167.94.145.59 port 35616 [preauth]
Jan  5 22:06:19 host sshd[29169]: User root from 189.215.84.6 not allowed because not listed in AllowUsers
Jan  5 22:06:19 host sshd[29169]: input_userauth_request: invalid user root [preauth]
Jan  5 22:06:20 host unix_chkpwd[29175]: password check failed for user (root)
Jan  5 22:06:20 host sshd[29169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.215.84.6  user=root
Jan  5 22:06:20 host sshd[29169]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 22:06:22 host sshd[29169]: Failed password for invalid user root from 189.215.84.6 port 49511 ssh2
Jan  5 22:06:22 host sshd[29169]: Connection closed by 189.215.84.6 port 49511 [preauth]
Jan  5 22:07:35 host sshd[29419]: Invalid user r from 185.133.225.62 port 49142
Jan  5 22:07:35 host sshd[29419]: input_userauth_request: invalid user r [preauth]
Jan  5 22:07:35 host sshd[29419]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 22:07:35 host sshd[29419]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.133.225.62
Jan  5 22:07:36 host sshd[29419]: Failed password for invalid user r from 185.133.225.62 port 49142 ssh2
Jan  5 22:07:36 host sshd[29419]: Received disconnect from 185.133.225.62 port 49142:11: Bye Bye [preauth]
Jan  5 22:07:36 host sshd[29419]: Disconnected from 185.133.225.62 port 49142 [preauth]
Jan  5 22:11:01 host sshd[29841]: Invalid user dk from 187.243.248.114 port 44852
Jan  5 22:11:01 host sshd[29841]: input_userauth_request: invalid user dk [preauth]
Jan  5 22:11:01 host sshd[29841]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 22:11:01 host sshd[29841]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.243.248.114
Jan  5 22:11:03 host sshd[29841]: Failed password for invalid user dk from 187.243.248.114 port 44852 ssh2
Jan  5 22:11:03 host sshd[29841]: Received disconnect from 187.243.248.114 port 44852:11: Bye Bye [preauth]
Jan  5 22:11:03 host sshd[29841]: Disconnected from 187.243.248.114 port 44852 [preauth]
Jan  5 22:11:52 host sshd[29936]: User root from 139.59.80.164 not allowed because not listed in AllowUsers
Jan  5 22:11:52 host sshd[29936]: input_userauth_request: invalid user root [preauth]
Jan  5 22:11:52 host unix_chkpwd[29938]: password check failed for user (root)
Jan  5 22:11:52 host sshd[29936]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.80.164  user=root
Jan  5 22:11:52 host sshd[29936]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 22:11:54 host sshd[29936]: Failed password for invalid user root from 139.59.80.164 port 58048 ssh2
Jan  5 22:11:54 host sshd[29936]: Received disconnect from 139.59.80.164 port 58048:11: Bye Bye [preauth]
Jan  5 22:11:54 host sshd[29936]: Disconnected from 139.59.80.164 port 58048 [preauth]
Jan  5 22:14:06 host sshd[30288]: User root from 185.133.225.62 not allowed because not listed in AllowUsers
Jan  5 22:14:06 host sshd[30288]: input_userauth_request: invalid user root [preauth]
Jan  5 22:14:06 host unix_chkpwd[30293]: password check failed for user (root)
Jan  5 22:14:06 host sshd[30288]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.133.225.62  user=root
Jan  5 22:14:06 host sshd[30288]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 22:14:08 host sshd[30288]: Failed password for invalid user root from 185.133.225.62 port 51912 ssh2
Jan  5 22:14:08 host sshd[30288]: Received disconnect from 185.133.225.62 port 51912:11: Bye Bye [preauth]
Jan  5 22:14:08 host sshd[30288]: Disconnected from 185.133.225.62 port 51912 [preauth]
Jan  5 22:14:46 host sshd[30386]: Invalid user d from 139.59.80.164 port 44452
Jan  5 22:14:46 host sshd[30386]: input_userauth_request: invalid user d [preauth]
Jan  5 22:14:46 host sshd[30386]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 22:14:46 host sshd[30386]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.80.164
Jan  5 22:14:47 host sshd[30386]: Failed password for invalid user d from 139.59.80.164 port 44452 ssh2
Jan  5 22:14:47 host sshd[30386]: Received disconnect from 139.59.80.164 port 44452:11: Bye Bye [preauth]
Jan  5 22:14:47 host sshd[30386]: Disconnected from 139.59.80.164 port 44452 [preauth]
Jan  5 22:15:02 host sshd[30435]: Invalid user isabel from 187.243.248.114 port 42826
Jan  5 22:15:02 host sshd[30435]: input_userauth_request: invalid user isabel [preauth]
Jan  5 22:15:02 host sshd[30435]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 22:15:02 host sshd[30435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.243.248.114
Jan  5 22:15:04 host sshd[30435]: Failed password for invalid user isabel from 187.243.248.114 port 42826 ssh2
Jan  5 22:15:05 host sshd[30435]: Received disconnect from 187.243.248.114 port 42826:11: Bye Bye [preauth]
Jan  5 22:15:05 host sshd[30435]: Disconnected from 187.243.248.114 port 42826 [preauth]
Jan  5 22:17:03 host sshd[30703]: User root from 187.243.248.114 not allowed because not listed in AllowUsers
Jan  5 22:17:03 host sshd[30703]: input_userauth_request: invalid user root [preauth]
Jan  5 22:17:03 host unix_chkpwd[30709]: password check failed for user (root)
Jan  5 22:17:03 host sshd[30703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.243.248.114  user=root
Jan  5 22:17:03 host sshd[30703]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 22:17:05 host sshd[30703]: Failed password for invalid user root from 187.243.248.114 port 53348 ssh2
Jan  5 22:18:04 host sshd[30938]: User root from 54.169.52.48 not allowed because not listed in AllowUsers
Jan  5 22:18:04 host sshd[30938]: input_userauth_request: invalid user root [preauth]
Jan  5 22:18:04 host unix_chkpwd[30941]: password check failed for user (root)
Jan  5 22:18:04 host sshd[30938]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.169.52.48  user=root
Jan  5 22:18:04 host sshd[30938]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 22:18:06 host sshd[30938]: Failed password for invalid user root from 54.169.52.48 port 33054 ssh2
Jan  5 22:18:06 host sshd[30938]: Received disconnect from 54.169.52.48 port 33054:11: Bye Bye [preauth]
Jan  5 22:18:06 host sshd[30938]: Disconnected from 54.169.52.48 port 33054 [preauth]
Jan  5 22:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  5 22:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 22:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 22:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  5 22:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 22:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 22:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  5 22:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 22:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 22:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  5 22:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 22:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 22:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  5 22:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 22:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 22:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  5 22:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 22:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 22:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  5 22:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 22:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 22:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  5 22:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 22:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 22:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  5 22:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 22:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 22:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  5 22:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 22:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 22:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  5 22:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 22:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 22:22:30 host sshd[31509]: Invalid user d from 54.169.52.48 port 47890
Jan  5 22:22:30 host sshd[31509]: input_userauth_request: invalid user d [preauth]
Jan  5 22:22:30 host sshd[31509]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 22:22:30 host sshd[31509]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.169.52.48
Jan  5 22:22:32 host sshd[31509]: Failed password for invalid user d from 54.169.52.48 port 47890 ssh2
Jan  5 22:22:33 host sshd[31509]: Received disconnect from 54.169.52.48 port 47890:11: Bye Bye [preauth]
Jan  5 22:22:33 host sshd[31509]: Disconnected from 54.169.52.48 port 47890 [preauth]
Jan  5 22:22:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  5 22:22:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 22:22:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 22:22:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  5 22:22:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 22:22:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 22:22:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=cochintaxi user-2=wwwkaretakers user-3=laundryboniface user-4=a2zgroup user-5=dartsimp user-6=wwwpmcresource user-7=keralaholi user-8=wwwresourcehunte user-9=wwwrmswll user-10=ugotscom user-11=travelboniface user-12=wwwkapin user-13=woodpeck user-14=disposeat user-15=remysagr user-16=wwwkmaorg user-17=pmcresources user-18=vfmassets user-19=shalinijames user-20=wwwtestugo user-21=straightcurve user-22=wwwletsstalkfood user-23=bonifacegroup user-24=wwwevmhonda user-25=wwwnexidigital user-26=mrsclean user-27=palco123 user-28=gifterman user-29=kottayamcalldriv user-30=phmetals feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  5 22:22:52 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  5 22:22:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 22:22:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 22:22:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  5 22:22:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 22:22:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 22:22:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-YB9QxcYGBTcD8XCb.~
Jan  5 22:22:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 22:22:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 22:22:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-YB9QxcYGBTcD8XCb.~'
Jan  5 22:22:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 22:22:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 22:22:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-YB9QxcYGBTcD8XCb.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  5 22:22:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 22:22:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 22:22:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  5 22:22:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 22:22:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 22:22:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  5 22:22:53 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 22:22:53 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 22:22:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  5 22:22:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 22:22:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 22:22:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  5 22:22:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 22:22:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 22:22:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  5 22:22:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 22:22:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 22:22:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  5 22:22:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 22:22:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 22:22:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  5 22:22:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 22:22:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 22:22:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  5 22:22:54 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  5 22:22:55 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  5 22:22:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  5 22:22:55 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  5 22:23:02 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  5 22:23:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  5 22:23:02 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  5 22:23:04 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  5 22:23:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  5 22:23:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 22:23:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 22:23:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  5 22:23:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 22:23:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 22:23:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  5 22:23:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 22:23:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 22:23:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  5 22:23:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 22:23:15 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 22:23:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  5 22:23:15 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 22:23:19 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 22:24:58 host sshd[32032]: Invalid user ftpuser from 126.90.179.207 port 4702
Jan  5 22:24:58 host sshd[32032]: input_userauth_request: invalid user ftpuser [preauth]
Jan  5 22:24:59 host sshd[32032]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 22:24:59 host sshd[32032]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=126.90.179.207
Jan  5 22:25:01 host sshd[32032]: Failed password for invalid user ftpuser from 126.90.179.207 port 4702 ssh2
Jan  5 22:25:01 host sshd[32032]: Connection closed by 126.90.179.207 port 4702 [preauth]
Jan  5 22:34:39 host sshd[692]: Invalid user steam from 27.254.47.59 port 52423
Jan  5 22:34:39 host sshd[692]: input_userauth_request: invalid user steam [preauth]
Jan  5 22:34:39 host sshd[692]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 22:34:39 host sshd[692]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.254.47.59
Jan  5 22:34:42 host sshd[692]: Failed password for invalid user steam from 27.254.47.59 port 52423 ssh2
Jan  5 22:34:42 host sshd[692]: Received disconnect from 27.254.47.59 port 52423:11: Bye Bye [preauth]
Jan  5 22:34:42 host sshd[692]: Disconnected from 27.254.47.59 port 52423 [preauth]
Jan  5 22:43:18 host sshd[1975]: Invalid user uucp from 45.151.123.107 port 40738
Jan  5 22:43:18 host sshd[1975]: input_userauth_request: invalid user uucp [preauth]
Jan  5 22:43:18 host sshd[1975]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 22:43:18 host sshd[1975]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.151.123.107
Jan  5 22:43:20 host sshd[1975]: Failed password for invalid user uucp from 45.151.123.107 port 40738 ssh2
Jan  5 22:43:20 host sshd[1975]: Connection closed by 45.151.123.107 port 40738 [preauth]
Jan  5 22:50:38 host sshd[2967]: Invalid user justin from 107.189.30.59 port 56200
Jan  5 22:50:38 host sshd[2967]: input_userauth_request: invalid user justin [preauth]
Jan  5 22:50:38 host sshd[2967]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 22:50:38 host sshd[2967]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59
Jan  5 22:50:41 host sshd[2967]: Failed password for invalid user justin from 107.189.30.59 port 56200 ssh2
Jan  5 22:50:42 host sshd[2967]: Connection closed by 107.189.30.59 port 56200 [preauth]
Jan  5 23:00:02 host sshd[4146]: Connection closed by 167.94.146.58 port 37542 [preauth]
Jan  5 23:03:09 host sshd[4739]: Invalid user af from 194.110.203.109 port 55218
Jan  5 23:03:09 host sshd[4739]: input_userauth_request: invalid user af [preauth]
Jan  5 23:03:09 host sshd[4739]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 23:03:09 host sshd[4739]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109
Jan  5 23:03:11 host sshd[4739]: Failed password for invalid user af from 194.110.203.109 port 55218 ssh2
Jan  5 23:03:14 host sshd[4739]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 23:03:16 host sshd[4739]: Failed password for invalid user af from 194.110.203.109 port 55218 ssh2
Jan  5 23:03:19 host sshd[4739]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 23:03:20 host sshd[4739]: Failed password for invalid user af from 194.110.203.109 port 55218 ssh2
Jan  5 23:03:23 host sshd[4739]: Connection closed by 194.110.203.109 port 55218 [preauth]
Jan  5 23:03:23 host sshd[4739]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109
Jan  5 23:07:49 host sshd[5444]: Did not receive identification string from 124.65.241.66 port 49961
Jan  5 23:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  5 23:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 23:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 23:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  5 23:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 23:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 23:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  5 23:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 23:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 23:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  5 23:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 23:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 23:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  5 23:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 23:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 23:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  5 23:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 23:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 23:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  5 23:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 23:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 23:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  5 23:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 23:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 23:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  5 23:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 23:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 23:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  5 23:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 23:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 23:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  5 23:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 23:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 23:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  5 23:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 23:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 23:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  5 23:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 23:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 23:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=disposeat user-2=remysagr user-3=wwwkmaorg user-4=wwwkapin user-5=woodpeck user-6=shalinijames user-7=wwwtestugo user-8=vfmassets user-9=pmcresources user-10=wwwevmhonda user-11=bonifacegroup user-12=wwwletsstalkfood user-13=straightcurve user-14=kottayamcalldriv user-15=phmetals user-16=palco123 user-17=gifterman user-18=mrsclean user-19=wwwnexidigital user-20=wwwkaretakers user-21=cochintaxi user-22=a2zgroup user-23=dartsimp user-24=laundryboniface user-25=wwwpmcresource user-26=travelboniface user-27=ugotscom user-28=keralaholi user-29=wwwresourcehunte user-30=wwwrmswll feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  5 23:21:54 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  5 23:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 23:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 23:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  5 23:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 23:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 23:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Evh3OniL3dzROJwm.~
Jan  5 23:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 23:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 23:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Evh3OniL3dzROJwm.~'
Jan  5 23:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 23:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 23:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Evh3OniL3dzROJwm.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  5 23:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 23:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 23:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  5 23:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 23:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 23:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  5 23:21:55 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 23:21:55 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 23:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  5 23:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 23:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 23:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  5 23:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 23:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 23:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  5 23:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 23:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 23:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  5 23:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 23:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 23:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  5 23:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  5 23:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  5 23:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  5 23:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  5 23:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  5 23:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  5 23:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  5 23:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  5 23:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  5 23:21:59 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  5 23:22:01 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  5 23:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  5 23:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 23:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 23:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  5 23:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 23:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 23:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  5 23:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  5 23:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  5 23:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  5 23:22:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 23:22:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 23:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  5 23:22:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  5 23:22:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  5 23:23:01 host sshd[7891]: User root from 64.227.140.231 not allowed because not listed in AllowUsers
Jan  5 23:23:01 host sshd[7891]: input_userauth_request: invalid user root [preauth]
Jan  5 23:23:01 host unix_chkpwd[7893]: password check failed for user (root)
Jan  5 23:23:01 host sshd[7891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.140.231  user=root
Jan  5 23:23:01 host sshd[7891]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 23:23:03 host sshd[7891]: Failed password for invalid user root from 64.227.140.231 port 59100 ssh2
Jan  5 23:23:03 host sshd[7891]: Received disconnect from 64.227.140.231 port 59100:11: Bye Bye [preauth]
Jan  5 23:23:03 host sshd[7891]: Disconnected from 64.227.140.231 port 59100 [preauth]
Jan  5 23:24:42 host sshd[8082]: Invalid user bharath from 43.159.49.49 port 46278
Jan  5 23:24:42 host sshd[8082]: input_userauth_request: invalid user bharath [preauth]
Jan  5 23:24:42 host sshd[8082]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 23:24:42 host sshd[8082]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.159.49.49
Jan  5 23:24:44 host sshd[8082]: Failed password for invalid user bharath from 43.159.49.49 port 46278 ssh2
Jan  5 23:24:44 host sshd[8082]: Received disconnect from 43.159.49.49 port 46278:11: Bye Bye [preauth]
Jan  5 23:24:44 host sshd[8082]: Disconnected from 43.159.49.49 port 46278 [preauth]
Jan  5 23:25:05 host sshd[8129]: Invalid user ems from 89.22.67.66 port 59348
Jan  5 23:25:05 host sshd[8129]: input_userauth_request: invalid user ems [preauth]
Jan  5 23:25:05 host sshd[8129]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 23:25:05 host sshd[8129]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.22.67.66
Jan  5 23:25:07 host sshd[8129]: Failed password for invalid user ems from 89.22.67.66 port 59348 ssh2
Jan  5 23:25:07 host sshd[8129]: Received disconnect from 89.22.67.66 port 59348:11: Bye Bye [preauth]
Jan  5 23:25:07 host sshd[8129]: Disconnected from 89.22.67.66 port 59348 [preauth]
Jan  5 23:25:35 host sshd[8192]: Invalid user admin from 180.250.247.45 port 53282
Jan  5 23:25:35 host sshd[8192]: input_userauth_request: invalid user admin [preauth]
Jan  5 23:25:35 host sshd[8192]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 23:25:35 host sshd[8192]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.247.45
Jan  5 23:25:37 host sshd[8192]: Failed password for invalid user admin from 180.250.247.45 port 53282 ssh2
Jan  5 23:25:37 host sshd[8192]: Received disconnect from 180.250.247.45 port 53282:11: Bye Bye [preauth]
Jan  5 23:25:37 host sshd[8192]: Disconnected from 180.250.247.45 port 53282 [preauth]
Jan  5 23:26:21 host sshd[8278]: Invalid user support from 43.131.27.221 port 57486
Jan  5 23:26:21 host sshd[8278]: input_userauth_request: invalid user support [preauth]
Jan  5 23:26:21 host sshd[8278]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 23:26:21 host sshd[8278]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.131.27.221
Jan  5 23:26:24 host sshd[8278]: Failed password for invalid user support from 43.131.27.221 port 57486 ssh2
Jan  5 23:26:24 host sshd[8278]: Received disconnect from 43.131.27.221 port 57486:11: Bye Bye [preauth]
Jan  5 23:26:24 host sshd[8278]: Disconnected from 43.131.27.221 port 57486 [preauth]
Jan  5 23:26:36 host sshd[8325]: User root from 165.227.90.242 not allowed because not listed in AllowUsers
Jan  5 23:26:36 host sshd[8325]: input_userauth_request: invalid user root [preauth]
Jan  5 23:26:36 host unix_chkpwd[8328]: password check failed for user (root)
Jan  5 23:26:36 host sshd[8325]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.90.242  user=root
Jan  5 23:26:36 host sshd[8325]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 23:26:38 host sshd[8325]: Failed password for invalid user root from 165.227.90.242 port 56396 ssh2
Jan  5 23:26:38 host sshd[8325]: Received disconnect from 165.227.90.242 port 56396:11: Bye Bye [preauth]
Jan  5 23:26:38 host sshd[8325]: Disconnected from 165.227.90.242 port 56396 [preauth]
Jan  5 23:27:04 host sshd[8393]: User root from 84.54.74.130 not allowed because not listed in AllowUsers
Jan  5 23:27:04 host sshd[8393]: input_userauth_request: invalid user root [preauth]
Jan  5 23:27:04 host unix_chkpwd[8399]: password check failed for user (root)
Jan  5 23:27:04 host sshd[8393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.54.74.130  user=root
Jan  5 23:27:04 host sshd[8393]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 23:27:06 host sshd[8393]: Failed password for invalid user root from 84.54.74.130 port 36948 ssh2
Jan  5 23:27:06 host sshd[8393]: Received disconnect from 84.54.74.130 port 36948:11: Bye Bye [preauth]
Jan  5 23:27:06 host sshd[8393]: Disconnected from 84.54.74.130 port 36948 [preauth]
Jan  5 23:27:59 host sshd[8608]: User root from 64.227.140.231 not allowed because not listed in AllowUsers
Jan  5 23:27:59 host sshd[8608]: input_userauth_request: invalid user root [preauth]
Jan  5 23:27:59 host unix_chkpwd[8610]: password check failed for user (root)
Jan  5 23:27:59 host sshd[8608]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.140.231  user=root
Jan  5 23:27:59 host sshd[8608]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 23:28:01 host sshd[8608]: Failed password for invalid user root from 64.227.140.231 port 59288 ssh2
Jan  5 23:28:01 host sshd[8608]: Received disconnect from 64.227.140.231 port 59288:11: Bye Bye [preauth]
Jan  5 23:28:01 host sshd[8608]: Disconnected from 64.227.140.231 port 59288 [preauth]
Jan  5 23:28:22 host sshd[8685]: Invalid user userftp from 43.131.27.221 port 33926
Jan  5 23:28:22 host sshd[8685]: input_userauth_request: invalid user userftp [preauth]
Jan  5 23:28:22 host sshd[8685]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 23:28:22 host sshd[8685]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.131.27.221
Jan  5 23:28:24 host sshd[8685]: Failed password for invalid user userftp from 43.131.27.221 port 33926 ssh2
Jan  5 23:28:24 host sshd[8685]: Received disconnect from 43.131.27.221 port 33926:11: Bye Bye [preauth]
Jan  5 23:28:24 host sshd[8685]: Disconnected from 43.131.27.221 port 33926 [preauth]
Jan  5 23:28:25 host sshd[8691]: Invalid user cashier from 165.227.90.242 port 55624
Jan  5 23:28:25 host sshd[8691]: input_userauth_request: invalid user cashier [preauth]
Jan  5 23:28:25 host sshd[8691]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 23:28:25 host sshd[8691]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.90.242
Jan  5 23:28:27 host sshd[8691]: Failed password for invalid user cashier from 165.227.90.242 port 55624 ssh2
Jan  5 23:28:27 host sshd[8691]: Received disconnect from 165.227.90.242 port 55624:11: Bye Bye [preauth]
Jan  5 23:28:27 host sshd[8691]: Disconnected from 165.227.90.242 port 55624 [preauth]
Jan  5 23:28:42 host sshd[8766]: Invalid user gy from 89.22.67.66 port 42410
Jan  5 23:28:42 host sshd[8766]: input_userauth_request: invalid user gy [preauth]
Jan  5 23:28:42 host sshd[8766]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 23:28:42 host sshd[8766]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.22.67.66
Jan  5 23:28:44 host sshd[8766]: Failed password for invalid user gy from 89.22.67.66 port 42410 ssh2
Jan  5 23:28:44 host sshd[8766]: Received disconnect from 89.22.67.66 port 42410:11: Bye Bye [preauth]
Jan  5 23:28:44 host sshd[8766]: Disconnected from 89.22.67.66 port 42410 [preauth]
Jan  5 23:29:15 host sshd[8822]: Invalid user postgres from 84.54.74.130 port 37624
Jan  5 23:29:15 host sshd[8822]: input_userauth_request: invalid user postgres [preauth]
Jan  5 23:29:15 host sshd[8822]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 23:29:15 host sshd[8822]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.54.74.130
Jan  5 23:29:15 host sshd[8820]: Invalid user bot from 104.243.23.43 port 36760
Jan  5 23:29:15 host sshd[8820]: input_userauth_request: invalid user bot [preauth]
Jan  5 23:29:15 host sshd[8820]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 23:29:15 host sshd[8820]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.243.23.43
Jan  5 23:29:17 host sshd[8822]: Failed password for invalid user postgres from 84.54.74.130 port 37624 ssh2
Jan  5 23:29:17 host sshd[8820]: Failed password for invalid user bot from 104.243.23.43 port 36760 ssh2
Jan  5 23:29:18 host sshd[8822]: Received disconnect from 84.54.74.130 port 37624:11: Bye Bye [preauth]
Jan  5 23:29:18 host sshd[8822]: Disconnected from 84.54.74.130 port 37624 [preauth]
Jan  5 23:29:18 host sshd[8820]: Received disconnect from 104.243.23.43 port 36760:11: Bye Bye [preauth]
Jan  5 23:29:18 host sshd[8820]: Disconnected from 104.243.23.43 port 36760 [preauth]
Jan  5 23:29:27 host sshd[8891]: Invalid user aaron from 43.159.49.49 port 33172
Jan  5 23:29:27 host sshd[8891]: input_userauth_request: invalid user aaron [preauth]
Jan  5 23:29:27 host sshd[8891]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 23:29:27 host sshd[8891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.159.49.49
Jan  5 23:29:28 host sshd[8893]: User root from 43.131.27.221 not allowed because not listed in AllowUsers
Jan  5 23:29:28 host sshd[8893]: input_userauth_request: invalid user root [preauth]
Jan  5 23:29:28 host unix_chkpwd[8898]: password check failed for user (root)
Jan  5 23:29:28 host sshd[8893]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.131.27.221  user=root
Jan  5 23:29:28 host sshd[8893]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 23:29:29 host sshd[8891]: Failed password for invalid user aaron from 43.159.49.49 port 33172 ssh2
Jan  5 23:29:29 host sshd[8891]: Received disconnect from 43.159.49.49 port 33172:11: Bye Bye [preauth]
Jan  5 23:29:29 host sshd[8891]: Disconnected from 43.159.49.49 port 33172 [preauth]
Jan  5 23:29:30 host sshd[8893]: Failed password for invalid user root from 43.131.27.221 port 32874 ssh2
Jan  5 23:29:30 host sshd[8893]: Received disconnect from 43.131.27.221 port 32874:11: Bye Bye [preauth]
Jan  5 23:29:30 host sshd[8893]: Disconnected from 43.131.27.221 port 32874 [preauth]
Jan  5 23:29:49 host sshd[8962]: User root from 89.22.67.66 not allowed because not listed in AllowUsers
Jan  5 23:29:49 host sshd[8962]: input_userauth_request: invalid user root [preauth]
Jan  5 23:29:49 host unix_chkpwd[8965]: password check failed for user (root)
Jan  5 23:29:49 host sshd[8962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.22.67.66  user=root
Jan  5 23:29:49 host sshd[8962]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  5 23:29:50 host sshd[8962]: Failed password for invalid user root from 89.22.67.66 port 37204 ssh2
Jan  5 23:29:51 host sshd[8962]: Received disconnect from 89.22.67.66 port 37204:11: Bye Bye [preauth]
Jan  5 23:29:51 host sshd[8962]: Disconnected from 89.22.67.66 port 37204 [preauth]
Jan  5 23:29:53 host sshd[8968]: Invalid user jupyter from 180.250.247.45 port 38024
Jan  5 23:29:53 host sshd[8968]: input_userauth_request: invalid user jupyter [preauth]
Jan  5 23:29:53 host sshd[8968]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 23:29:53 host sshd[8968]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.247.45
Jan  5 23:29:54 host sshd[8968]: Failed password for invalid user jupyter from 180.250.247.45 port 38024 ssh2
Jan  5 23:29:55 host sshd[8968]: Received disconnect from 180.250.247.45 port 38024:11: Bye Bye [preauth]
Jan  5 23:29:55 host sshd[8968]: Disconnected from 180.250.247.45 port 38024 [preauth]
Jan  5 23:30:46 host sshd[9120]: Invalid user cc from 43.159.49.49 port 56484
Jan  5 23:30:46 host sshd[9120]: input_userauth_request: invalid user cc [preauth]
Jan  5 23:30:46 host sshd[9120]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 23:30:46 host sshd[9120]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.159.49.49
Jan  5 23:30:48 host sshd[9120]: Failed password for invalid user cc from 43.159.49.49 port 56484 ssh2
Jan  5 23:31:43 host sshd[9283]: Invalid user zy from 180.250.247.45 port 35160
Jan  5 23:31:43 host sshd[9283]: input_userauth_request: invalid user zy [preauth]
Jan  5 23:31:43 host sshd[9283]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 23:31:43 host sshd[9283]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.247.45
Jan  5 23:31:45 host sshd[9283]: Failed password for invalid user zy from 180.250.247.45 port 35160 ssh2
Jan  5 23:31:45 host sshd[9283]: Received disconnect from 180.250.247.45 port 35160:11: Bye Bye [preauth]
Jan  5 23:31:45 host sshd[9283]: Disconnected from 180.250.247.45 port 35160 [preauth]
Jan  5 23:33:17 host sshd[9587]: Invalid user ems from 104.243.23.43 port 43946
Jan  5 23:33:17 host sshd[9587]: input_userauth_request: invalid user ems [preauth]
Jan  5 23:33:17 host sshd[9587]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 23:33:17 host sshd[9587]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.243.23.43
Jan  5 23:33:19 host sshd[9587]: Failed password for invalid user ems from 104.243.23.43 port 43946 ssh2
Jan  5 23:33:21 host sshd[9587]: Received disconnect from 104.243.23.43 port 43946:11: Bye Bye [preauth]
Jan  5 23:33:21 host sshd[9587]: Disconnected from 104.243.23.43 port 43946 [preauth]
Jan  5 23:35:26 host sshd[9825]: Invalid user gy from 104.243.23.43 port 37142
Jan  5 23:35:26 host sshd[9825]: input_userauth_request: invalid user gy [preauth]
Jan  5 23:35:26 host sshd[9825]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 23:35:26 host sshd[9825]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.243.23.43
Jan  5 23:35:29 host sshd[9825]: Failed password for invalid user gy from 104.243.23.43 port 37142 ssh2
Jan  5 23:47:34 host sshd[11583]: Invalid user 0aduserPgND2xfL2xEVobFLPr__wasadmin from 176.111.173.164 port 58414
Jan  5 23:47:34 host sshd[11583]: input_userauth_request: invalid user 0aduserPgND2xfL2xEVobFLPr__wasadmin [preauth]
Jan  5 23:47:34 host sshd[11583]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 23:47:34 host sshd[11583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.111.173.164
Jan  5 23:47:36 host sshd[11583]: Failed password for invalid user 0aduserPgND2xfL2xEVobFLPr__wasadmin from 176.111.173.164 port 58414 ssh2
Jan  5 23:47:39 host sshd[11583]: pam_unix(sshd:auth): check pass; user unknown
Jan  5 23:47:41 host sshd[11583]: Failed password for invalid user 0aduserPgND2xfL2xEVobFLPr__wasadmin from 176.111.173.164 port 58414 ssh2
Jan  5 23:47:44 host sshd[11583]: Failed password for invalid user 0aduserPgND2xfL2xEVobFLPr__wasadmin from 176.111.173.164 port 58414 ssh2
Jan  5 23:47:47 host sshd[11583]: Connection closed by 176.111.173.164 port 58414 [preauth]
Jan  5 23:47:47 host sshd[11583]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.111.173.164
Jan  6 00:13:43 host sshd[15254]: Connection closed by 172.105.128.13 port 13190 [preauth]
Jan  6 00:13:46 host sshd[15258]: Connection closed by 172.105.128.13 port 13200 [preauth]
Jan  6 00:13:48 host sshd[15264]: Connection closed by 172.105.128.13 port 13208 [preauth]
Jan  6 00:13:56 host sshd[15280]: Did not receive identification string from 79.52.117.49 port 34854
Jan  6 00:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  6 00:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 00:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 00:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  6 00:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 00:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 00:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  6 00:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 00:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 00:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  6 00:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 00:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 00:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  6 00:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 00:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 00:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  6 00:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 00:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 00:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  6 00:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 00:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 00:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  6 00:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 00:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 00:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  6 00:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 00:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 00:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  6 00:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 00:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 00:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  6 00:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 00:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 00:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  6 00:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 00:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 00:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  6 00:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 00:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 00:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkapin user-2=woodpeck user-3=disposeat user-4=remysagr user-5=wwwkmaorg user-6=pmcresources user-7=vfmassets user-8=wwwtestugo user-9=shalinijames user-10=straightcurve user-11=wwwletsstalkfood user-12=bonifacegroup user-13=wwwevmhonda user-14=wwwnexidigital user-15=mrsclean user-16=gifterman user-17=palco123 user-18=phmetals user-19=kottayamcalldriv user-20=cochintaxi user-21=wwwkaretakers user-22=laundryboniface user-23=dartsimp user-24=a2zgroup user-25=wwwpmcresource user-26=wwwrmswll user-27=wwwresourcehunte user-28=keralaholi user-29=ugotscom user-30=travelboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  6 00:21:53 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  6 00:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 00:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 00:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  6 00:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 00:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 00:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-obk8Ty9fIdL9gDeY.~
Jan  6 00:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 00:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 00:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-obk8Ty9fIdL9gDeY.~'
Jan  6 00:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 00:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 00:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-obk8Ty9fIdL9gDeY.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  6 00:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 00:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 00:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  6 00:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 00:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 00:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  6 00:21:54 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 00:21:54 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 00:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  6 00:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 00:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 00:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  6 00:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 00:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 00:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  6 00:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 00:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 00:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  6 00:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 00:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 00:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  6 00:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 00:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 00:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  6 00:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  6 00:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  6 00:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  6 00:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  6 00:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  6 00:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  6 00:21:59 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  6 00:22:01 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  6 00:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  6 00:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 00:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 00:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  6 00:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 00:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 00:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  6 00:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 00:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 00:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  6 00:22:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 00:22:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 00:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  6 00:22:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 00:22:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 00:42:40 host sshd[20478]: User root from 51.143.96.123 not allowed because not listed in AllowUsers
Jan  6 00:42:40 host sshd[20478]: input_userauth_request: invalid user root [preauth]
Jan  6 00:42:40 host unix_chkpwd[20481]: password check failed for user (root)
Jan  6 00:42:40 host sshd[20478]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.143.96.123  user=root
Jan  6 00:42:40 host sshd[20478]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 00:42:42 host sshd[20478]: Failed password for invalid user root from 51.143.96.123 port 37682 ssh2
Jan  6 00:42:42 host sshd[20478]: Received disconnect from 51.143.96.123 port 37682:11: Bye Bye [preauth]
Jan  6 00:42:42 host sshd[20478]: Disconnected from 51.143.96.123 port 37682 [preauth]
Jan  6 00:47:17 host sshd[21134]: User root from 51.143.96.123 not allowed because not listed in AllowUsers
Jan  6 00:47:17 host sshd[21134]: input_userauth_request: invalid user root [preauth]
Jan  6 00:47:17 host unix_chkpwd[21137]: password check failed for user (root)
Jan  6 00:47:17 host sshd[21134]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.143.96.123  user=root
Jan  6 00:47:17 host sshd[21134]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 00:47:18 host sshd[21134]: Failed password for invalid user root from 51.143.96.123 port 55390 ssh2
Jan  6 00:47:18 host sshd[21134]: Received disconnect from 51.143.96.123 port 55390:11: Bye Bye [preauth]
Jan  6 00:47:18 host sshd[21134]: Disconnected from 51.143.96.123 port 55390 [preauth]
Jan  6 01:16:57 host sshd[25212]: Invalid user pi from 68.193.117.168 port 58248
Jan  6 01:16:57 host sshd[25212]: input_userauth_request: invalid user pi [preauth]
Jan  6 01:16:57 host sshd[25214]: Invalid user pi from 68.193.117.168 port 58254
Jan  6 01:16:57 host sshd[25214]: input_userauth_request: invalid user pi [preauth]
Jan  6 01:16:57 host sshd[25212]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 01:16:57 host sshd[25212]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.193.117.168
Jan  6 01:16:57 host sshd[25214]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 01:16:57 host sshd[25214]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.193.117.168
Jan  6 01:16:59 host sshd[25212]: Failed password for invalid user pi from 68.193.117.168 port 58248 ssh2
Jan  6 01:16:59 host sshd[25214]: Failed password for invalid user pi from 68.193.117.168 port 58254 ssh2
Jan  6 01:16:59 host sshd[25212]: Connection closed by 68.193.117.168 port 58248 [preauth]
Jan  6 01:16:59 host sshd[25214]: Connection closed by 68.193.117.168 port 58254 [preauth]
Jan  6 01:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  6 01:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 01:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 01:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  6 01:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 01:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 01:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  6 01:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 01:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 01:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  6 01:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 01:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 01:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  6 01:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 01:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 01:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  6 01:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 01:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 01:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  6 01:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 01:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 01:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  6 01:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 01:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 01:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  6 01:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 01:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 01:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  6 01:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 01:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 01:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  6 01:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 01:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 01:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  6 01:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 01:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 01:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  6 01:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 01:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 01:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=woodpeck user-2=wwwkapin user-3=remysagr user-4=disposeat user-5=wwwkmaorg user-6=pmcresources user-7=vfmassets user-8=shalinijames user-9=wwwtestugo user-10=straightcurve user-11=wwwletsstalkfood user-12=bonifacegroup user-13=wwwevmhonda user-14=mrsclean user-15=wwwnexidigital user-16=palco123 user-17=gifterman user-18=phmetals user-19=kottayamcalldriv user-20=wwwkaretakers user-21=cochintaxi user-22=laundryboniface user-23=a2zgroup user-24=dartsimp user-25=wwwpmcresource user-26=wwwresourcehunte user-27=keralaholi user-28=wwwrmswll user-29=ugotscom user-30=travelboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  6 01:21:53 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  6 01:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 01:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 01:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  6 01:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 01:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 01:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-smjhokWGMibnNwIM.~
Jan  6 01:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 01:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 01:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-smjhokWGMibnNwIM.~'
Jan  6 01:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 01:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 01:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-smjhokWGMibnNwIM.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  6 01:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 01:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 01:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  6 01:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 01:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 01:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  6 01:21:54 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 01:21:54 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 01:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  6 01:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 01:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 01:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  6 01:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 01:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 01:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  6 01:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 01:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 01:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  6 01:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 01:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 01:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  6 01:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 01:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 01:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  6 01:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  6 01:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  6 01:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  6 01:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  6 01:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  6 01:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  6 01:21:58 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  6 01:22:03 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  6 01:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  6 01:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 01:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 01:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  6 01:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 01:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 01:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  6 01:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 01:22:06 host sshd[26077]: Invalid user ag from 194.110.203.109 port 56298
Jan  6 01:22:06 host sshd[26077]: input_userauth_request: invalid user ag [preauth]
Jan  6 01:22:06 host sshd[26077]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 01:22:06 host sshd[26077]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109
Jan  6 01:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 01:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  6 01:22:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 01:22:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 01:22:09 host sshd[26077]: Failed password for invalid user ag from 194.110.203.109 port 56298 ssh2
Jan  6 01:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  6 01:22:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 01:22:12 host sshd[26077]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 01:22:13 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 01:22:13 host sshd[26077]: Failed password for invalid user ag from 194.110.203.109 port 56298 ssh2
Jan  6 01:22:17 host sshd[26077]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 01:22:19 host sshd[26077]: Failed password for invalid user ag from 194.110.203.109 port 56298 ssh2
Jan  6 01:22:22 host sshd[26077]: Connection closed by 194.110.203.109 port 56298 [preauth]
Jan  6 01:22:22 host sshd[26077]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109
Jan  6 01:23:57 host sshd[26392]: User root from 147.182.247.29 not allowed because not listed in AllowUsers
Jan  6 01:23:57 host sshd[26392]: input_userauth_request: invalid user root [preauth]
Jan  6 01:23:57 host unix_chkpwd[26395]: password check failed for user (root)
Jan  6 01:23:57 host sshd[26392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.182.247.29  user=root
Jan  6 01:23:57 host sshd[26392]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 01:23:59 host sshd[26392]: Failed password for invalid user root from 147.182.247.29 port 59136 ssh2
Jan  6 01:23:59 host sshd[26392]: Received disconnect from 147.182.247.29 port 59136:11: Bye Bye [preauth]
Jan  6 01:23:59 host sshd[26392]: Disconnected from 147.182.247.29 port 59136 [preauth]
Jan  6 01:28:11 host sshd[26945]: User root from 147.182.247.29 not allowed because not listed in AllowUsers
Jan  6 01:28:11 host sshd[26945]: input_userauth_request: invalid user root [preauth]
Jan  6 01:28:12 host unix_chkpwd[26948]: password check failed for user (root)
Jan  6 01:28:12 host sshd[26945]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.182.247.29  user=root
Jan  6 01:28:12 host sshd[26945]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 01:28:13 host sshd[26945]: Failed password for invalid user root from 147.182.247.29 port 49194 ssh2
Jan  6 01:28:13 host sshd[26945]: Received disconnect from 147.182.247.29 port 49194:11: Bye Bye [preauth]
Jan  6 01:28:13 host sshd[26945]: Disconnected from 147.182.247.29 port 49194 [preauth]
Jan  6 01:34:49 host sshd[27937]: User root from 112.30.163.76 not allowed because not listed in AllowUsers
Jan  6 01:34:49 host sshd[27937]: input_userauth_request: invalid user root [preauth]
Jan  6 01:34:49 host unix_chkpwd[27940]: password check failed for user (root)
Jan  6 01:34:49 host sshd[27937]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.30.163.76  user=root
Jan  6 01:34:49 host sshd[27937]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 01:34:51 host sshd[27937]: Failed password for invalid user root from 112.30.163.76 port 50314 ssh2
Jan  6 01:34:51 host sshd[27937]: Received disconnect from 112.30.163.76 port 50314:11: Bye Bye [preauth]
Jan  6 01:34:51 host sshd[27937]: Disconnected from 112.30.163.76 port 50314 [preauth]
Jan  6 01:34:53 host sshd[27945]: Invalid user dev from 5.78.40.253 port 35798
Jan  6 01:34:53 host sshd[27945]: input_userauth_request: invalid user dev [preauth]
Jan  6 01:34:53 host sshd[27945]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 01:34:53 host sshd[27945]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.78.40.253
Jan  6 01:34:55 host sshd[27945]: Failed password for invalid user dev from 5.78.40.253 port 35798 ssh2
Jan  6 01:34:55 host sshd[27945]: Received disconnect from 5.78.40.253 port 35798:11: Bye Bye [preauth]
Jan  6 01:34:55 host sshd[27945]: Disconnected from 5.78.40.253 port 35798 [preauth]
Jan  6 01:37:34 host sshd[28281]: User games from 162.240.56.190 not allowed because not listed in AllowUsers
Jan  6 01:37:34 host sshd[28281]: input_userauth_request: invalid user games [preauth]
Jan  6 01:37:34 host unix_chkpwd[28284]: password check failed for user (games)
Jan  6 01:37:34 host sshd[28281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.240.56.190  user=games
Jan  6 01:37:34 host sshd[28281]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "games"
Jan  6 01:37:36 host sshd[28281]: Failed password for invalid user games from 162.240.56.190 port 53000 ssh2
Jan  6 01:37:36 host sshd[28281]: Received disconnect from 162.240.56.190 port 53000:11: Bye Bye [preauth]
Jan  6 01:37:36 host sshd[28281]: Disconnected from 162.240.56.190 port 53000 [preauth]
Jan  6 01:39:36 host sshd[28645]: User root from 112.30.163.76 not allowed because not listed in AllowUsers
Jan  6 01:39:36 host sshd[28645]: input_userauth_request: invalid user root [preauth]
Jan  6 01:39:36 host unix_chkpwd[28652]: password check failed for user (root)
Jan  6 01:39:36 host sshd[28645]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.30.163.76  user=root
Jan  6 01:39:36 host sshd[28645]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 01:39:38 host sshd[28645]: Failed password for invalid user root from 112.30.163.76 port 42688 ssh2
Jan  6 01:39:38 host sshd[28645]: Received disconnect from 112.30.163.76 port 42688:11: Bye Bye [preauth]
Jan  6 01:39:38 host sshd[28645]: Disconnected from 112.30.163.76 port 42688 [preauth]
Jan  6 01:39:49 host sshd[28699]: Invalid user postgres from 162.240.56.190 port 60714
Jan  6 01:39:49 host sshd[28699]: input_userauth_request: invalid user postgres [preauth]
Jan  6 01:39:49 host sshd[28699]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 01:39:49 host sshd[28699]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.240.56.190
Jan  6 01:39:51 host sshd[28699]: Failed password for invalid user postgres from 162.240.56.190 port 60714 ssh2
Jan  6 01:39:51 host sshd[28699]: Received disconnect from 162.240.56.190 port 60714:11: Bye Bye [preauth]
Jan  6 01:39:51 host sshd[28699]: Disconnected from 162.240.56.190 port 60714 [preauth]
Jan  6 01:40:03 host sshd[28781]: User root from 5.78.40.253 not allowed because not listed in AllowUsers
Jan  6 01:40:03 host sshd[28781]: input_userauth_request: invalid user root [preauth]
Jan  6 01:40:03 host unix_chkpwd[28784]: password check failed for user (root)
Jan  6 01:40:03 host sshd[28781]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.78.40.253  user=root
Jan  6 01:40:03 host sshd[28781]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 01:40:05 host sshd[28781]: Failed password for invalid user root from 5.78.40.253 port 51534 ssh2
Jan  6 01:40:05 host sshd[28781]: Received disconnect from 5.78.40.253 port 51534:11: Bye Bye [preauth]
Jan  6 01:40:05 host sshd[28781]: Disconnected from 5.78.40.253 port 51534 [preauth]
Jan  6 01:42:26 host sshd[29125]: Did not receive identification string from 149.7.16.55 port 57770
Jan  6 02:04:03 host sshd[422]: Connection closed by 192.241.238.18 port 41366 [preauth]
Jan  6 02:05:07 host sshd[574]: Connection closed by 162.142.125.212 port 35488 [preauth]
Jan  6 02:18:08 host sshd[2503]: Invalid user radio from 49.51.18.154 port 47352
Jan  6 02:18:08 host sshd[2503]: input_userauth_request: invalid user radio [preauth]
Jan  6 02:18:08 host sshd[2503]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 02:18:08 host sshd[2503]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.51.18.154
Jan  6 02:18:10 host sshd[2503]: Failed password for invalid user radio from 49.51.18.154 port 47352 ssh2
Jan  6 02:18:10 host sshd[2503]: Received disconnect from 49.51.18.154 port 47352:11: Bye Bye [preauth]
Jan  6 02:18:10 host sshd[2503]: Disconnected from 49.51.18.154 port 47352 [preauth]
Jan  6 02:19:10 host sshd[2637]: Invalid user manager from 164.163.21.78 port 44804
Jan  6 02:19:10 host sshd[2637]: input_userauth_request: invalid user manager [preauth]
Jan  6 02:19:10 host sshd[2637]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 02:19:10 host sshd[2637]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.163.21.78
Jan  6 02:19:11 host sshd[2641]: User root from 45.133.239.165 not allowed because not listed in AllowUsers
Jan  6 02:19:11 host sshd[2641]: input_userauth_request: invalid user root [preauth]
Jan  6 02:19:11 host unix_chkpwd[2643]: password check failed for user (root)
Jan  6 02:19:11 host sshd[2641]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.133.239.165  user=root
Jan  6 02:19:11 host sshd[2641]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 02:19:12 host sshd[2637]: Failed password for invalid user manager from 164.163.21.78 port 44804 ssh2
Jan  6 02:19:12 host sshd[2637]: Received disconnect from 164.163.21.78 port 44804:11: Bye Bye [preauth]
Jan  6 02:19:12 host sshd[2637]: Disconnected from 164.163.21.78 port 44804 [preauth]
Jan  6 02:19:13 host sshd[2641]: Failed password for invalid user root from 45.133.239.165 port 47100 ssh2
Jan  6 02:19:13 host sshd[2641]: Received disconnect from 45.133.239.165 port 47100:11: Bye Bye [preauth]
Jan  6 02:19:13 host sshd[2641]: Disconnected from 45.133.239.165 port 47100 [preauth]
Jan  6 02:19:17 host sshd[2647]: Invalid user hadoop from 38.54.80.177 port 33568
Jan  6 02:19:17 host sshd[2647]: input_userauth_request: invalid user hadoop [preauth]
Jan  6 02:19:17 host sshd[2647]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 02:19:17 host sshd[2647]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=38.54.80.177
Jan  6 02:19:19 host sshd[2647]: Failed password for invalid user hadoop from 38.54.80.177 port 33568 ssh2
Jan  6 02:19:19 host sshd[2647]: Received disconnect from 38.54.80.177 port 33568:11: Bye Bye [preauth]
Jan  6 02:19:19 host sshd[2647]: Disconnected from 38.54.80.177 port 33568 [preauth]
Jan  6 02:19:59 host sshd[2726]: User root from 110.49.17.95 not allowed because not listed in AllowUsers
Jan  6 02:19:59 host sshd[2726]: input_userauth_request: invalid user root [preauth]
Jan  6 02:19:59 host unix_chkpwd[2728]: password check failed for user (root)
Jan  6 02:19:59 host sshd[2726]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.49.17.95  user=root
Jan  6 02:19:59 host sshd[2726]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 02:20:01 host sshd[2726]: Failed password for invalid user root from 110.49.17.95 port 36516 ssh2
Jan  6 02:20:01 host sshd[2726]: Received disconnect from 110.49.17.95 port 36516:11: Bye Bye [preauth]
Jan  6 02:20:01 host sshd[2726]: Disconnected from 110.49.17.95 port 36516 [preauth]
Jan  6 02:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  6 02:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  6 02:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  6 02:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  6 02:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  6 02:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  6 02:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  6 02:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  6 02:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  6 02:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  6 02:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  6 02:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  6 02:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  6 02:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=pmcresources user-2=vfmassets user-3=wwwtestugo user-4=shalinijames user-5=wwwkapin user-6=woodpeck user-7=remysagr user-8=disposeat user-9=wwwkmaorg user-10=mrsclean user-11=wwwnexidigital user-12=gifterman user-13=palco123 user-14=phmetals user-15=kottayamcalldriv user-16=straightcurve user-17=wwwletsstalkfood user-18=bonifacegroup user-19=wwwevmhonda user-20=laundryboniface user-21=dartsimp user-22=a2zgroup user-23=wwwkaretakers user-24=cochintaxi user-25=wwwrmswll user-26=keralaholi user-27=wwwresourcehunte user-28=ugotscom user-29=travelboniface user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  6 02:21:54 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  6 02:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  6 02:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-x88kZV9fB7pg1i9o.~
Jan  6 02:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-x88kZV9fB7pg1i9o.~'
Jan  6 02:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-x88kZV9fB7pg1i9o.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  6 02:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  6 02:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  6 02:21:55 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 02:21:55 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 02:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  6 02:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  6 02:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  6 02:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  6 02:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  6 02:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  6 02:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  6 02:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  6 02:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  6 02:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  6 02:22:00 host sshd[3210]: Invalid user stephanie from 51.222.13.180 port 55288
Jan  6 02:22:00 host sshd[3210]: input_userauth_request: invalid user stephanie [preauth]
Jan  6 02:22:00 host sshd[3210]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 02:22:00 host sshd[3210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.222.13.180
Jan  6 02:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  6 02:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  6 02:22:00 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  6 02:22:02 host sshd[3210]: Failed password for invalid user stephanie from 51.222.13.180 port 55288 ssh2
Jan  6 02:22:02 host sshd[3210]: Received disconnect from 51.222.13.180 port 55288:11: Bye Bye [preauth]
Jan  6 02:22:02 host sshd[3210]: Disconnected from 51.222.13.180 port 55288 [preauth]
Jan  6 02:22:05 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  6 02:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  6 02:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:22:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  6 02:22:09 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:22:10 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  6 02:22:10 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:22:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:22:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  6 02:22:12 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 02:22:13 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 02:22:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  6 02:22:14 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 02:22:17 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 02:22:45 host sshd[3410]: User root from 119.93.123.197 not allowed because not listed in AllowUsers
Jan  6 02:22:45 host sshd[3410]: input_userauth_request: invalid user root [preauth]
Jan  6 02:22:45 host unix_chkpwd[3413]: password check failed for user (root)
Jan  6 02:22:45 host sshd[3410]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.93.123.197  user=root
Jan  6 02:22:45 host sshd[3410]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 02:22:47 host sshd[3410]: Failed password for invalid user root from 119.93.123.197 port 51386 ssh2
Jan  6 02:22:47 host sshd[3410]: Received disconnect from 119.93.123.197 port 51386:11: Bye Bye [preauth]
Jan  6 02:22:47 host sshd[3410]: Disconnected from 119.93.123.197 port 51386 [preauth]
Jan  6 02:23:38 host sshd[3563]: User root from 64.227.46.127 not allowed because not listed in AllowUsers
Jan  6 02:23:38 host sshd[3563]: input_userauth_request: invalid user root [preauth]
Jan  6 02:23:38 host unix_chkpwd[3570]: password check failed for user (root)
Jan  6 02:23:38 host sshd[3563]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.46.127  user=root
Jan  6 02:23:38 host sshd[3563]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 02:23:40 host sshd[3563]: Failed password for invalid user root from 64.227.46.127 port 53352 ssh2
Jan  6 02:23:41 host sshd[3563]: Received disconnect from 64.227.46.127 port 53352:11: Bye Bye [preauth]
Jan  6 02:23:41 host sshd[3563]: Disconnected from 64.227.46.127 port 53352 [preauth]
Jan  6 02:24:09 host sshd[3626]: User root from 38.54.80.177 not allowed because not listed in AllowUsers
Jan  6 02:24:09 host sshd[3626]: input_userauth_request: invalid user root [preauth]
Jan  6 02:24:09 host unix_chkpwd[3635]: password check failed for user (root)
Jan  6 02:24:09 host sshd[3626]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=38.54.80.177  user=root
Jan  6 02:24:09 host sshd[3626]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 02:24:09 host sshd[3628]: User root from 51.222.13.180 not allowed because not listed in AllowUsers
Jan  6 02:24:09 host sshd[3628]: input_userauth_request: invalid user root [preauth]
Jan  6 02:24:09 host unix_chkpwd[3637]: password check failed for user (root)
Jan  6 02:24:09 host sshd[3628]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.222.13.180  user=root
Jan  6 02:24:09 host sshd[3628]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 02:24:10 host sshd[3626]: Failed password for invalid user root from 38.54.80.177 port 55916 ssh2
Jan  6 02:24:11 host sshd[3626]: Received disconnect from 38.54.80.177 port 55916:11: Bye Bye [preauth]
Jan  6 02:24:11 host sshd[3626]: Disconnected from 38.54.80.177 port 55916 [preauth]
Jan  6 02:24:11 host sshd[3628]: Failed password for invalid user root from 51.222.13.180 port 34158 ssh2
Jan  6 02:24:11 host sshd[3628]: Received disconnect from 51.222.13.180 port 34158:11: Bye Bye [preauth]
Jan  6 02:24:11 host sshd[3628]: Disconnected from 51.222.13.180 port 34158 [preauth]
Jan  6 02:24:11 host sshd[3638]: Invalid user linux from 49.51.18.154 port 49248
Jan  6 02:24:11 host sshd[3638]: input_userauth_request: invalid user linux [preauth]
Jan  6 02:24:11 host sshd[3638]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 02:24:11 host sshd[3638]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.51.18.154
Jan  6 02:24:14 host sshd[3638]: Failed password for invalid user linux from 49.51.18.154 port 49248 ssh2
Jan  6 02:24:14 host sshd[3638]: Received disconnect from 49.51.18.154 port 49248:11: Bye Bye [preauth]
Jan  6 02:24:14 host sshd[3638]: Disconnected from 49.51.18.154 port 49248 [preauth]
Jan  6 02:24:29 host sshd[3737]: Invalid user minecraft from 164.163.21.78 port 39682
Jan  6 02:24:29 host sshd[3737]: input_userauth_request: invalid user minecraft [preauth]
Jan  6 02:24:29 host sshd[3737]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 02:24:29 host sshd[3737]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.163.21.78
Jan  6 02:24:31 host sshd[3737]: Failed password for invalid user minecraft from 164.163.21.78 port 39682 ssh2
Jan  6 02:24:31 host sshd[3737]: Received disconnect from 164.163.21.78 port 39682:11: Bye Bye [preauth]
Jan  6 02:24:31 host sshd[3737]: Disconnected from 164.163.21.78 port 39682 [preauth]
Jan  6 02:24:53 host sshd[3790]: Invalid user stephanie from 110.49.17.95 port 56330
Jan  6 02:24:53 host sshd[3790]: input_userauth_request: invalid user stephanie [preauth]
Jan  6 02:24:53 host sshd[3790]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 02:24:53 host sshd[3790]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.49.17.95
Jan  6 02:24:55 host sshd[3790]: Failed password for invalid user stephanie from 110.49.17.95 port 56330 ssh2
Jan  6 02:24:55 host sshd[3790]: Received disconnect from 110.49.17.95 port 56330:11: Bye Bye [preauth]
Jan  6 02:24:55 host sshd[3790]: Disconnected from 110.49.17.95 port 56330 [preauth]
Jan  6 02:24:58 host sshd[3807]: Invalid user perez from 64.227.46.127 port 51712
Jan  6 02:24:58 host sshd[3807]: input_userauth_request: invalid user perez [preauth]
Jan  6 02:24:58 host sshd[3807]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 02:24:58 host sshd[3807]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.46.127
Jan  6 02:25:00 host sshd[3807]: Failed password for invalid user perez from 64.227.46.127 port 51712 ssh2
Jan  6 02:25:00 host sshd[3807]: Received disconnect from 64.227.46.127 port 51712:11: Bye Bye [preauth]
Jan  6 02:25:00 host sshd[3807]: Disconnected from 64.227.46.127 port 51712 [preauth]
Jan  6 02:25:06 host sshd[3911]: Invalid user davide from 45.133.239.165 port 49410
Jan  6 02:25:06 host sshd[3911]: input_userauth_request: invalid user davide [preauth]
Jan  6 02:25:06 host sshd[3911]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 02:25:06 host sshd[3911]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.133.239.165
Jan  6 02:25:09 host sshd[3911]: Failed password for invalid user davide from 45.133.239.165 port 49410 ssh2
Jan  6 02:25:09 host sshd[3911]: Received disconnect from 45.133.239.165 port 49410:11: Bye Bye [preauth]
Jan  6 02:25:09 host sshd[3911]: Disconnected from 45.133.239.165 port 49410 [preauth]
Jan  6 02:25:09 host sshd[3928]: Invalid user username from 119.93.123.197 port 55672
Jan  6 02:25:09 host sshd[3928]: input_userauth_request: invalid user username [preauth]
Jan  6 02:25:09 host sshd[3928]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 02:25:09 host sshd[3928]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.93.123.197
Jan  6 02:25:11 host sshd[3928]: Failed password for invalid user username from 119.93.123.197 port 55672 ssh2
Jan  6 02:25:12 host sshd[3928]: Received disconnect from 119.93.123.197 port 55672:11: Bye Bye [preauth]
Jan  6 02:25:12 host sshd[3928]: Disconnected from 119.93.123.197 port 55672 [preauth]
Jan  6 02:25:28 host sshd[4054]: Invalid user ninja from 49.51.18.154 port 48868
Jan  6 02:25:28 host sshd[4054]: input_userauth_request: invalid user ninja [preauth]
Jan  6 02:25:29 host sshd[4054]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 02:25:29 host sshd[4054]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.51.18.154
Jan  6 02:25:31 host sshd[4054]: Failed password for invalid user ninja from 49.51.18.154 port 48868 ssh2
Jan  6 02:25:31 host sshd[4054]: Received disconnect from 49.51.18.154 port 48868:11: Bye Bye [preauth]
Jan  6 02:25:31 host sshd[4054]: Disconnected from 49.51.18.154 port 48868 [preauth]
Jan  6 02:26:04 host sshd[4173]: Invalid user uploader from 164.163.21.78 port 39352
Jan  6 02:26:04 host sshd[4173]: input_userauth_request: invalid user uploader [preauth]
Jan  6 02:26:04 host sshd[4173]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 02:26:04 host sshd[4173]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.163.21.78
Jan  6 02:26:06 host sshd[4173]: Failed password for invalid user uploader from 164.163.21.78 port 39352 ssh2
Jan  6 02:26:07 host sshd[4173]: Received disconnect from 164.163.21.78 port 39352:11: Bye Bye [preauth]
Jan  6 02:26:07 host sshd[4173]: Disconnected from 164.163.21.78 port 39352 [preauth]
Jan  6 02:29:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  6 02:29:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:29:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:29:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  6 02:29:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:29:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:29:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  6 02:29:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:29:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:29:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  6 02:29:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:29:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:29:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  6 02:29:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:29:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:29:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=palco123 user-2=gifterman user-3=phmetals user-4=kottayamcalldriv user-5=mrsclean user-6=wwwnexidigital user-7=bonifacegroup user-8=wwwevmhonda user-9=wwwletsstalkfood user-10=straightcurve user-11=vfmassets user-12=shalinijames user-13=wwwtestugo user-14=pmcresources user-15=disposeat user-16=wwwkmaorg user-17=remysagr user-18=wwwkapin user-19=woodpeck user-20=travelboniface user-21=wwwresourcehunte user-22=keralaholi user-23=wwwrmswll user-24=ugotscom user-25=wwwpmcresource user-26=a2zgroup user-27=dartsimp user-28=laundryboniface user-29=cochintaxi user-30=wwwkaretakers feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  6 02:29:52 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  6 02:29:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:29:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:29:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwevmhonda --output=json
Jan  6 02:29:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:29:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:29:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color instance info --format=json --check-updates=true
Jan  6 02:29:52 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  6 02:29:56 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  6 02:29:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false
Jan  6 02:29:56 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  6 02:29:57 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  6 02:29:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false
Jan  6 02:29:57 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  6 02:30:00 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  6 02:30:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  6 02:30:00 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  6 02:30:00 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  6 02:30:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwevmhonda LangPHP php_get_vhost_versions --output=json
Jan  6 02:30:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:30:00 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:30:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 package_manager_get_package_info package-0=ea-php72 --output=json
Jan  6 02:30:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:30:01 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:30:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color instance login-url --skip-plugins=false --format=json
Jan  6 02:30:01 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  6 02:30:02 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  6 02:30:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwletsstalkfood --output=json
Jan  6 02:30:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:30:02 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:30:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color instance info --format=json --check-updates=true
Jan  6 02:30:02 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  6 02:30:08 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  6 02:30:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false
Jan  6 02:30:08 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  6 02:30:09 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  6 02:30:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false
Jan  6 02:30:09 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  6 02:30:15 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  6 02:30:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  6 02:30:15 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  6 02:30:15 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  6 02:30:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood LangPHP php_get_vhost_versions --output=json
Jan  6 02:30:15 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:30:15 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:30:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color instance login-url --skip-plugins=false --format=json
Jan  6 02:30:15 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  6 02:30:15 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  6 02:30:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood DomainInfo single_domain_data domain=letsstalkfood.com return_https_redirect_status=1 --output=json
Jan  6 02:30:15 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:30:15 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:30:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 fetch_vhost_ssl_components --output=json
Jan  6 02:30:15 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:30:16 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:30:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 fetch_ssl_vhosts --output=json
Jan  6 02:30:16 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:30:16 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:30:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood Mime list_redirects --output=json
Jan  6 02:30:16 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:30:16 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:30:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  6 02:30:16 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  6 02:30:17 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  6 02:30:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false
Jan  6 02:30:17 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  6 02:30:19 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  6 02:30:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  6 02:30:19 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  6 02:30:24 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  6 02:30:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false
Jan  6 02:30:24 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  6 02:30:29 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  6 02:30:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/public_html/wp-config.php
Jan  6 02:30:29 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  6 02:30:29 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  6 02:30:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  6 02:30:29 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  6 02:30:29 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  6 02:30:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/public_html/.maintenance
Jan  6 02:30:29 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  6 02:30:29 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  6 02:30:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color db-prefix get
Jan  6 02:30:29 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  6 02:30:30 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  6 02:30:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood DirectoryPrivacy is_directory_protected dir=/home/wwwletsstalkfood/public_html --output=json
Jan  6 02:30:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:30:30 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:30:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  6 02:30:30 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  6 02:30:30 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  6 02:30:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color wpt-cron event reschedule wp_version_check '+2 day'
Jan  6 02:30:30 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  6 02:30:31 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  6 02:30:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day'
Jan  6 02:30:31 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  6 02:30:31 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  6 02:30:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  6 02:30:31 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  6 02:30:32 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  6 02:30:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  6 02:30:32 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  6 02:30:32 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  6 02:30:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color admin-username is-secure
Jan  6 02:30:32 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  6 02:30:33 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  6 02:30:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  6 02:30:33 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  6 02:30:33 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  6 02:30:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/public_html/wp-config.php
Jan  6 02:30:33 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  6 02:30:33 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  6 02:30:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/stat -c %a /home/wwwletsstalkfood/public_html/wp-config.php
Jan  6 02:30:33 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  6 02:30:33 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  6 02:30:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color pingbacks is_disabled
Jan  6 02:30:33 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  6 02:30:34 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  6 02:30:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  6 02:30:34 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  6 02:30:34 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  6 02:30:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color security-keys are_keys_correct
Jan  6 02:30:34 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  6 02:30:35 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  6 02:30:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=mrsclean --output=json
Jan  6 02:30:35 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:30:35 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:30:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/backup && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/mrsclean/public_html/backup --no-color instance info --format=json --check-updates=true
Jan  6 02:30:35 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  6 02:30:35 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  6 02:30:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean DomainInfo single_domain_data domain=mrsclean.co.in return_https_redirect_status=1 --output=json
Jan  6 02:30:35 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:30:35 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:30:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean Mime list_redirects --output=json
Jan  6 02:30:35 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:30:35 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:30:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/public_html/backup/wp-includes/version.php
Jan  6 02:30:35 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  6 02:30:35 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  6 02:30:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/cat /home/mrsclean/public_html/backup/wp-includes/version.php
Jan  6 02:30:35 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  6 02:30:35 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  6 02:30:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  6 02:30:35 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  6 02:30:35 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  6 02:30:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean LangPHP php_get_vhost_versions --output=json
Jan  6 02:30:35 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:30:36 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:30:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  6 02:30:36 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 02:30:36 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 02:30:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/blog && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/mrsclean/public_html/blog --no-color instance info --format=json --check-updates=true
Jan  6 02:30:36 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  6 02:30:36 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  6 02:30:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/public_html/blog/wp-includes/version.php
Jan  6 02:30:36 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  6 02:30:36 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  6 02:30:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/cat /home/mrsclean/public_html/blog/wp-includes/version.php
Jan  6 02:30:36 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  6 02:30:36 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  6 02:30:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  6 02:30:36 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  6 02:30:36 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  6 02:30:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=shalinijames --output=json
Jan  6 02:30:36 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:30:36 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:30:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color instance info --format=json --check-updates=true
Jan  6 02:30:36 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  6 02:30:43 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  6 02:30:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option get auto_update_plugins --format=json
Jan  6 02:30:43 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  6 02:30:44 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  6 02:30:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option get auto_update_themes --format=json
Jan  6 02:30:44 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  6 02:30:44 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  6 02:30:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  6 02:30:44 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  6 02:30:44 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  6 02:30:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames LangPHP php_get_vhost_versions --output=json
Jan  6 02:30:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:30:44 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:30:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color instance login-url --skip-plugins=false --format=json
Jan  6 02:30:44 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  6 02:30:45 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  6 02:30:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames DomainInfo single_domain_data domain=shalinijames.com return_https_redirect_status=1 --output=json
Jan  6 02:30:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:30:45 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:30:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames Mime list_redirects --output=json
Jan  6 02:30:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:30:45 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:30:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  6 02:30:45 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  6 02:30:47 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  6 02:30:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option get auto_update_plugins --format=json
Jan  6 02:30:47 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  6 02:30:48 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  6 02:30:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  6 02:30:48 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  6 02:30:52 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  6 02:30:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option get auto_update_themes --format=json
Jan  6 02:30:52 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  6 02:30:52 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  6 02:30:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/public_html/wp-config.php
Jan  6 02:30:52 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  6 02:30:52 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  6 02:30:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  6 02:30:52 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  6 02:30:53 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  6 02:30:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/public_html/.maintenance
Jan  6 02:30:53 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  6 02:30:53 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  6 02:30:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color db-prefix get
Jan  6 02:30:53 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  6 02:30:53 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  6 02:30:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames DirectoryPrivacy is_directory_protected dir=/home/shalinijames/public_html --output=json
Jan  6 02:30:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:30:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:30:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  6 02:30:53 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  6 02:30:54 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  6 02:30:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color wpt-cron event reschedule wp_version_check '+2 day'
Jan  6 02:30:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  6 02:30:54 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  6 02:30:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day'
Jan  6 02:30:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  6 02:30:55 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  6 02:30:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  6 02:30:55 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  6 02:30:55 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  6 02:30:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  6 02:30:55 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  6 02:30:56 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  6 02:30:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color admin-username is-secure
Jan  6 02:30:56 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  6 02:30:56 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  6 02:30:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  6 02:30:56 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  6 02:30:57 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  6 02:30:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/public_html/wp-config.php
Jan  6 02:30:57 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  6 02:30:57 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  6 02:30:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/stat -c %a /home/shalinijames/public_html/wp-config.php
Jan  6 02:30:57 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  6 02:30:57 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  6 02:30:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color pingbacks is_disabled
Jan  6 02:30:57 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  6 02:30:57 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  6 02:30:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  6 02:30:57 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  6 02:30:57 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  6 02:30:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color security-keys are_keys_correct
Jan  6 02:30:57 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  6 02:30:58 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  6 02:30:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwtestugo --output=json
Jan  6 02:30:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:30:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:30:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color instance info --format=json --check-updates=true
Jan  6 02:30:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option get auto_update_plugins --format=json
Jan  6 02:31:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option get auto_update_themes --format=json
Jan  6 02:31:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  6 02:31:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo LangPHP php_get_vhost_versions --output=json
Jan  6 02:31:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:31:05 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:31:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color instance login-url --skip-plugins=false --format=json
Jan  6 02:31:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DomainInfo single_domain_data domain=testugo.in return_https_redirect_status=1 --output=json
Jan  6 02:31:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:31:06 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:31:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo Mime list_redirects --output=json
Jan  6 02:31:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:31:06 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:31:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  6 02:31:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option get auto_update_plugins --format=json
Jan  6 02:31:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  6 02:31:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:11 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option get auto_update_themes --format=json
Jan  6 02:31:11 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:11 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt1/wp-config.php
Jan  6 02:31:11 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:11 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  6 02:31:11 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt1/.maintenance
Jan  6 02:31:12 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color db-prefix get
Jan  6 02:31:12 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/tt1 --output=json
Jan  6 02:31:12 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:31:12 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:31:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  6 02:31:12 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:13 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color wpt-cron event reschedule wp_version_check '+2 day'
Jan  6 02:31:13 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:13 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day'
Jan  6 02:31:13 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:14 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  6 02:31:14 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:14 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  6 02:31:14 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:15 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color admin-username is-secure
Jan  6 02:31:15 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:15 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  6 02:31:15 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:15 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt1/wp-config.php
Jan  6 02:31:15 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:15 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/stat -c %a /home/wwwtestugo/public_html/tt1/wp-config.php
Jan  6 02:31:16 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:16 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color pingbacks is_disabled
Jan  6 02:31:16 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:16 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  6 02:31:16 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:16 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color security-keys are_keys_correct
Jan  6 02:31:16 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:17 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color instance info --format=json --check-updates=true
Jan  6 02:31:17 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:21 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option get auto_update_plugins --format=json
Jan  6 02:31:21 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:21 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option get auto_update_themes --format=json
Jan  6 02:31:21 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:22 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  6 02:31:22 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:22 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color instance login-url --skip-plugins=false --format=json
Jan  6 02:31:22 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:22 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  6 02:31:22 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:23 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option get auto_update_plugins --format=json
Jan  6 02:31:23 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:23 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  6 02:31:23 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:27 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option get auto_update_themes --format=json
Jan  6 02:31:27 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:27 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt/wp-config.php
Jan  6 02:31:28 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:28 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  6 02:31:28 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:28 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt/.maintenance
Jan  6 02:31:28 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:28 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color db-prefix get
Jan  6 02:31:28 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:28 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/tt --output=json
Jan  6 02:31:28 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:31:28 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:31:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  6 02:31:29 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:29 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color wpt-cron event reschedule wp_version_check '+2 day'
Jan  6 02:31:29 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:29 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day'
Jan  6 02:31:29 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:30 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  6 02:31:30 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:30 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  6 02:31:30 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:31 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color admin-username is-secure
Jan  6 02:31:31 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:31 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  6 02:31:31 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:31 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt/wp-config.php
Jan  6 02:31:31 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:31 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/stat -c %a /home/wwwtestugo/public_html/tt/wp-config.php
Jan  6 02:31:32 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:32 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color pingbacks is_disabled
Jan  6 02:31:32 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:32 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  6 02:31:32 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:32 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color security-keys are_keys_correct
Jan  6 02:31:32 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:33 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color instance info --format=json --check-updates=true
Jan  6 02:31:33 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:37 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option get auto_update_plugins --format=json
Jan  6 02:31:37 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:37 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option get auto_update_themes --format=json
Jan  6 02:31:38 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:38 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  6 02:31:38 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:38 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color instance login-url --skip-plugins=false --format=json
Jan  6 02:31:38 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:40 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  6 02:31:40 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:40 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option get auto_update_plugins --format=json
Jan  6 02:31:40 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:41 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  6 02:31:41 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:45 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option get auto_update_themes --format=json
Jan  6 02:31:45 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:45 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/HYPE/wp-config.php
Jan  6 02:31:45 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:45 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  6 02:31:45 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:45 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/HYPE/.maintenance
Jan  6 02:31:46 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:46 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color db-prefix get
Jan  6 02:31:46 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:46 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/HYPE --output=json
Jan  6 02:31:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:31:46 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:31:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  6 02:31:46 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:46 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color wpt-cron event reschedule wp_version_check '+2 day'
Jan  6 02:31:47 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:47 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day'
Jan  6 02:31:47 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:47 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  6 02:31:47 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:48 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  6 02:31:48 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:48 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color admin-username is-secure
Jan  6 02:31:48 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:49 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  6 02:31:49 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:49 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/HYPE/wp-config.php
Jan  6 02:31:49 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:49 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/stat -c %a /home/wwwtestugo/public_html/HYPE/wp-config.php
Jan  6 02:31:49 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:49 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color pingbacks is_disabled
Jan  6 02:31:49 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:50 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  6 02:31:50 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:50 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color security-keys are_keys_correct
Jan  6 02:31:50 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:31:50 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:31:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=ugotscom --output=json
Jan  6 02:31:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:31:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:31:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/boniface/blog && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/boniface/blog --no-color instance info --format=json --check-updates=true
Jan  6 02:31:51 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 02:31:51 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 02:31:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DomainInfo single_domain_data domain=ugotechnologies.com return_https_redirect_status=1 --output=json
Jan  6 02:31:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:31:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:31:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom Mime list_redirects --output=json
Jan  6 02:31:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:31:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:31:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/boniface/blog/wp-includes/version.php
Jan  6 02:31:51 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 02:31:51 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 02:31:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/public_html/boniface/blog/wp-includes/version.php
Jan  6 02:31:51 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 02:31:51 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 02:31:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  6 02:31:51 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 02:31:51 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 02:31:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom LangPHP php_get_vhost_versions --output=json
Jan  6 02:31:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:31:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:31:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color instance info --format=json --check-updates=true
Jan  6 02:31:52 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 02:31:58 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 02:31:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option get auto_update_plugins --format=json
Jan  6 02:31:59 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 02:31:59 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 02:31:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option get auto_update_themes --format=json
Jan  6 02:31:59 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 02:31:59 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 02:31:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  6 02:31:59 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 02:31:59 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 02:31:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color instance login-url --skip-plugins=false --format=json
Jan  6 02:31:59 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 02:32:00 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 02:32:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  6 02:32:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 02:32:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 02:32:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option get auto_update_plugins --format=json
Jan  6 02:32:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 02:32:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 02:32:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  6 02:32:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 02:32:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 02:32:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option get auto_update_themes --format=json
Jan  6 02:32:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 02:32:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 02:32:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/UGOCRM/ugo_blg/wp-config.php
Jan  6 02:32:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 02:32:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 02:32:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  6 02:32:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 02:32:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 02:32:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/UGOCRM/ugo_blg/.maintenance
Jan  6 02:32:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 02:32:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 02:32:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color db-prefix get
Jan  6 02:32:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 02:32:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 02:32:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DirectoryPrivacy is_directory_protected dir=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --output=json
Jan  6 02:32:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:32:08 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:32:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  6 02:32:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 02:32:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 02:32:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color wpt-cron event reschedule wp_version_check '+2 day'
Jan  6 02:32:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 02:32:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 02:32:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day'
Jan  6 02:32:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 02:32:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 02:32:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  6 02:32:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 02:32:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 02:32:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  6 02:32:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 02:32:10 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 02:32:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color admin-username is-secure
Jan  6 02:32:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 02:32:10 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 02:32:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  6 02:32:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 02:32:10 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 02:32:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/UGOCRM/ugo_blg/wp-config.php
Jan  6 02:32:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 02:32:10 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 02:32:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/stat -c %a /home/ugotscom/public_html/old/UGOCRM/ugo_blg/wp-config.php
Jan  6 02:32:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 02:32:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 02:32:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color pingbacks is_disabled
Jan  6 02:32:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 02:32:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 02:32:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  6 02:32:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 02:32:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 02:32:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color security-keys are_keys_correct
Jan  6 02:32:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 02:32:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 02:32:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color instance info --format=json --check-updates=true
Jan  6 02:32:12 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 02:32:15 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 02:32:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option get auto_update_plugins --format=json
Jan  6 02:32:15 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 02:32:16 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 02:32:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option get auto_update_themes --format=json
Jan  6 02:32:16 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 02:32:16 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 02:32:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  6 02:32:16 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 02:32:16 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 02:32:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color instance login-url --skip-plugins=false --format=json
Jan  6 02:32:16 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 02:32:16 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 02:32:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  6 02:32:16 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 02:32:18 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 02:32:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option get auto_update_plugins --format=json
Jan  6 02:32:18 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 02:32:18 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 02:32:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  6 02:32:18 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 02:32:19 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 02:32:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option get auto_update_themes --format=json
Jan  6 02:32:19 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 02:32:20 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 02:32:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/site/wp-config.php
Jan  6 02:32:20 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 02:32:20 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 02:32:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  6 02:32:20 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 02:32:20 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 02:32:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/site/.maintenance
Jan  6 02:32:20 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 02:32:20 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 02:32:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color db-prefix get
Jan  6 02:32:20 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 02:32:21 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 02:32:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DirectoryPrivacy is_directory_protected dir=/home/ugotscom/public_html/old/site --output=json
Jan  6 02:32:21 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:32:21 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:32:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  6 02:32:21 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 02:32:21 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 02:32:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color wpt-cron event reschedule wp_version_check '+2 day'
Jan  6 02:32:21 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 02:32:22 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 02:32:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day'
Jan  6 02:32:22 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 02:32:22 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 02:32:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  6 02:32:22 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 02:32:22 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 02:32:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  6 02:32:22 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 02:32:23 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 02:32:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color admin-username is-secure
Jan  6 02:32:23 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 02:32:23 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 02:32:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  6 02:32:23 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 02:32:24 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 02:32:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/site/wp-config.php
Jan  6 02:32:24 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 02:32:24 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 02:32:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/stat -c %a /home/ugotscom/public_html/old/site/wp-config.php
Jan  6 02:32:24 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 02:32:24 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 02:32:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color pingbacks is_disabled
Jan  6 02:32:24 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 02:32:24 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 02:32:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  6 02:32:24 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 02:32:24 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 02:32:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color security-keys are_keys_correct
Jan  6 02:32:24 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 02:32:25 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 02:32:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=woodpeck --output=json
Jan  6 02:32:25 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:32:25 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:32:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html/wp && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/woodpeck/public_html/wp --no-color instance info --format=json --check-updates=true
Jan  6 02:32:25 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0)
Jan  6 02:32:25 host sudo: pam_unix(sudo:session): session closed for user woodpeck
Jan  6 02:32:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck DomainInfo single_domain_data domain=woodpeckerindia.com return_https_redirect_status=1 --output=json
Jan  6 02:32:25 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:32:25 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:32:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck Mime list_redirects --output=json
Jan  6 02:32:25 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:32:25 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:32:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/test -e /home/woodpeck/public_html/wp/wp-includes/version.php
Jan  6 02:32:25 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0)
Jan  6 02:32:25 host sudo: pam_unix(sudo:session): session closed for user woodpeck
Jan  6 02:32:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  6 02:32:25 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0)
Jan  6 02:32:25 host sudo: pam_unix(sudo:session): session closed for user woodpeck
Jan  6 02:32:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck LangPHP php_get_vhost_versions --output=json
Jan  6 02:32:25 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:32:25 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:32:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=palco123 --output=json
Jan  6 02:32:26 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:32:26 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:32:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color instance info --format=json --check-updates=true
Jan  6 02:32:26 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  6 02:32:33 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  6 02:32:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false
Jan  6 02:32:33 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  6 02:32:34 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  6 02:32:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false
Jan  6 02:32:34 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  6 02:32:39 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  6 02:32:39 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  6 02:32:39 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  6 02:32:39 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  6 02:32:39 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 LangPHP php_get_vhost_versions --output=json
Jan  6 02:32:39 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:32:39 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:32:39 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color instance login-url --skip-plugins=false --format=json
Jan  6 02:32:39 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  6 02:32:40 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  6 02:32:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 DomainInfo single_domain_data domain=panlys.com return_https_redirect_status=1 --output=json
Jan  6 02:32:40 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:32:40 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:32:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 Mime list_redirects --output=json
Jan  6 02:32:40 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:32:40 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:32:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  6 02:32:41 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  6 02:32:41 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  6 02:32:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false
Jan  6 02:32:41 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  6 02:32:42 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  6 02:32:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  6 02:32:42 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  6 02:32:47 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  6 02:32:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false
Jan  6 02:32:47 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  6 02:32:53 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  6 02:32:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/public_html/wp-config.php
Jan  6 02:32:53 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  6 02:32:53 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  6 02:32:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  6 02:32:53 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  6 02:32:54 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  6 02:32:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/public_html/.maintenance
Jan  6 02:32:54 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  6 02:32:54 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  6 02:32:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color db-prefix get
Jan  6 02:32:54 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  6 02:32:54 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  6 02:32:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 DirectoryPrivacy is_directory_protected dir=/home/palco123/public_html --output=json
Jan  6 02:32:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:32:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:32:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  6 02:32:54 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  6 02:32:55 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  6 02:32:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color option get auto_update_core_major
Jan  6 02:32:55 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  6 02:32:55 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  6 02:32:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color wpt-cron event reschedule wp_version_check '+2 day'
Jan  6 02:32:56 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  6 02:32:56 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  6 02:32:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day'
Jan  6 02:32:56 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  6 02:32:57 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  6 02:32:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color admin-username is-secure
Jan  6 02:32:57 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  6 02:32:57 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  6 02:32:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  6 02:32:57 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  6 02:32:58 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  6 02:32:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/public_html/wp-config.php
Jan  6 02:32:58 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  6 02:32:58 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  6 02:32:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/stat -c %a /home/palco123/public_html/wp-config.php
Jan  6 02:32:58 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  6 02:32:58 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  6 02:32:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color pingbacks is_disabled
Jan  6 02:32:58 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  6 02:32:58 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  6 02:32:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  6 02:32:58 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  6 02:32:59 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  6 02:32:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color security-keys are_keys_correct
Jan  6 02:32:59 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  6 02:32:59 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  6 02:32:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwresourcehunte --output=json
Jan  6 02:32:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:32:59 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:32:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color instance info --format=json --check-updates=true
Jan  6 02:33:00 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  6 02:33:06 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  6 02:33:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option get auto_update_plugins --format=json
Jan  6 02:33:06 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  6 02:33:06 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  6 02:33:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option get auto_update_themes --format=json
Jan  6 02:33:06 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  6 02:33:06 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  6 02:33:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  6 02:33:06 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  6 02:33:06 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  6 02:33:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte LangPHP php_get_vhost_versions --output=json
Jan  6 02:33:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:33:07 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:33:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color instance login-url --skip-plugins=false --format=json
Jan  6 02:33:07 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  6 02:33:07 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  6 02:33:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte DomainInfo single_domain_data domain=resourcehunters.com return_https_redirect_status=1 --output=json
Jan  6 02:33:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:33:07 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:33:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte Mime list_redirects --output=json
Jan  6 02:33:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:33:07 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:33:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  6 02:33:07 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  6 02:33:08 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  6 02:33:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option get auto_update_plugins --format=json
Jan  6 02:33:08 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  6 02:33:08 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  6 02:33:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  6 02:33:08 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  6 02:33:13 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  6 02:33:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option get auto_update_themes --format=json
Jan  6 02:33:13 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  6 02:33:13 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  6 02:33:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/test -e /home/wwwresourcehunte/public_html/wp-config.php
Jan  6 02:33:13 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  6 02:33:13 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  6 02:33:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  6 02:33:13 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  6 02:33:14 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  6 02:33:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/test -e /home/wwwresourcehunte/public_html/.maintenance
Jan  6 02:33:14 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  6 02:33:14 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  6 02:33:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color db-prefix get
Jan  6 02:33:14 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  6 02:33:14 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  6 02:33:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte DirectoryPrivacy is_directory_protected dir=/home/wwwresourcehunte/public_html --output=json
Jan  6 02:33:14 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:33:14 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:33:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  6 02:33:14 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  6 02:33:14 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  6 02:33:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color wpt-cron event reschedule wp_version_check '+2 day'
Jan  6 02:33:15 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  6 02:33:15 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  6 02:33:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day'
Jan  6 02:33:15 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  6 02:33:15 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  6 02:33:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  6 02:33:15 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  6 02:33:16 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  6 02:33:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  6 02:33:16 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  6 02:33:16 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  6 02:33:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color admin-username is-secure
Jan  6 02:33:16 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  6 02:33:16 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  6 02:33:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  6 02:33:16 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  6 02:33:17 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  6 02:33:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/test -e /home/wwwresourcehunte/public_html/wp-config.php
Jan  6 02:33:17 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  6 02:33:17 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  6 02:33:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/stat -c %a /home/wwwresourcehunte/public_html/wp-config.php
Jan  6 02:33:17 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  6 02:33:17 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  6 02:33:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color pingbacks is_disabled
Jan  6 02:33:17 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  6 02:33:17 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  6 02:33:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  6 02:33:17 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  6 02:33:17 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  6 02:33:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color security-keys are_keys_correct
Jan  6 02:33:17 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  6 02:33:18 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  6 02:33:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 WpToolkitNotification send_admin_auto_updates_notification 'available_updates_text=<br/><br/>Updates are available for the following items:<br/><br/>' 'available_updates_list=1. Plugin "WPForms Lite" on Panlys (https://www.panlys.com). Installed version: 1.6.6. Available version: 1.7.9.<br/><br/>2. Website "Resource Hunters" (http://resourcehunters.com). Installed version: 4.2.34. Available version: 6.1.1.<br/><br/>' installed_updates_text= installed_updates_list= 'failure_updates_text=Updates were not installed for the following items:<br/><br/>' 'failure_updates_list=1. Website "EVM Honda Cochin" (http://www.evmhonda.com): Failed to reset cache for the instance #1: Fatal error: Uncaught Error: Call to undefined function cardealer_is_wpml_active() in
Jan  6 02:33:18 host sudo: wp-toolkit : (command continued) /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-options.php:1041#012Stack trace:#012#0 /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-init.php(22): require_once()#012#1 /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/cardealer-helper-library.php(183): require_once('"'"'/home/wwwevmhon...'"'"')#012#2 /home/wwwevmhonda/public_html/wp-includes/class-wp-hook.php(287): cdhl_include_admin_files('"'"''"'"')#012#3 /home/wwwevmhonda/public_html/wp-includes/class-wp-hook.php(311): WP_Hook->apply_filters(NULL, Array)#012#4 /home/wwwevmhonda/public_html/wp-includes/plugin.php(478): WP_Hook->do_action(Array)#012#5 /home/wwwevmhonda/public_html/wp-settings.php(546): do_action('"'"'init'"'"')#012#6 /usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/vendor/wp-cli/wp-cli/php/WP_CLI/Runner.php(1356):
Jan  6 02:33:18 host sudo: wp-toolkit : (command continued) require('"'"'/home/wwwevmhon...'"'"')#012#7 /usr/local/cpanel/3rdparty/wp-toolkit/plib/ve in /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-options.php on line 1041#012Error: There has been a critical error on your website.Learn more about debugging in WordPress. There has been a critical error on your website.#012<br/><br/>2. Website "/home/mrsclean/public_html/backup" (http://mrsclean.co.in/backup): Failed to reset cache for the instance #5: Error: Error establishing a database connection. This either means that the username and password information in your `wp-config.php` file is incorrect or we can’t contact the database server at `localhost`. This could mean your host’s database server is down.#012<br/><br/>3. Website "/home/mrsclean/public_html/blog" (http://mrsclean.co.in/blog): Failed to reset cache for the instance #6: Error: Error establishing a database
Jan  6 02:33:18 host sudo: wp-toolkit : (command continued) connection. This either means that the username and password information in your `wp-config.php` file is incorrect or we can’t contact the database server at `localhost`. This could mean your host’s database server is down.#012<br/><br/>4. Website "/home/ugotscom/public_html/boniface/blog" (http://ugotechnologies.com/boniface/blog): Failed to reset cache for the instance #13: Error: Error establishing a database connection.#012<br/><br/>5. Website "/home/woodpeck/public_html/wp" (http://woodpeckerindia.com/wp): Failed to reset cache for the instance #16: /bin/sh: line 0: cd: /home/woodpeck/public_html/wp: No such file or directory#012<br/><br/>' --output=json
Jan  6 02:33:18 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:33:18 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:33:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color cli cache clear
Jan  6 02:33:18 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  6 02:33:18 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  6 02:33:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color cli cache clear
Jan  6 02:33:18 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  6 02:33:18 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  6 02:33:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/backup && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/mrsclean/public_html/backup --no-color cli cache clear
Jan  6 02:33:18 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  6 02:33:18 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  6 02:33:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/blog && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/mrsclean/public_html/blog --no-color cli cache clear
Jan  6 02:33:18 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  6 02:33:19 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  6 02:33:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color cli cache clear
Jan  6 02:33:19 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  6 02:33:19 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  6 02:33:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color cli cache clear
Jan  6 02:33:19 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:33:19 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:33:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color cli cache clear
Jan  6 02:33:19 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:33:19 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:33:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color cli cache clear
Jan  6 02:33:19 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:33:19 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:33:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/boniface/blog && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/boniface/blog --no-color cli cache clear
Jan  6 02:33:19 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 02:33:20 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 02:33:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color cli cache clear
Jan  6 02:33:20 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 02:33:20 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 02:33:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color cli cache clear
Jan  6 02:33:20 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 02:33:20 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 02:33:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html/wp && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/woodpeck/public_html/wp --no-color cli cache clear
Jan  6 02:33:20 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0)
Jan  6 02:33:20 host sudo: pam_unix(sudo:session): session closed for user woodpeck
Jan  6 02:33:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color cli cache clear
Jan  6 02:33:20 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  6 02:33:20 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  6 02:33:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color cli cache clear
Jan  6 02:33:20 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  6 02:33:20 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  6 02:33:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet
Jan  6 02:33:21 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  6 02:33:21 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  6 02:33:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet
Jan  6 02:33:21 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  6 02:33:21 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  6 02:33:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet
Jan  6 02:33:21 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  6 02:33:22 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  6 02:33:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet
Jan  6 02:33:22 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:33:23 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet
Jan  6 02:33:23 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:33:23 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet
Jan  6 02:33:23 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 02:33:23 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet
Jan  6 02:33:24 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 02:33:24 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet
Jan  6 02:33:24 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 02:33:24 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet
Jan  6 02:33:24 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  6 02:33:25 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  6 02:33:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet
Jan  6 02:33:25 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  6 02:33:25 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  6 02:33:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c httpd -v
Jan  6 02:33:25 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:33:25 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:33:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwevmhonda/evmhonda.com/wp-toolkit.conf
Jan  6 02:33:25 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:33:25 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:33:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwevmhonda/evmhonda.com/wp-toolkit.conf
Jan  6 02:33:25 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:33:25 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:33:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwevmhonda/evmhonda.com/wp-toolkit.conf
Jan  6 02:33:25 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:33:25 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:33:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwevmhonda/evmhonda.com/wp-toolkit.conf
Jan  6 02:33:25 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:33:25 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:33:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf
Jan  6 02:33:25 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:33:25 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:33:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf
Jan  6 02:33:25 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:33:25 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:33:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf
Jan  6 02:33:25 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:33:25 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:33:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf
Jan  6 02:33:25 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:33:25 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:33:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/shalinijames/shalinijames.com/wp-toolkit.conf
Jan  6 02:33:25 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:33:25 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:33:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/shalinijames/shalinijames.com/wp-toolkit.conf
Jan  6 02:33:26 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:33:26 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:33:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/shalinijames/shalinijames.com/wp-toolkit.conf
Jan  6 02:33:26 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:33:26 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:33:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/shalinijames/shalinijames.com/wp-toolkit.conf
Jan  6 02:33:26 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:33:26 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:33:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  6 02:33:26 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:33:26 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:33:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  6 02:33:26 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:33:26 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:33:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  6 02:33:26 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:33:26 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:33:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  6 02:33:26 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:33:26 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:33:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  6 02:33:26 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:33:26 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:33:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  6 02:33:26 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:33:26 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:33:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  6 02:33:26 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:33:26 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:33:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  6 02:33:26 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:33:26 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:33:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  6 02:33:26 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:33:26 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:33:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  6 02:33:26 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:33:26 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:33:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  6 02:33:26 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:33:26 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:33:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  6 02:33:26 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:33:26 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:33:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf
Jan  6 02:33:26 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:33:26 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:33:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf
Jan  6 02:33:26 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:33:26 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:33:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf
Jan  6 02:33:26 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:33:26 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:33:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf
Jan  6 02:33:26 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:33:26 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:33:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf
Jan  6 02:33:26 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:33:26 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:33:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf
Jan  6 02:33:26 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:33:26 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:33:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf
Jan  6 02:33:26 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:33:26 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:33:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf
Jan  6 02:33:26 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:33:26 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:33:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/palco123/panlys.com/wp-toolkit.conf
Jan  6 02:33:26 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:33:26 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:33:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/palco123/panlys.com/wp-toolkit.conf
Jan  6 02:33:26 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:33:26 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:33:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/palco123/panlys.com/wp-toolkit.conf
Jan  6 02:33:26 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:33:26 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:33:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/palco123/panlys.com/wp-toolkit.conf
Jan  6 02:33:26 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:33:26 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:33:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf
Jan  6 02:33:26 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:33:26 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:33:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf
Jan  6 02:33:26 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:33:26 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:33:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf
Jan  6 02:33:27 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:33:27 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:33:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf
Jan  6 02:33:27 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 02:33:27 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 02:49:39 host sshd[10178]: Invalid user postgres from 94.139.201.56 port 44542
Jan  6 02:49:39 host sshd[10178]: input_userauth_request: invalid user postgres [preauth]
Jan  6 02:49:39 host sshd[10178]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 02:49:39 host sshd[10178]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.139.201.56
Jan  6 02:49:41 host sshd[10178]: Failed password for invalid user postgres from 94.139.201.56 port 44542 ssh2
Jan  6 02:49:41 host sshd[10178]: Received disconnect from 94.139.201.56 port 44542:11: Bye Bye [preauth]
Jan  6 02:49:41 host sshd[10178]: Disconnected from 94.139.201.56 port 44542 [preauth]
Jan  6 02:54:58 host sshd[10858]: User root from 94.139.201.56 not allowed because not listed in AllowUsers
Jan  6 02:54:58 host sshd[10858]: input_userauth_request: invalid user root [preauth]
Jan  6 02:54:58 host unix_chkpwd[10862]: password check failed for user (root)
Jan  6 02:54:58 host sshd[10858]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.139.201.56  user=root
Jan  6 02:54:58 host sshd[10858]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 02:55:00 host sshd[10858]: Failed password for invalid user root from 94.139.201.56 port 41342 ssh2
Jan  6 02:55:00 host sshd[10858]: Received disconnect from 94.139.201.56 port 41342:11: Bye Bye [preauth]
Jan  6 02:55:00 host sshd[10858]: Disconnected from 94.139.201.56 port 41342 [preauth]
Jan  6 03:08:28 host sshd[12812]: User root from 103.94.168.42 not allowed because not listed in AllowUsers
Jan  6 03:08:28 host sshd[12812]: input_userauth_request: invalid user root [preauth]
Jan  6 03:08:28 host unix_chkpwd[12816]: password check failed for user (root)
Jan  6 03:08:28 host sshd[12812]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.94.168.42  user=root
Jan  6 03:08:28 host sshd[12812]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 03:08:30 host sshd[12812]: Failed password for invalid user root from 103.94.168.42 port 32590 ssh2
Jan  6 03:08:30 host sshd[12812]: Received disconnect from 103.94.168.42 port 32590:11: Bye Bye [preauth]
Jan  6 03:08:30 host sshd[12812]: Disconnected from 103.94.168.42 port 32590 [preauth]
Jan  6 03:09:14 host sshd[12929]: User root from 186.195.134.147 not allowed because not listed in AllowUsers
Jan  6 03:09:14 host sshd[12929]: input_userauth_request: invalid user root [preauth]
Jan  6 03:09:14 host unix_chkpwd[12934]: password check failed for user (root)
Jan  6 03:09:14 host sshd[12929]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.195.134.147  user=root
Jan  6 03:09:14 host sshd[12929]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 03:09:16 host sshd[12929]: Failed password for invalid user root from 186.195.134.147 port 39698 ssh2
Jan  6 03:09:17 host sshd[12929]: Received disconnect from 186.195.134.147 port 39698:11: Bye Bye [preauth]
Jan  6 03:09:17 host sshd[12929]: Disconnected from 186.195.134.147 port 39698 [preauth]
Jan  6 03:09:26 host sshd[12954]: Invalid user admin from 187.190.40.6 port 22507
Jan  6 03:09:26 host sshd[12954]: input_userauth_request: invalid user admin [preauth]
Jan  6 03:09:26 host sshd[12954]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 03:09:26 host sshd[12954]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.190.40.6
Jan  6 03:09:27 host sshd[12954]: Failed password for invalid user admin from 187.190.40.6 port 22507 ssh2
Jan  6 03:09:28 host sshd[12954]: Received disconnect from 187.190.40.6 port 22507:11: Bye Bye [preauth]
Jan  6 03:09:28 host sshd[12954]: Disconnected from 187.190.40.6 port 22507 [preauth]
Jan  6 03:09:38 host sshd[12995]: User root from 89.208.105.82 not allowed because not listed in AllowUsers
Jan  6 03:09:38 host sshd[12995]: input_userauth_request: invalid user root [preauth]
Jan  6 03:09:39 host unix_chkpwd[12999]: password check failed for user (root)
Jan  6 03:09:39 host sshd[12995]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.208.105.82  user=root
Jan  6 03:09:39 host sshd[12995]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 03:09:40 host sshd[12995]: Failed password for invalid user root from 89.208.105.82 port 43994 ssh2
Jan  6 03:09:41 host sshd[12995]: Received disconnect from 89.208.105.82 port 43994:11: Bye Bye [preauth]
Jan  6 03:09:41 host sshd[12995]: Disconnected from 89.208.105.82 port 43994 [preauth]
Jan  6 03:14:12 host sshd[13788]: Invalid user vikas from 45.67.221.56 port 58234
Jan  6 03:14:12 host sshd[13788]: input_userauth_request: invalid user vikas [preauth]
Jan  6 03:14:12 host sshd[13788]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 03:14:12 host sshd[13788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.67.221.56
Jan  6 03:14:14 host sshd[13788]: Failed password for invalid user vikas from 45.67.221.56 port 58234 ssh2
Jan  6 03:14:15 host sshd[13788]: Received disconnect from 45.67.221.56 port 58234:11: Bye Bye [preauth]
Jan  6 03:14:15 host sshd[13788]: Disconnected from 45.67.221.56 port 58234 [preauth]
Jan  6 03:14:26 host sshd[13835]: Invalid user admin from 103.94.168.42 port 18718
Jan  6 03:14:26 host sshd[13835]: input_userauth_request: invalid user admin [preauth]
Jan  6 03:14:26 host sshd[13835]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 03:14:26 host sshd[13835]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.94.168.42
Jan  6 03:14:28 host sshd[13835]: Failed password for invalid user admin from 103.94.168.42 port 18718 ssh2
Jan  6 03:14:28 host sshd[13835]: Received disconnect from 103.94.168.42 port 18718:11: Bye Bye [preauth]
Jan  6 03:14:28 host sshd[13835]: Disconnected from 103.94.168.42 port 18718 [preauth]
Jan  6 03:14:44 host sshd[13900]: User root from 187.190.40.6 not allowed because not listed in AllowUsers
Jan  6 03:14:44 host sshd[13900]: input_userauth_request: invalid user root [preauth]
Jan  6 03:14:44 host unix_chkpwd[13907]: password check failed for user (root)
Jan  6 03:14:44 host sshd[13900]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.190.40.6  user=root
Jan  6 03:14:44 host sshd[13900]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 03:14:46 host sshd[13900]: Failed password for invalid user root from 187.190.40.6 port 17086 ssh2
Jan  6 03:14:46 host sshd[13900]: Received disconnect from 187.190.40.6 port 17086:11: Bye Bye [preauth]
Jan  6 03:14:46 host sshd[13900]: Disconnected from 187.190.40.6 port 17086 [preauth]
Jan  6 03:15:29 host sshd[14177]: Invalid user admin from 89.208.105.82 port 39424
Jan  6 03:15:29 host sshd[14177]: input_userauth_request: invalid user admin [preauth]
Jan  6 03:15:29 host sshd[14177]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 03:15:29 host sshd[14177]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.208.105.82
Jan  6 03:15:32 host sshd[14177]: Failed password for invalid user admin from 89.208.105.82 port 39424 ssh2
Jan  6 03:15:32 host sshd[14177]: Received disconnect from 89.208.105.82 port 39424:11: Bye Bye [preauth]
Jan  6 03:15:32 host sshd[14177]: Disconnected from 89.208.105.82 port 39424 [preauth]
Jan  6 03:15:39 host sshd[14221]: Invalid user arkserver from 186.195.134.147 port 50040
Jan  6 03:15:39 host sshd[14221]: input_userauth_request: invalid user arkserver [preauth]
Jan  6 03:15:39 host sshd[14221]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 03:15:39 host sshd[14221]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.195.134.147
Jan  6 03:15:41 host sshd[14221]: Failed password for invalid user arkserver from 186.195.134.147 port 50040 ssh2
Jan  6 03:15:42 host sshd[14221]: Received disconnect from 186.195.134.147 port 50040:11: Bye Bye [preauth]
Jan  6 03:15:42 host sshd[14221]: Disconnected from 186.195.134.147 port 50040 [preauth]
Jan  6 03:15:54 host sshd[14268]: Invalid user deployer from 45.67.221.56 port 57022
Jan  6 03:15:54 host sshd[14268]: input_userauth_request: invalid user deployer [preauth]
Jan  6 03:15:54 host sshd[14268]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 03:15:54 host sshd[14268]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.67.221.56
Jan  6 03:15:56 host sshd[14268]: Failed password for invalid user deployer from 45.67.221.56 port 57022 ssh2
Jan  6 03:15:57 host sshd[14268]: Received disconnect from 45.67.221.56 port 57022:11: Bye Bye [preauth]
Jan  6 03:15:57 host sshd[14268]: Disconnected from 45.67.221.56 port 57022 [preauth]
Jan  6 03:17:04 host sshd[14423]: User root from 45.67.221.56 not allowed because not listed in AllowUsers
Jan  6 03:17:04 host sshd[14423]: input_userauth_request: invalid user root [preauth]
Jan  6 03:17:04 host unix_chkpwd[14425]: password check failed for user (root)
Jan  6 03:17:04 host sshd[14423]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.67.221.56  user=root
Jan  6 03:17:04 host sshd[14423]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 03:17:06 host sshd[14423]: Failed password for invalid user root from 45.67.221.56 port 51996 ssh2
Jan  6 03:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  6 03:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 03:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 03:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  6 03:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 03:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 03:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  6 03:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 03:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 03:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  6 03:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 03:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 03:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  6 03:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 03:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 03:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  6 03:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 03:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 03:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  6 03:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 03:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 03:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  6 03:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 03:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 03:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  6 03:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 03:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 03:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  6 03:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 03:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 03:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  6 03:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 03:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 03:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  6 03:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 03:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 03:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  6 03:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 03:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 03:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=vfmassets user-2=shalinijames user-3=wwwtestugo user-4=pmcresources user-5=disposeat user-6=wwwkmaorg user-7=remysagr user-8=woodpeck user-9=wwwkapin user-10=palco123 user-11=gifterman user-12=phmetals user-13=kottayamcalldriv user-14=wwwnexidigital user-15=mrsclean user-16=bonifacegroup user-17=wwwevmhonda user-18=straightcurve user-19=wwwletsstalkfood user-20=a2zgroup user-21=dartsimp user-22=laundryboniface user-23=cochintaxi user-24=wwwkaretakers user-25=travelboniface user-26=keralaholi user-27=wwwresourcehunte user-28=wwwrmswll user-29=ugotscom user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  6 03:21:55 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  6 03:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 03:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 03:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  6 03:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 03:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 03:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-biz7mW5hKa9dX9L4.~
Jan  6 03:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 03:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 03:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-biz7mW5hKa9dX9L4.~'
Jan  6 03:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 03:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 03:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-biz7mW5hKa9dX9L4.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  6 03:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 03:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 03:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  6 03:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 03:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 03:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  6 03:21:55 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 03:21:55 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 03:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  6 03:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 03:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 03:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  6 03:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 03:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 03:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  6 03:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 03:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 03:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  6 03:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 03:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 03:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  6 03:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 03:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 03:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  6 03:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  6 03:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  6 03:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  6 03:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  6 03:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  6 03:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  6 03:22:00 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  6 03:22:02 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  6 03:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  6 03:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 03:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 03:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  6 03:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 03:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 03:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  6 03:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 03:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 03:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  6 03:22:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 03:22:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 03:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  6 03:22:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 03:22:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 03:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  6 03:22:09 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  6 03:22:10 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  6 03:41:45 host sshd[18208]: Invalid user ah from 194.110.203.109 port 60182
Jan  6 03:41:45 host sshd[18208]: input_userauth_request: invalid user ah [preauth]
Jan  6 03:41:45 host sshd[18208]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 03:41:45 host sshd[18208]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109
Jan  6 03:41:47 host sshd[18208]: Failed password for invalid user ah from 194.110.203.109 port 60182 ssh2
Jan  6 03:41:51 host sshd[18208]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 03:41:53 host sshd[18208]: Failed password for invalid user ah from 194.110.203.109 port 60182 ssh2
Jan  6 03:41:56 host sshd[18208]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 03:41:58 host sshd[18208]: Failed password for invalid user ah from 194.110.203.109 port 60182 ssh2
Jan  6 03:42:01 host sshd[18208]: Connection closed by 194.110.203.109 port 60182 [preauth]
Jan  6 03:42:01 host sshd[18208]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109
Jan  6 03:45:40 host sshd[18795]: Invalid user terry from 107.189.30.59 port 42660
Jan  6 03:45:40 host sshd[18795]: input_userauth_request: invalid user terry [preauth]
Jan  6 03:45:40 host sshd[18795]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 03:45:40 host sshd[18795]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59
Jan  6 03:45:42 host sshd[18795]: Failed password for invalid user terry from 107.189.30.59 port 42660 ssh2
Jan  6 03:45:43 host sshd[18795]: Connection closed by 107.189.30.59 port 42660 [preauth]
Jan  6 03:51:25 host sshd[19618]: Invalid user lab from 195.226.194.142 port 47580
Jan  6 03:51:25 host sshd[19618]: input_userauth_request: invalid user lab [preauth]
Jan  6 03:51:26 host sshd[19618]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 03:51:26 host sshd[19618]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.142
Jan  6 03:51:27 host sshd[19618]: Failed password for invalid user lab from 195.226.194.142 port 47580 ssh2
Jan  6 03:51:28 host sshd[19618]: Received disconnect from 195.226.194.142 port 47580:11: Bye Bye [preauth]
Jan  6 03:51:28 host sshd[19618]: Disconnected from 195.226.194.142 port 47580 [preauth]
Jan  6 04:03:30 host sshd[21326]: Invalid user song from 197.5.145.93 port 31052
Jan  6 04:03:30 host sshd[21326]: input_userauth_request: invalid user song [preauth]
Jan  6 04:03:30 host sshd[21326]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 04:03:30 host sshd[21326]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.5.145.93
Jan  6 04:03:32 host sshd[21326]: Failed password for invalid user song from 197.5.145.93 port 31052 ssh2
Jan  6 04:03:33 host sshd[21326]: Received disconnect from 197.5.145.93 port 31052:11: Bye Bye [preauth]
Jan  6 04:03:33 host sshd[21326]: Disconnected from 197.5.145.93 port 31052 [preauth]
Jan  6 04:04:15 host sshd[21398]: Invalid user scan from 20.223.60.103 port 5824
Jan  6 04:04:15 host sshd[21398]: input_userauth_request: invalid user scan [preauth]
Jan  6 04:04:15 host sshd[21398]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 04:04:15 host sshd[21398]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.223.60.103
Jan  6 04:04:17 host sshd[21398]: Failed password for invalid user scan from 20.223.60.103 port 5824 ssh2
Jan  6 04:04:17 host sshd[21398]: Received disconnect from 20.223.60.103 port 5824:11: Bye Bye [preauth]
Jan  6 04:04:17 host sshd[21398]: Disconnected from 20.223.60.103 port 5824 [preauth]
Jan  6 04:04:23 host sshd[21408]: Invalid user jira from 197.5.145.93 port 31053
Jan  6 04:04:23 host sshd[21408]: input_userauth_request: invalid user jira [preauth]
Jan  6 04:04:23 host sshd[21408]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 04:04:23 host sshd[21408]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.5.145.93
Jan  6 04:04:25 host sshd[21408]: Failed password for invalid user jira from 197.5.145.93 port 31053 ssh2
Jan  6 04:04:25 host sshd[21408]: Received disconnect from 197.5.145.93 port 31053:11: Bye Bye [preauth]
Jan  6 04:04:25 host sshd[21408]: Disconnected from 197.5.145.93 port 31053 [preauth]
Jan  6 04:05:01 host sshd[21480]: User root from 197.5.145.93 not allowed because not listed in AllowUsers
Jan  6 04:05:01 host sshd[21480]: input_userauth_request: invalid user root [preauth]
Jan  6 04:05:02 host unix_chkpwd[21506]: password check failed for user (root)
Jan  6 04:05:02 host sshd[21480]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.5.145.93  user=root
Jan  6 04:05:02 host sshd[21480]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 04:05:04 host sshd[21480]: Failed password for invalid user root from 197.5.145.93 port 31054 ssh2
Jan  6 04:05:04 host sshd[21480]: Received disconnect from 197.5.145.93 port 31054:11: Bye Bye [preauth]
Jan  6 04:05:04 host sshd[21480]: Disconnected from 197.5.145.93 port 31054 [preauth]
Jan  6 04:05:14 host sshd[21566]: Invalid user ubuntu from 51.250.64.79 port 56626
Jan  6 04:05:14 host sshd[21566]: input_userauth_request: invalid user ubuntu [preauth]
Jan  6 04:05:14 host sshd[21566]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 04:05:14 host sshd[21566]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.250.64.79
Jan  6 04:05:16 host sshd[21566]: Failed password for invalid user ubuntu from 51.250.64.79 port 56626 ssh2
Jan  6 04:05:16 host sshd[21566]: Received disconnect from 51.250.64.79 port 56626:11: Bye Bye [preauth]
Jan  6 04:05:16 host sshd[21566]: Disconnected from 51.250.64.79 port 56626 [preauth]
Jan  6 04:05:17 host sshd[21574]: Connection reset by 182.72.184.18 port 47274 [preauth]
Jan  6 04:05:30 host sshd[21610]: Invalid user scan from 159.89.49.171 port 53418
Jan  6 04:05:30 host sshd[21610]: input_userauth_request: invalid user scan [preauth]
Jan  6 04:05:30 host sshd[21610]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 04:05:30 host sshd[21610]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.49.171
Jan  6 04:05:32 host sshd[21610]: Failed password for invalid user scan from 159.89.49.171 port 53418 ssh2
Jan  6 04:05:32 host sshd[21610]: Received disconnect from 159.89.49.171 port 53418:11: Bye Bye [preauth]
Jan  6 04:05:32 host sshd[21610]: Disconnected from 159.89.49.171 port 53418 [preauth]
Jan  6 04:05:43 host sshd[21624]: Invalid user web from 168.232.198.3 port 34560
Jan  6 04:05:43 host sshd[21624]: input_userauth_request: invalid user web [preauth]
Jan  6 04:05:43 host sshd[21624]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 04:05:43 host sshd[21624]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.232.198.3
Jan  6 04:05:45 host sshd[21624]: Failed password for invalid user web from 168.232.198.3 port 34560 ssh2
Jan  6 04:05:45 host sshd[21624]: Received disconnect from 168.232.198.3 port 34560:11: Bye Bye [preauth]
Jan  6 04:05:45 host sshd[21624]: Disconnected from 168.232.198.3 port 34560 [preauth]
Jan  6 04:06:23 host sshd[21733]: Invalid user git from 177.200.212.34 port 52862
Jan  6 04:06:23 host sshd[21733]: input_userauth_request: invalid user git [preauth]
Jan  6 04:06:23 host sshd[21733]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 04:06:23 host sshd[21733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.200.212.34
Jan  6 04:06:25 host sshd[21733]: Failed password for invalid user git from 177.200.212.34 port 52862 ssh2
Jan  6 04:06:25 host sshd[21733]: Received disconnect from 177.200.212.34 port 52862:11: Bye Bye [preauth]
Jan  6 04:06:25 host sshd[21733]: Disconnected from 177.200.212.34 port 52862 [preauth]
Jan  6 04:07:24 host sshd[21935]: Connection reset by 182.72.184.18 port 51046 [preauth]
Jan  6 04:07:31 host sshd[21963]: Invalid user ts from 20.223.60.103 port 5824
Jan  6 04:07:31 host sshd[21963]: input_userauth_request: invalid user ts [preauth]
Jan  6 04:07:31 host sshd[21963]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 04:07:31 host sshd[21963]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.223.60.103
Jan  6 04:07:33 host sshd[21963]: Failed password for invalid user ts from 20.223.60.103 port 5824 ssh2
Jan  6 04:07:33 host sshd[21963]: Received disconnect from 20.223.60.103 port 5824:11: Bye Bye [preauth]
Jan  6 04:07:33 host sshd[21963]: Disconnected from 20.223.60.103 port 5824 [preauth]
Jan  6 04:07:37 host sshd[21979]: User root from 51.250.64.79 not allowed because not listed in AllowUsers
Jan  6 04:07:37 host sshd[21979]: input_userauth_request: invalid user root [preauth]
Jan  6 04:07:38 host unix_chkpwd[21982]: password check failed for user (root)
Jan  6 04:07:38 host sshd[21979]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.250.64.79  user=root
Jan  6 04:07:38 host sshd[21979]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 04:07:39 host sshd[21979]: Failed password for invalid user root from 51.250.64.79 port 34568 ssh2
Jan  6 04:07:40 host sshd[21979]: Received disconnect from 51.250.64.79 port 34568:11: Bye Bye [preauth]
Jan  6 04:07:40 host sshd[21979]: Disconnected from 51.250.64.79 port 34568 [preauth]
Jan  6 04:07:51 host sshd[22025]: Did not receive identification string from 41.77.11.130 port 51270
Jan  6 04:08:12 host sshd[22068]: Connection reset by 182.72.184.18 port 48440 [preauth]
Jan  6 04:08:25 host sshd[22080]: Invalid user pedro from 159.89.49.171 port 58534
Jan  6 04:08:25 host sshd[22080]: input_userauth_request: invalid user pedro [preauth]
Jan  6 04:08:25 host sshd[22080]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 04:08:25 host sshd[22080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.49.171
Jan  6 04:08:28 host sshd[22105]: User root from 168.232.198.3 not allowed because not listed in AllowUsers
Jan  6 04:08:28 host sshd[22105]: input_userauth_request: invalid user root [preauth]
Jan  6 04:08:28 host unix_chkpwd[22108]: password check failed for user (root)
Jan  6 04:08:28 host sshd[22105]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.232.198.3  user=root
Jan  6 04:08:28 host sshd[22105]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 04:08:28 host sshd[22080]: Failed password for invalid user pedro from 159.89.49.171 port 58534 ssh2
Jan  6 04:08:28 host sshd[22080]: Received disconnect from 159.89.49.171 port 58534:11: Bye Bye [preauth]
Jan  6 04:08:28 host sshd[22080]: Disconnected from 159.89.49.171 port 58534 [preauth]
Jan  6 04:08:30 host sshd[22105]: Failed password for invalid user root from 168.232.198.3 port 44260 ssh2
Jan  6 04:08:30 host sshd[22105]: Received disconnect from 168.232.198.3 port 44260:11: Bye Bye [preauth]
Jan  6 04:08:30 host sshd[22105]: Disconnected from 168.232.198.3 port 44260 [preauth]
Jan  6 04:08:43 host sshd[22168]: User root from 20.223.60.103 not allowed because not listed in AllowUsers
Jan  6 04:08:43 host sshd[22168]: input_userauth_request: invalid user root [preauth]
Jan  6 04:08:43 host unix_chkpwd[22171]: password check failed for user (root)
Jan  6 04:08:43 host sshd[22168]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.223.60.103  user=root
Jan  6 04:08:43 host sshd[22168]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 04:08:45 host sshd[22168]: Failed password for invalid user root from 20.223.60.103 port 5824 ssh2
Jan  6 04:08:45 host sshd[22168]: Received disconnect from 20.223.60.103 port 5824:11: Bye Bye [preauth]
Jan  6 04:08:45 host sshd[22168]: Disconnected from 20.223.60.103 port 5824 [preauth]
Jan  6 04:09:08 host sshd[22259]: Connection reset by 182.72.184.18 port 45868 [preauth]
Jan  6 04:09:09 host sshd[22257]: User root from 177.200.212.34 not allowed because not listed in AllowUsers
Jan  6 04:09:09 host sshd[22257]: input_userauth_request: invalid user root [preauth]
Jan  6 04:09:09 host unix_chkpwd[22262]: password check failed for user (root)
Jan  6 04:09:09 host sshd[22257]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.200.212.34  user=root
Jan  6 04:09:09 host sshd[22257]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 04:09:11 host sshd[22257]: Failed password for invalid user root from 177.200.212.34 port 41872 ssh2
Jan  6 04:09:11 host sshd[22257]: Received disconnect from 177.200.212.34 port 41872:11: Bye Bye [preauth]
Jan  6 04:09:11 host sshd[22257]: Disconnected from 177.200.212.34 port 41872 [preauth]
Jan  6 04:09:35 host sshd[22350]: User root from 159.89.49.171 not allowed because not listed in AllowUsers
Jan  6 04:09:35 host sshd[22350]: input_userauth_request: invalid user root [preauth]
Jan  6 04:09:35 host unix_chkpwd[22353]: password check failed for user (root)
Jan  6 04:09:35 host sshd[22350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.49.171  user=root
Jan  6 04:09:35 host sshd[22350]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 04:09:37 host sshd[22350]: Failed password for invalid user root from 159.89.49.171 port 53686 ssh2
Jan  6 04:10:04 host sshd[22443]: Connection reset by 182.72.184.18 port 43274 [preauth]
Jan  6 04:11:57 host sshd[22785]: Connection reset by 182.72.184.18 port 38090 [preauth]
Jan  6 04:12:53 host sshd[22883]: Connection reset by 182.72.184.18 port 35500 [preauth]
Jan  6 04:13:49 host sshd[23002]: Connection reset by 182.72.184.18 port 32930 [preauth]
Jan  6 04:14:46 host sshd[23132]: Connection reset by 182.72.184.18 port 58580 [preauth]
Jan  6 04:15:42 host sshd[23254]: Connection reset by 182.72.184.18 port 55982 [preauth]
Jan  6 04:17:35 host sshd[23608]: Connection reset by 182.72.184.18 port 50820 [preauth]
Jan  6 04:18:31 host sshd[23712]: Connection reset by 182.72.184.18 port 48232 [preauth]
Jan  6 04:20:23 host sshd[23922]: Connection reset by 182.72.184.18 port 43060 [preauth]
Jan  6 04:21:22 host sshd[24066]: Invalid user user1 from 46.105.29.159 port 57066
Jan  6 04:21:22 host sshd[24066]: input_userauth_request: invalid user user1 [preauth]
Jan  6 04:21:22 host sshd[24066]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 04:21:22 host sshd[24066]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.105.29.159
Jan  6 04:21:24 host sshd[24075]: Connection reset by 182.72.184.19 port 40472 [preauth]
Jan  6 04:21:24 host sshd[24066]: Failed password for invalid user user1 from 46.105.29.159 port 57066 ssh2
Jan  6 04:21:24 host sshd[24066]: Received disconnect from 46.105.29.159 port 57066:11: Bye Bye [preauth]
Jan  6 04:21:24 host sshd[24066]: Disconnected from 46.105.29.159 port 57066 [preauth]
Jan  6 04:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  6 04:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 04:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 04:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  6 04:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 04:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 04:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  6 04:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 04:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 04:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  6 04:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 04:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 04:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  6 04:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 04:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 04:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  6 04:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 04:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 04:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  6 04:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 04:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 04:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  6 04:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 04:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 04:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  6 04:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 04:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 04:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  6 04:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 04:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 04:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  6 04:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 04:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 04:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  6 04:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 04:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 04:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  6 04:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 04:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 04:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=laundryboniface user-2=a2zgroup user-3=dartsimp user-4=wwwkaretakers user-5=cochintaxi user-6=keralaholi user-7=wwwresourcehunte user-8=wwwrmswll user-9=ugotscom user-10=travelboniface user-11=wwwpmcresource user-12=pmcresources user-13=vfmassets user-14=shalinijames user-15=wwwtestugo user-16=wwwkapin user-17=woodpeck user-18=disposeat user-19=remysagr user-20=wwwkmaorg user-21=mrsclean user-22=wwwnexidigital user-23=palco123 user-24=gifterman user-25=kottayamcalldriv user-26=phmetals user-27=straightcurve user-28=wwwletsstalkfood user-29=bonifacegroup user-30=wwwevmhonda feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  6 04:21:54 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  6 04:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 04:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 04:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  6 04:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 04:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 04:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ZLZSLzLbJdVPeMof.~
Jan  6 04:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 04:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 04:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ZLZSLzLbJdVPeMof.~'
Jan  6 04:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 04:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 04:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ZLZSLzLbJdVPeMof.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  6 04:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 04:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 04:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  6 04:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 04:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 04:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  6 04:21:57 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 04:21:57 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 04:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  6 04:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 04:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 04:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  6 04:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 04:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 04:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  6 04:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 04:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 04:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  6 04:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 04:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 04:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  6 04:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 04:21:59 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 04:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  6 04:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  6 04:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  6 04:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  6 04:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  6 04:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  6 04:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  6 04:22:02 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  6 04:22:04 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  6 04:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  6 04:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 04:22:05 host sshd[24401]: Invalid user ansibleuser from 43.153.54.117 port 41292
Jan  6 04:22:05 host sshd[24401]: input_userauth_request: invalid user ansibleuser [preauth]
Jan  6 04:22:05 host sshd[24401]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 04:22:05 host sshd[24401]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.54.117
Jan  6 04:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 04:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  6 04:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 04:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 04:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  6 04:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 04:22:08 host sshd[24401]: Failed password for invalid user ansibleuser from 43.153.54.117 port 41292 ssh2
Jan  6 04:22:08 host sshd[24401]: Received disconnect from 43.153.54.117 port 41292:11: Bye Bye [preauth]
Jan  6 04:22:08 host sshd[24401]: Disconnected from 43.153.54.117 port 41292 [preauth]
Jan  6 04:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 04:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  6 04:22:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 04:22:10 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 04:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  6 04:22:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 04:22:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 04:22:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  6 04:22:12 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  6 04:22:13 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  6 04:22:41 host sshd[24528]: Invalid user debian from 51.68.224.114 port 40998
Jan  6 04:22:41 host sshd[24528]: input_userauth_request: invalid user debian [preauth]
Jan  6 04:22:41 host sshd[24528]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 04:22:41 host sshd[24528]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.224.114
Jan  6 04:22:43 host sshd[24528]: Failed password for invalid user debian from 51.68.224.114 port 40998 ssh2
Jan  6 04:22:44 host sshd[24528]: Received disconnect from 51.68.224.114 port 40998:11: Bye Bye [preauth]
Jan  6 04:22:44 host sshd[24528]: Disconnected from 51.68.224.114 port 40998 [preauth]
Jan  6 04:23:17 host sshd[24610]: User root from 35.226.175.103 not allowed because not listed in AllowUsers
Jan  6 04:23:17 host sshd[24610]: input_userauth_request: invalid user root [preauth]
Jan  6 04:23:17 host unix_chkpwd[24613]: password check failed for user (root)
Jan  6 04:23:17 host sshd[24610]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.226.175.103  user=root
Jan  6 04:23:17 host sshd[24610]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 04:23:19 host sshd[24610]: Failed password for invalid user root from 35.226.175.103 port 49146 ssh2
Jan  6 04:23:19 host sshd[24610]: Received disconnect from 35.226.175.103 port 49146:11: Bye Bye [preauth]
Jan  6 04:23:19 host sshd[24610]: Disconnected from 35.226.175.103 port 49146 [preauth]
Jan  6 04:23:20 host sshd[24617]: Connection reset by 182.72.184.19 port 35316 [preauth]
Jan  6 04:24:49 host sshd[24798]: User root from 103.66.50.94 not allowed because not listed in AllowUsers
Jan  6 04:24:49 host sshd[24798]: input_userauth_request: invalid user root [preauth]
Jan  6 04:24:49 host unix_chkpwd[24800]: password check failed for user (root)
Jan  6 04:24:49 host sshd[24798]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.66.50.94  user=root
Jan  6 04:24:49 host sshd[24798]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 04:24:51 host sshd[24798]: Failed password for invalid user root from 103.66.50.94 port 38446 ssh2
Jan  6 04:24:51 host sshd[24798]: Received disconnect from 103.66.50.94 port 38446:11: Bye Bye [preauth]
Jan  6 04:24:51 host sshd[24798]: Disconnected from 103.66.50.94 port 38446 [preauth]
Jan  6 04:24:53 host sshd[24807]: Invalid user pacs from 118.140.205.198 port 51184
Jan  6 04:24:53 host sshd[24807]: input_userauth_request: invalid user pacs [preauth]
Jan  6 04:24:53 host sshd[24807]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 04:24:53 host sshd[24807]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.140.205.198
Jan  6 04:24:55 host sshd[24807]: Failed password for invalid user pacs from 118.140.205.198 port 51184 ssh2
Jan  6 04:24:55 host sshd[24807]: Received disconnect from 118.140.205.198 port 51184:11: Bye Bye [preauth]
Jan  6 04:24:55 host sshd[24807]: Disconnected from 118.140.205.198 port 51184 [preauth]
Jan  6 04:25:13 host sshd[24885]: Connection reset by 182.72.184.19 port 58392 [preauth]
Jan  6 04:26:10 host sshd[25001]: Connection reset by 182.72.184.19 port 55818 [preauth]
Jan  6 04:26:41 host sshd[25074]: User root from 142.93.201.51 not allowed because not listed in AllowUsers
Jan  6 04:26:41 host sshd[25074]: input_userauth_request: invalid user root [preauth]
Jan  6 04:26:41 host unix_chkpwd[25077]: password check failed for user (root)
Jan  6 04:26:41 host sshd[25074]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.201.51  user=root
Jan  6 04:26:41 host sshd[25074]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 04:26:44 host sshd[25074]: Failed password for invalid user root from 142.93.201.51 port 36552 ssh2
Jan  6 04:26:44 host sshd[25074]: Received disconnect from 142.93.201.51 port 36552:11: Bye Bye [preauth]
Jan  6 04:26:44 host sshd[25074]: Disconnected from 142.93.201.51 port 36552 [preauth]
Jan  6 04:26:53 host sshd[25093]: Invalid user test from 137.184.5.137 port 42032
Jan  6 04:26:53 host sshd[25093]: input_userauth_request: invalid user test [preauth]
Jan  6 04:26:53 host sshd[25093]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 04:26:53 host sshd[25093]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.5.137
Jan  6 04:26:55 host sshd[25093]: Failed password for invalid user test from 137.184.5.137 port 42032 ssh2
Jan  6 04:26:55 host sshd[25093]: Received disconnect from 137.184.5.137 port 42032:11: Bye Bye [preauth]
Jan  6 04:26:55 host sshd[25093]: Disconnected from 137.184.5.137 port 42032 [preauth]
Jan  6 04:27:07 host sshd[25140]: Connection reset by 182.72.184.19 port 53234 [preauth]
Jan  6 04:27:20 host sshd[25172]: Invalid user test3 from 211.220.47.138 port 49906
Jan  6 04:27:20 host sshd[25172]: input_userauth_request: invalid user test3 [preauth]
Jan  6 04:27:20 host sshd[25172]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 04:27:20 host sshd[25172]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.220.47.138
Jan  6 04:27:23 host sshd[25172]: Failed password for invalid user test3 from 211.220.47.138 port 49906 ssh2
Jan  6 04:27:23 host sshd[25172]: Received disconnect from 211.220.47.138 port 49906:11: Bye Bye [preauth]
Jan  6 04:27:23 host sshd[25172]: Disconnected from 211.220.47.138 port 49906 [preauth]
Jan  6 04:27:36 host sshd[25316]: Invalid user dspace from 51.68.224.114 port 49460
Jan  6 04:27:36 host sshd[25316]: input_userauth_request: invalid user dspace [preauth]
Jan  6 04:27:36 host sshd[25316]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 04:27:36 host sshd[25316]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.224.114
Jan  6 04:27:39 host sshd[25316]: Failed password for invalid user dspace from 51.68.224.114 port 49460 ssh2
Jan  6 04:27:39 host sshd[25316]: Received disconnect from 51.68.224.114 port 49460:11: Bye Bye [preauth]
Jan  6 04:27:39 host sshd[25316]: Disconnected from 51.68.224.114 port 49460 [preauth]
Jan  6 04:27:55 host sshd[25354]: User root from 103.66.50.94 not allowed because not listed in AllowUsers
Jan  6 04:27:55 host sshd[25354]: input_userauth_request: invalid user root [preauth]
Jan  6 04:27:55 host unix_chkpwd[25356]: password check failed for user (root)
Jan  6 04:27:55 host sshd[25354]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.66.50.94  user=root
Jan  6 04:27:55 host sshd[25354]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 04:27:58 host sshd[25354]: Failed password for invalid user root from 103.66.50.94 port 49158 ssh2
Jan  6 04:27:58 host sshd[25354]: Received disconnect from 103.66.50.94 port 49158:11: Bye Bye [preauth]
Jan  6 04:27:58 host sshd[25354]: Disconnected from 103.66.50.94 port 49158 [preauth]
Jan  6 04:28:04 host sshd[25415]: Connection reset by 182.72.184.19 port 50682 [preauth]
Jan  6 04:28:04 host sshd[25413]: Invalid user test from 46.105.29.159 port 36040
Jan  6 04:28:04 host sshd[25413]: input_userauth_request: invalid user test [preauth]
Jan  6 04:28:04 host sshd[25413]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 04:28:04 host sshd[25413]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.105.29.159
Jan  6 04:28:06 host sshd[25413]: Failed password for invalid user test from 46.105.29.159 port 36040 ssh2
Jan  6 04:28:06 host sshd[25413]: Received disconnect from 46.105.29.159 port 36040:11: Bye Bye [preauth]
Jan  6 04:28:06 host sshd[25413]: Disconnected from 46.105.29.159 port 36040 [preauth]
Jan  6 04:28:06 host sshd[25418]: Invalid user pacs from 35.226.175.103 port 41486
Jan  6 04:28:06 host sshd[25418]: input_userauth_request: invalid user pacs [preauth]
Jan  6 04:28:06 host sshd[25418]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 04:28:06 host sshd[25418]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.226.175.103
Jan  6 04:28:08 host sshd[25418]: Failed password for invalid user pacs from 35.226.175.103 port 41486 ssh2
Jan  6 04:28:08 host sshd[25418]: Received disconnect from 35.226.175.103 port 41486:11: Bye Bye [preauth]
Jan  6 04:28:08 host sshd[25418]: Disconnected from 35.226.175.103 port 41486 [preauth]
Jan  6 04:28:20 host sshd[25472]: User root from 118.140.205.198 not allowed because not listed in AllowUsers
Jan  6 04:28:20 host sshd[25472]: input_userauth_request: invalid user root [preauth]
Jan  6 04:28:20 host unix_chkpwd[25475]: password check failed for user (root)
Jan  6 04:28:20 host sshd[25472]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.140.205.198  user=root
Jan  6 04:28:20 host sshd[25472]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 04:28:22 host sshd[25472]: Failed password for invalid user root from 118.140.205.198 port 63554 ssh2
Jan  6 04:28:22 host sshd[25472]: Received disconnect from 118.140.205.198 port 63554:11: Bye Bye [preauth]
Jan  6 04:28:22 host sshd[25472]: Disconnected from 118.140.205.198 port 63554 [preauth]
Jan  6 04:28:46 host sshd[25558]: Invalid user ftptest from 51.68.224.114 port 57226
Jan  6 04:28:46 host sshd[25558]: input_userauth_request: invalid user ftptest [preauth]
Jan  6 04:28:46 host sshd[25558]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 04:28:46 host sshd[25558]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.224.114
Jan  6 04:28:48 host sshd[25558]: Failed password for invalid user ftptest from 51.68.224.114 port 57226 ssh2
Jan  6 04:28:48 host sshd[25558]: Received disconnect from 51.68.224.114 port 57226:11: Bye Bye [preauth]
Jan  6 04:28:48 host sshd[25558]: Disconnected from 51.68.224.114 port 57226 [preauth]
Jan  6 04:28:56 host sshd[25600]: Invalid user ansibleuser from 137.184.5.137 port 43052
Jan  6 04:28:56 host sshd[25600]: input_userauth_request: invalid user ansibleuser [preauth]
Jan  6 04:28:56 host sshd[25600]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 04:28:56 host sshd[25600]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.5.137
Jan  6 04:28:58 host sshd[25600]: Failed password for invalid user ansibleuser from 137.184.5.137 port 43052 ssh2
Jan  6 04:28:58 host sshd[25600]: Received disconnect from 137.184.5.137 port 43052:11: Bye Bye [preauth]
Jan  6 04:28:58 host sshd[25600]: Disconnected from 137.184.5.137 port 43052 [preauth]
Jan  6 04:29:01 host sshd[25607]: Connection reset by 182.72.184.19 port 48124 [preauth]
Jan  6 04:29:09 host sshd[25626]: Invalid user test3 from 46.105.29.159 port 46454
Jan  6 04:29:09 host sshd[25626]: input_userauth_request: invalid user test3 [preauth]
Jan  6 04:29:09 host sshd[25626]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 04:29:09 host sshd[25626]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.105.29.159
Jan  6 04:29:11 host sshd[25626]: Failed password for invalid user test3 from 46.105.29.159 port 46454 ssh2
Jan  6 04:29:11 host sshd[25626]: Received disconnect from 46.105.29.159 port 46454:11: Bye Bye [preauth]
Jan  6 04:29:11 host sshd[25626]: Disconnected from 46.105.29.159 port 46454 [preauth]
Jan  6 04:29:17 host sshd[25671]: User root from 142.93.201.51 not allowed because not listed in AllowUsers
Jan  6 04:29:17 host sshd[25671]: input_userauth_request: invalid user root [preauth]
Jan  6 04:29:18 host unix_chkpwd[25674]: password check failed for user (root)
Jan  6 04:29:18 host sshd[25671]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.201.51  user=root
Jan  6 04:29:18 host sshd[25671]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 04:29:20 host sshd[25671]: Failed password for invalid user root from 142.93.201.51 port 40636 ssh2
Jan  6 04:29:20 host sshd[25671]: Received disconnect from 142.93.201.51 port 40636:11: Bye Bye [preauth]
Jan  6 04:29:20 host sshd[25671]: Disconnected from 142.93.201.51 port 40636 [preauth]
Jan  6 04:29:44 host sshd[25751]: Did not receive identification string from 157.245.62.32 port 48236
Jan  6 04:29:58 host sshd[25773]: Connection reset by 182.72.184.19 port 45540 [preauth]
Jan  6 04:29:59 host sshd[25771]: User root from 137.184.5.137 not allowed because not listed in AllowUsers
Jan  6 04:29:59 host sshd[25771]: input_userauth_request: invalid user root [preauth]
Jan  6 04:29:59 host unix_chkpwd[25776]: password check failed for user (root)
Jan  6 04:29:59 host sshd[25771]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.5.137  user=root
Jan  6 04:29:59 host sshd[25771]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 04:30:01 host sshd[25771]: Failed password for invalid user root from 137.184.5.137 port 37902 ssh2
Jan  6 04:30:01 host sshd[25771]: Received disconnect from 137.184.5.137 port 37902:11: Bye Bye [preauth]
Jan  6 04:30:01 host sshd[25771]: Disconnected from 137.184.5.137 port 37902 [preauth]
Jan  6 04:30:24 host sshd[25891]: Invalid user admin from 157.245.62.32 port 54024
Jan  6 04:30:24 host sshd[25891]: input_userauth_request: invalid user admin [preauth]
Jan  6 04:30:24 host sshd[25891]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 04:30:24 host sshd[25891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.62.32
Jan  6 04:30:26 host sshd[25894]: Invalid user username from 43.153.54.117 port 60202
Jan  6 04:30:26 host sshd[25894]: input_userauth_request: invalid user username [preauth]
Jan  6 04:30:26 host sshd[25894]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 04:30:26 host sshd[25894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.54.117
Jan  6 04:30:26 host sshd[25891]: Failed password for invalid user admin from 157.245.62.32 port 54024 ssh2
Jan  6 04:30:26 host sshd[25891]: Connection closed by 157.245.62.32 port 54024 [preauth]
Jan  6 04:30:28 host sshd[25894]: Failed password for invalid user username from 43.153.54.117 port 60202 ssh2
Jan  6 04:30:29 host sshd[25894]: Received disconnect from 43.153.54.117 port 60202:11: Bye Bye [preauth]
Jan  6 04:30:29 host sshd[25894]: Disconnected from 43.153.54.117 port 60202 [preauth]
Jan  6 04:30:55 host sshd[25957]: Connection reset by 182.72.184.19 port 42964 [preauth]
Jan  6 04:31:19 host sshd[26018]: Invalid user admin from 157.245.62.32 port 56356
Jan  6 04:31:19 host sshd[26018]: input_userauth_request: invalid user admin [preauth]
Jan  6 04:31:19 host sshd[26018]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 04:31:19 host sshd[26018]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.62.32
Jan  6 04:31:21 host sshd[26018]: Failed password for invalid user admin from 157.245.62.32 port 56356 ssh2
Jan  6 04:31:21 host sshd[26018]: Connection closed by 157.245.62.32 port 56356 [preauth]
Jan  6 04:31:28 host sshd[26082]: User root from 43.153.54.117 not allowed because not listed in AllowUsers
Jan  6 04:31:28 host sshd[26082]: input_userauth_request: invalid user root [preauth]
Jan  6 04:31:28 host unix_chkpwd[26087]: password check failed for user (root)
Jan  6 04:31:28 host sshd[26082]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.54.117  user=root
Jan  6 04:31:28 host sshd[26082]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 04:31:30 host sshd[26082]: Failed password for invalid user root from 43.153.54.117 port 55194 ssh2
Jan  6 04:31:30 host sshd[26082]: Received disconnect from 43.153.54.117 port 55194:11: Bye Bye [preauth]
Jan  6 04:31:30 host sshd[26082]: Disconnected from 43.153.54.117 port 55194 [preauth]
Jan  6 04:31:53 host sshd[26161]: Connection reset by 182.72.184.19 port 40368 [preauth]
Jan  6 04:33:17 host sshd[26449]: User root from 211.220.47.138 not allowed because not listed in AllowUsers
Jan  6 04:33:17 host sshd[26449]: input_userauth_request: invalid user root [preauth]
Jan  6 04:33:17 host unix_chkpwd[26451]: password check failed for user (root)
Jan  6 04:33:17 host sshd[26449]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.220.47.138  user=root
Jan  6 04:33:17 host sshd[26449]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 04:33:19 host sshd[26449]: Failed password for invalid user root from 211.220.47.138 port 39115 ssh2
Jan  6 04:33:19 host sshd[26449]: Received disconnect from 211.220.47.138 port 39115:11: Bye Bye [preauth]
Jan  6 04:33:19 host sshd[26449]: Disconnected from 211.220.47.138 port 39115 [preauth]
Jan  6 04:33:50 host sshd[26558]: Connection reset by 182.72.184.19 port 35258 [preauth]
Jan  6 04:38:49 host sshd[27300]: Bad protocol version identification '' from 114.83.98.53 port 39746
Jan  6 04:38:51 host sshd[27301]: User root from 114.83.98.53 not allowed because not listed in AllowUsers
Jan  6 04:38:51 host sshd[27301]: input_userauth_request: invalid user root [preauth]
Jan  6 04:38:51 host unix_chkpwd[27304]: password check failed for user (root)
Jan  6 04:38:51 host sshd[27301]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.83.98.53  user=root
Jan  6 04:38:51 host sshd[27301]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 04:38:53 host sshd[27301]: Failed password for invalid user root from 114.83.98.53 port 39760 ssh2
Jan  6 04:38:54 host sshd[27301]: Connection closed by 114.83.98.53 port 39760 [preauth]
Jan  6 04:38:55 host sshd[27308]: User root from 114.83.98.53 not allowed because not listed in AllowUsers
Jan  6 04:38:55 host sshd[27308]: input_userauth_request: invalid user root [preauth]
Jan  6 04:38:56 host unix_chkpwd[27313]: password check failed for user (root)
Jan  6 04:38:56 host sshd[27308]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.83.98.53  user=root
Jan  6 04:38:56 host sshd[27308]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 04:38:58 host sshd[27308]: Failed password for invalid user root from 114.83.98.53 port 48688 ssh2
Jan  6 04:38:58 host sshd[27308]: Connection closed by 114.83.98.53 port 48688 [preauth]
Jan  6 04:42:51 host sshd[27932]: User root from 45.66.230.87 not allowed because not listed in AllowUsers
Jan  6 04:42:51 host sshd[27932]: input_userauth_request: invalid user root [preauth]
Jan  6 04:42:51 host unix_chkpwd[27935]: password check failed for user (root)
Jan  6 04:42:51 host sshd[27932]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.66.230.87  user=root
Jan  6 04:42:51 host sshd[27932]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 04:42:52 host sshd[27932]: Failed password for invalid user root from 45.66.230.87 port 35178 ssh2
Jan  6 04:42:52 host sshd[27932]: Received disconnect from 45.66.230.87 port 35178:11: Bye Bye [preauth]
Jan  6 04:42:52 host sshd[27932]: Disconnected from 45.66.230.87 port 35178 [preauth]
Jan  6 04:42:54 host sshd[27940]: Invalid user admin from 45.66.230.87 port 38744
Jan  6 04:42:54 host sshd[27940]: input_userauth_request: invalid user admin [preauth]
Jan  6 04:42:54 host sshd[27940]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 04:42:54 host sshd[27940]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.66.230.87
Jan  6 04:42:56 host sshd[27940]: Failed password for invalid user admin from 45.66.230.87 port 38744 ssh2
Jan  6 04:42:56 host sshd[27940]: Received disconnect from 45.66.230.87 port 38744:11: Bye Bye [preauth]
Jan  6 04:42:56 host sshd[27940]: Disconnected from 45.66.230.87 port 38744 [preauth]
Jan  6 04:42:57 host sshd[27947]: Invalid user admin from 45.66.230.87 port 43706
Jan  6 04:42:57 host sshd[27947]: input_userauth_request: invalid user admin [preauth]
Jan  6 04:42:57 host sshd[27947]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 04:42:57 host sshd[27947]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.66.230.87
Jan  6 04:42:59 host sshd[27947]: Failed password for invalid user admin from 45.66.230.87 port 43706 ssh2
Jan  6 04:52:16 host sshd[29538]: User root from 195.226.194.142 not allowed because not listed in AllowUsers
Jan  6 04:52:16 host sshd[29538]: input_userauth_request: invalid user root [preauth]
Jan  6 04:52:16 host unix_chkpwd[29541]: password check failed for user (root)
Jan  6 04:52:16 host sshd[29538]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.142  user=root
Jan  6 04:52:16 host sshd[29538]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 04:52:17 host sshd[29538]: Failed password for invalid user root from 195.226.194.142 port 41026 ssh2
Jan  6 04:52:17 host sshd[29538]: Received disconnect from 195.226.194.142 port 41026:11: Bye Bye [preauth]
Jan  6 04:52:17 host sshd[29538]: Disconnected from 195.226.194.142 port 41026 [preauth]
Jan  6 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  6 05:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 05:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  6 05:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 05:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  6 05:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 05:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  6 05:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 05:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  6 05:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 05:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  6 05:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 05:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  6 05:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 05:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  6 05:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 05:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  6 05:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 05:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  6 05:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 05:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  6 05:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 05:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  6 05:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 05:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  6 05:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 05:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=laundryboniface user-2=a2zgroup user-3=dartsimp user-4=cochintaxi user-5=wwwkaretakers user-6=ugotscom user-7=wwwresourcehunte user-8=keralaholi user-9=wwwrmswll user-10=travelboniface user-11=wwwpmcresource user-12=pmcresources user-13=shalinijames user-14=wwwtestugo user-15=vfmassets user-16=woodpeck user-17=wwwkapin user-18=remysagr user-19=disposeat user-20=wwwkmaorg user-21=mrsclean user-22=wwwnexidigital user-23=kottayamcalldriv user-24=phmetals user-25=palco123 user-26=gifterman user-27=wwwletsstalkfood user-28=straightcurve user-29=wwwevmhonda user-30=bonifacegroup feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  6 05:21:54 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  6 05:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 05:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  6 05:21:54 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 05:21:54 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=evmhonda.com --output=json
Jan  6 05:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 05:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/test -e /home/wwwevmhonda/wordpress-backups
Jan  6 05:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  6 05:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  6 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && find -H /home/wwwevmhonda/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  6 05:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  6 05:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  6 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=letsstalkfood.com --output=json
Jan  6 05:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 05:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/wordpress-backups
Jan  6 05:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  6 05:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  6 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && find -H /home/wwwletsstalkfood/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  6 05:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  6 05:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  6 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=mrsclean.co.in --output=json
Jan  6 05:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 05:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/wordpress-backups
Jan  6 05:21:54 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  6 05:21:54 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  6 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/backup && find -H /home/mrsclean/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  6 05:21:54 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  6 05:21:54 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  6 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/wordpress-backups
Jan  6 05:21:54 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  6 05:21:54 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  6 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/blog && find -H /home/mrsclean/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  6 05:21:54 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  6 05:21:54 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  6 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=shalinijames.com --output=json
Jan  6 05:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 05:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/wordpress-backups
Jan  6 05:21:55 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  6 05:21:55 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  6 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && find -H /home/shalinijames/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  6 05:21:55 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  6 05:21:55 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  6 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=testugo.in --output=json
Jan  6 05:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 05:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups
Jan  6 05:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 05:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && find -H /home/wwwtestugo/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  6 05:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 05:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups
Jan  6 05:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 05:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && find -H /home/wwwtestugo/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  6 05:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 05:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups
Jan  6 05:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 05:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && find -H /home/wwwtestugo/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  6 05:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 05:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=ugotechnologies.com --output=json
Jan  6 05:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 05:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups
Jan  6 05:21:55 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 05:21:55 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/boniface/blog && find -H /home/ugotscom/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  6 05:21:55 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 05:21:55 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups
Jan  6 05:21:55 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 05:21:55 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && find -H /home/ugotscom/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  6 05:21:55 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 05:21:55 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups
Jan  6 05:21:55 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 05:21:55 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && find -H /home/ugotscom/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  6 05:21:55 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 05:21:55 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=woodpeckerindia.com --output=json
Jan  6 05:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 05:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/test -e /home/woodpeck/wordpress-backups
Jan  6 05:21:55 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0)
Jan  6 05:21:55 host sudo: pam_unix(sudo:session): session closed for user woodpeck
Jan  6 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html/wp && find -H /home/woodpeck/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  6 05:21:55 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0)
Jan  6 05:21:55 host sudo: pam_unix(sudo:session): session closed for user woodpeck
Jan  6 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=panlys.com --output=json
Jan  6 05:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 05:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/wordpress-backups
Jan  6 05:21:56 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  6 05:21:56 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  6 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && find -H /home/palco123/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  6 05:21:56 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  6 05:21:56 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  6 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=resourcehunters.com --output=json
Jan  6 05:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 05:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/test -e /home/wwwresourcehunte/wordpress-backups
Jan  6 05:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  6 05:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  6 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && find -H /home/wwwresourcehunte/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  6 05:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  6 05:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  6 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /var/cpanel/licenseid_credentials.json
Jan  6 05:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 05:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  6 05:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 05:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=laundryboniface ; COMMAND=/bin/cat /home/laundryboniface/.wp-toolkit-identifier
Jan  6 05:21:56 host sudo: pam_unix(sudo:session): session opened for user laundryboniface by (uid=0)
Jan  6 05:21:56 host sudo: pam_unix(sudo:session): session closed for user laundryboniface
Jan  6 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=a2zgroup ; COMMAND=/bin/cat /home/a2zgroup/.wp-toolkit-identifier
Jan  6 05:21:56 host sudo: pam_unix(sudo:session): session opened for user a2zgroup by (uid=0)
Jan  6 05:21:56 host sudo: pam_unix(sudo:session): session closed for user a2zgroup
Jan  6 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=dartsimp ; COMMAND=/bin/cat /home/dartsimp/.wp-toolkit-identifier
Jan  6 05:21:56 host sudo: pam_unix(sudo:session): session opened for user dartsimp by (uid=0)
Jan  6 05:21:56 host sudo: pam_unix(sudo:session): session closed for user dartsimp
Jan  6 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=cochintaxi ; COMMAND=/bin/cat /home/cochintaxi/.wp-toolkit-identifier
Jan  6 05:21:56 host sudo: pam_unix(sudo:session): session opened for user cochintaxi by (uid=0)
Jan  6 05:21:56 host sudo: pam_unix(sudo:session): session closed for user cochintaxi
Jan  6 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkaretakers ; COMMAND=/bin/cat /home/wwwkaretakers/.wp-toolkit-identifier
Jan  6 05:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwkaretakers by (uid=0)
Jan  6 05:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwkaretakers
Jan  6 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/cat /home/wwwresourcehunte/.wp-toolkit-identifier
Jan  6 05:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  6 05:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  6 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/cat /home/keralaholi/.wp-toolkit-identifier
Jan  6 05:21:56 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0)
Jan  6 05:21:56 host sudo: pam_unix(sudo:session): session closed for user keralaholi
Jan  6 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -f /home/keralaholi/.wp-toolkit-identifier
Jan  6 05:21:56 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0)
Jan  6 05:21:56 host sudo: pam_unix(sudo:session): session closed for user keralaholi
Jan  6 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -e /home/keralaholi/-wpt-tmp-94Tx2wvIeVlT5vnD.wp-toolkit-identifier
Jan  6 05:21:56 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0)
Jan  6 05:21:56 host sudo: pam_unix(sudo:session): session closed for user keralaholi
Jan  6 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/sh -c cat > /home/keralaholi/-wpt-tmp-94Tx2wvIeVlT5vnD.wp-toolkit-identifier
Jan  6 05:21:56 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0)
Jan  6 05:21:56 host sudo: pam_unix(sudo:session): session closed for user keralaholi
Jan  6 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwrmswll ; COMMAND=/bin/cat /home/wwwrmswll/.wp-toolkit-identifier
Jan  6 05:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwrmswll by (uid=0)
Jan  6 05:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwrmswll
Jan  6 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=travelboniface ; COMMAND=/bin/cat /home/travelboniface/.wp-toolkit-identifier
Jan  6 05:21:56 host sudo: pam_unix(sudo:session): session opened for user travelboniface by (uid=0)
Jan  6 05:21:56 host sudo: pam_unix(sudo:session): session closed for user travelboniface
Jan  6 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwpmcresource ; COMMAND=/bin/cat /home/wwwpmcresource/.wp-toolkit-identifier
Jan  6 05:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwpmcresource by (uid=0)
Jan  6 05:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwpmcresource
Jan  6 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=pmcresources ; COMMAND=/bin/cat /home/pmcresources/.wp-toolkit-identifier
Jan  6 05:21:56 host sudo: pam_unix(sudo:session): session opened for user pmcresources by (uid=0)
Jan  6 05:21:56 host sudo: pam_unix(sudo:session): session closed for user pmcresources
Jan  6 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/cat /home/shalinijames/.wp-toolkit-identifier
Jan  6 05:21:56 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  6 05:21:56 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  6 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/cat /home/wwwtestugo/.wp-toolkit-identifier
Jan  6 05:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 05:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=vfmassets ; COMMAND=/bin/cat /home/vfmassets/.wp-toolkit-identifier
Jan  6 05:21:57 host sudo: pam_unix(sudo:session): session opened for user vfmassets by (uid=0)
Jan  6 05:21:57 host sudo: pam_unix(sudo:session): session closed for user vfmassets
Jan  6 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/cat /home/woodpeck/.wp-toolkit-identifier
Jan  6 05:21:57 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0)
Jan  6 05:21:57 host sudo: pam_unix(sudo:session): session closed for user woodpeck
Jan  6 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkapin ; COMMAND=/bin/cat /home/wwwkapin/.wp-toolkit-identifier
Jan  6 05:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwkapin by (uid=0)
Jan  6 05:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwkapin
Jan  6 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=remysagr ; COMMAND=/bin/cat /home/remysagr/.wp-toolkit-identifier
Jan  6 05:21:57 host sudo: pam_unix(sudo:session): session opened for user remysagr by (uid=0)
Jan  6 05:21:57 host sudo: pam_unix(sudo:session): session closed for user remysagr
Jan  6 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=disposeat ; COMMAND=/bin/cat /home/disposeat/.wp-toolkit-identifier
Jan  6 05:21:57 host sudo: pam_unix(sudo:session): session opened for user disposeat by (uid=0)
Jan  6 05:21:57 host sudo: pam_unix(sudo:session): session closed for user disposeat
Jan  6 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkmaorg ; COMMAND=/bin/cat /home/wwwkmaorg/.wp-toolkit-identifier
Jan  6 05:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwkmaorg by (uid=0)
Jan  6 05:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwkmaorg
Jan  6 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/cat /home/mrsclean/.wp-toolkit-identifier
Jan  6 05:21:57 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  6 05:21:57 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  6 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwnexidigital ; COMMAND=/bin/cat /home/wwwnexidigital/.wp-toolkit-identifier
Jan  6 05:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwnexidigital by (uid=0)
Jan  6 05:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwnexidigital
Jan  6 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=kottayamcalldriv ; COMMAND=/bin/cat /home/kottayamcalldriv/.wp-toolkit-identifier
Jan  6 05:21:57 host sudo: pam_unix(sudo:session): session opened for user kottayamcalldriv by (uid=0)
Jan  6 05:21:57 host sudo: pam_unix(sudo:session): session closed for user kottayamcalldriv
Jan  6 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=phmetals ; COMMAND=/bin/cat /home/phmetals/.wp-toolkit-identifier
Jan  6 05:21:57 host sudo: pam_unix(sudo:session): session opened for user phmetals by (uid=0)
Jan  6 05:21:57 host sudo: pam_unix(sudo:session): session closed for user phmetals
Jan  6 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/cat /home/palco123/.wp-toolkit-identifier
Jan  6 05:21:57 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  6 05:21:57 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  6 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=gifterman ; COMMAND=/bin/cat /home/gifterman/.wp-toolkit-identifier
Jan  6 05:21:57 host sudo: pam_unix(sudo:session): session opened for user gifterman by (uid=0)
Jan  6 05:21:57 host sudo: pam_unix(sudo:session): session closed for user gifterman
Jan  6 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/cat /home/wwwletsstalkfood/.wp-toolkit-identifier
Jan  6 05:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  6 05:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  6 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=straightcurve ; COMMAND=/bin/cat /home/straightcurve/.wp-toolkit-identifier
Jan  6 05:21:57 host sudo: pam_unix(sudo:session): session opened for user straightcurve by (uid=0)
Jan  6 05:21:57 host sudo: pam_unix(sudo:session): session closed for user straightcurve
Jan  6 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/cat /home/wwwevmhonda/.wp-toolkit-identifier
Jan  6 05:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  6 05:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  6 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=bonifacegroup ; COMMAND=/bin/cat /home/bonifacegroup/.wp-toolkit-identifier
Jan  6 05:21:57 host sudo: pam_unix(sudo:session): session opened for user bonifacegroup by (uid=0)
Jan  6 05:21:57 host sudo: pam_unix(sudo:session): session closed for user bonifacegroup
Jan  6 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/cat /home/keralaholi/.wp-toolkit-identifier
Jan  6 05:21:57 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0)
Jan  6 05:21:57 host sudo: pam_unix(sudo:session): session closed for user keralaholi
Jan  6 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -f /home/keralaholi/.wp-toolkit-identifier
Jan  6 05:21:57 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0)
Jan  6 05:21:57 host sudo: pam_unix(sudo:session): session closed for user keralaholi
Jan  6 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -e /home/keralaholi/-wpt-tmp-WXzz0qQp5XIbreqB.wp-toolkit-identifier
Jan  6 05:21:57 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0)
Jan  6 05:21:57 host sudo: pam_unix(sudo:session): session closed for user keralaholi
Jan  6 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/sh -c cat > /home/keralaholi/-wpt-tmp-WXzz0qQp5XIbreqB.wp-toolkit-identifier
Jan  6 05:21:57 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0)
Jan  6 05:21:57 host sudo: pam_unix(sudo:session): session closed for user keralaholi
Jan  6 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_shared_ip --output=json
Jan  6 05:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 05:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_public_ip ip=167.71.234.10 --output=json
Jan  6 05:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 05:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  6 05:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 05:22:00 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-6zGigJeCIAtKGW6m.~
Jan  6 05:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 05:22:00 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-6zGigJeCIAtKGW6m.~'
Jan  6 05:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 05:22:00 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-6zGigJeCIAtKGW6m.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  6 05:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 05:22:00 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  6 05:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 05:22:00 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  6 05:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 05:22:01 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  6 05:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 05:22:01 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  6 05:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 05:22:01 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  6 05:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 05:22:02 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  6 05:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 05:22:02 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  6 05:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  6 05:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  6 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  6 05:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  6 05:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  6 05:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  6 05:22:05 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  6 05:22:07 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  6 05:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  6 05:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 05:22:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 05:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  6 05:22:09 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 05:22:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 05:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  6 05:22:09 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 05:22:11 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 05:22:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  6 05:22:12 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 05:22:13 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 05:22:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  6 05:22:13 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 05:22:14 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 05:22:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  6 05:22:15 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  6 05:22:16 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  6 05:29:31 host sshd[2956]: Invalid user fake from 185.174.137.99 port 54608
Jan  6 05:29:31 host sshd[2956]: input_userauth_request: invalid user fake [preauth]
Jan  6 05:29:31 host sshd[2956]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 05:29:31 host sshd[2956]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.174.137.99
Jan  6 05:29:33 host sshd[2956]: Failed password for invalid user fake from 185.174.137.99 port 54608 ssh2
Jan  6 05:29:34 host sshd[2956]: Received disconnect from 185.174.137.99 port 54608:11: Bye Bye [preauth]
Jan  6 05:29:34 host sshd[2956]: Disconnected from 185.174.137.99 port 54608 [preauth]
Jan  6 05:29:35 host sshd[2964]: Invalid user ubnt from 185.174.137.99 port 35164
Jan  6 05:29:35 host sshd[2964]: input_userauth_request: invalid user ubnt [preauth]
Jan  6 05:29:35 host sshd[2964]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 05:29:35 host sshd[2964]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.174.137.99
Jan  6 05:29:37 host sshd[2964]: Failed password for invalid user ubnt from 185.174.137.99 port 35164 ssh2
Jan  6 05:29:38 host sshd[2964]: Received disconnect from 185.174.137.99 port 35164:11: Bye Bye [preauth]
Jan  6 05:29:38 host sshd[2964]: Disconnected from 185.174.137.99 port 35164 [preauth]
Jan  6 05:29:39 host sshd[2970]: User root from 185.174.137.99 not allowed because not listed in AllowUsers
Jan  6 05:29:39 host sshd[2970]: input_userauth_request: invalid user root [preauth]
Jan  6 05:29:39 host unix_chkpwd[2973]: password check failed for user (root)
Jan  6 05:29:39 host sshd[2970]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.174.137.99  user=root
Jan  6 05:29:39 host sshd[2970]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 05:29:41 host sshd[2970]: Failed password for invalid user root from 185.174.137.99 port 43588 ssh2
Jan  6 05:30:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  6 05:30:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 05:30:02 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 05:30:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  6 05:30:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 05:30:02 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 05:30:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  6 05:30:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 05:30:02 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 05:30:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  6 05:30:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 05:30:02 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 05:30:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  6 05:30:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 05:30:02 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 05:30:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  6 05:30:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 05:30:02 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 05:30:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  6 05:30:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 05:30:02 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 05:42:20 host sshd[5044]: User root from 110.141.212.12 not allowed because not listed in AllowUsers
Jan  6 05:42:20 host sshd[5044]: input_userauth_request: invalid user root [preauth]
Jan  6 05:42:20 host unix_chkpwd[5046]: password check failed for user (root)
Jan  6 05:42:20 host sshd[5044]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.141.212.12  user=root
Jan  6 05:42:20 host sshd[5044]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 05:42:22 host sshd[5044]: Failed password for invalid user root from 110.141.212.12 port 47976 ssh2
Jan  6 05:42:22 host sshd[5044]: Received disconnect from 110.141.212.12 port 47976:11: Bye Bye [preauth]
Jan  6 05:42:22 host sshd[5044]: Disconnected from 110.141.212.12 port 47976 [preauth]
Jan  6 05:44:12 host sshd[5315]: User root from 110.141.212.12 not allowed because not listed in AllowUsers
Jan  6 05:44:12 host sshd[5315]: input_userauth_request: invalid user root [preauth]
Jan  6 05:44:12 host unix_chkpwd[5319]: password check failed for user (root)
Jan  6 05:44:12 host sshd[5315]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.141.212.12  user=root
Jan  6 05:44:12 host sshd[5315]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 05:44:15 host sshd[5315]: Failed password for invalid user root from 110.141.212.12 port 57396 ssh2
Jan  6 05:44:15 host sshd[5315]: Received disconnect from 110.141.212.12 port 57396:11: Bye Bye [preauth]
Jan  6 05:44:15 host sshd[5315]: Disconnected from 110.141.212.12 port 57396 [preauth]
Jan  6 05:44:51 host sshd[5424]: Invalid user guest from 203.113.167.3 port 41836
Jan  6 05:44:51 host sshd[5424]: input_userauth_request: invalid user guest [preauth]
Jan  6 05:44:51 host sshd[5424]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 05:44:51 host sshd[5424]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.113.167.3
Jan  6 05:44:53 host sshd[5424]: Failed password for invalid user guest from 203.113.167.3 port 41836 ssh2
Jan  6 05:44:53 host sshd[5424]: Received disconnect from 203.113.167.3 port 41836:11: Bye Bye [preauth]
Jan  6 05:44:53 host sshd[5424]: Disconnected from 203.113.167.3 port 41836 [preauth]
Jan  6 05:45:02 host sshd[5444]: Invalid user user from 77.54.53.88 port 54996
Jan  6 05:45:02 host sshd[5444]: input_userauth_request: invalid user user [preauth]
Jan  6 05:45:02 host sshd[5444]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 05:45:02 host sshd[5444]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.54.53.88
Jan  6 05:45:04 host sshd[5444]: Failed password for invalid user user from 77.54.53.88 port 54996 ssh2
Jan  6 05:45:04 host sshd[5444]: Received disconnect from 77.54.53.88 port 54996:11: Bye Bye [preauth]
Jan  6 05:45:04 host sshd[5444]: Disconnected from 77.54.53.88 port 54996 [preauth]
Jan  6 05:45:19 host sshd[5530]: User root from 72.167.226.188 not allowed because not listed in AllowUsers
Jan  6 05:45:19 host sshd[5530]: input_userauth_request: invalid user root [preauth]
Jan  6 05:45:19 host unix_chkpwd[5533]: password check failed for user (root)
Jan  6 05:45:19 host sshd[5530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.167.226.188  user=root
Jan  6 05:45:19 host sshd[5530]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 05:45:20 host sshd[5530]: Failed password for invalid user root from 72.167.226.188 port 40124 ssh2
Jan  6 05:45:21 host sshd[5530]: Received disconnect from 72.167.226.188 port 40124:11: Bye Bye [preauth]
Jan  6 05:45:21 host sshd[5530]: Disconnected from 72.167.226.188 port 40124 [preauth]
Jan  6 05:46:22 host sshd[5661]: Invalid user hari from 200.116.188.62 port 58500
Jan  6 05:46:22 host sshd[5661]: input_userauth_request: invalid user hari [preauth]
Jan  6 05:46:22 host sshd[5661]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 05:46:22 host sshd[5661]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.116.188.62
Jan  6 05:46:24 host sshd[5661]: Failed password for invalid user hari from 200.116.188.62 port 58500 ssh2
Jan  6 05:46:25 host sshd[5661]: Received disconnect from 200.116.188.62 port 58500:11: Bye Bye [preauth]
Jan  6 05:46:25 host sshd[5661]: Disconnected from 200.116.188.62 port 58500 [preauth]
Jan  6 05:46:53 host sshd[5720]: Invalid user chris from 163.197.211.119 port 51898
Jan  6 05:46:53 host sshd[5720]: input_userauth_request: invalid user chris [preauth]
Jan  6 05:46:53 host sshd[5720]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 05:46:53 host sshd[5720]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.197.211.119
Jan  6 05:46:55 host sshd[5720]: Failed password for invalid user chris from 163.197.211.119 port 51898 ssh2
Jan  6 05:46:55 host sshd[5720]: Received disconnect from 163.197.211.119 port 51898:11: Bye Bye [preauth]
Jan  6 05:46:55 host sshd[5720]: Disconnected from 163.197.211.119 port 51898 [preauth]
Jan  6 05:47:21 host sshd[5775]: User root from 77.54.53.88 not allowed because not listed in AllowUsers
Jan  6 05:47:21 host sshd[5775]: input_userauth_request: invalid user root [preauth]
Jan  6 05:47:21 host unix_chkpwd[5778]: password check failed for user (root)
Jan  6 05:47:21 host sshd[5775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.54.53.88  user=root
Jan  6 05:47:21 host sshd[5775]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 05:47:23 host sshd[5775]: Failed password for invalid user root from 77.54.53.88 port 32998 ssh2
Jan  6 05:47:23 host sshd[5775]: Received disconnect from 77.54.53.88 port 32998:11: Bye Bye [preauth]
Jan  6 05:47:23 host sshd[5775]: Disconnected from 77.54.53.88 port 32998 [preauth]
Jan  6 05:47:25 host sshd[5781]: Invalid user desarrollo from 72.167.226.188 port 44126
Jan  6 05:47:25 host sshd[5781]: input_userauth_request: invalid user desarrollo [preauth]
Jan  6 05:47:25 host sshd[5781]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 05:47:25 host sshd[5781]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.167.226.188
Jan  6 05:47:27 host sshd[5781]: Failed password for invalid user desarrollo from 72.167.226.188 port 44126 ssh2
Jan  6 05:47:27 host sshd[5781]: Received disconnect from 72.167.226.188 port 44126:11: Bye Bye [preauth]
Jan  6 05:47:27 host sshd[5781]: Disconnected from 72.167.226.188 port 44126 [preauth]
Jan  6 05:48:08 host sshd[6033]: Invalid user starbound from 203.113.167.3 port 35878
Jan  6 05:48:08 host sshd[6033]: input_userauth_request: invalid user starbound [preauth]
Jan  6 05:48:08 host sshd[6033]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 05:48:08 host sshd[6033]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.113.167.3
Jan  6 05:48:10 host sshd[6033]: Failed password for invalid user starbound from 203.113.167.3 port 35878 ssh2
Jan  6 05:48:10 host sshd[6033]: Received disconnect from 203.113.167.3 port 35878:11: Bye Bye [preauth]
Jan  6 05:48:10 host sshd[6033]: Disconnected from 203.113.167.3 port 35878 [preauth]
Jan  6 05:48:23 host sshd[6056]: Invalid user kafka from 165.22.1.73 port 54724
Jan  6 05:48:23 host sshd[6056]: input_userauth_request: invalid user kafka [preauth]
Jan  6 05:48:23 host sshd[6056]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 05:48:23 host sshd[6056]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.1.73
Jan  6 05:48:26 host sshd[6056]: Failed password for invalid user kafka from 165.22.1.73 port 54724 ssh2
Jan  6 05:48:26 host sshd[6056]: Received disconnect from 165.22.1.73 port 54724:11: Bye Bye [preauth]
Jan  6 05:48:26 host sshd[6056]: Disconnected from 165.22.1.73 port 54724 [preauth]
Jan  6 05:49:13 host sshd[6155]: User root from 200.116.188.62 not allowed because not listed in AllowUsers
Jan  6 05:49:13 host sshd[6155]: input_userauth_request: invalid user root [preauth]
Jan  6 05:49:13 host unix_chkpwd[6160]: password check failed for user (root)
Jan  6 05:49:13 host sshd[6155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.116.188.62  user=root
Jan  6 05:49:13 host sshd[6155]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 05:49:15 host sshd[6155]: Failed password for invalid user root from 200.116.188.62 port 35288 ssh2
Jan  6 05:49:15 host sshd[6155]: Received disconnect from 200.116.188.62 port 35288:11: Bye Bye [preauth]
Jan  6 05:49:15 host sshd[6155]: Disconnected from 200.116.188.62 port 35288 [preauth]
Jan  6 05:49:48 host sshd[6257]: Invalid user admin from 203.113.167.3 port 46712
Jan  6 05:49:48 host sshd[6257]: input_userauth_request: invalid user admin [preauth]
Jan  6 05:49:48 host sshd[6257]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 05:49:48 host sshd[6257]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.113.167.3
Jan  6 05:49:50 host sshd[6257]: Failed password for invalid user admin from 203.113.167.3 port 46712 ssh2
Jan  6 05:49:50 host sshd[6257]: Received disconnect from 203.113.167.3 port 46712:11: Bye Bye [preauth]
Jan  6 05:49:50 host sshd[6257]: Disconnected from 203.113.167.3 port 46712 [preauth]
Jan  6 05:50:11 host sshd[6345]: User root from 179.43.80.6 not allowed because not listed in AllowUsers
Jan  6 05:50:11 host sshd[6345]: input_userauth_request: invalid user root [preauth]
Jan  6 05:50:11 host unix_chkpwd[6351]: password check failed for user (root)
Jan  6 05:50:11 host sshd[6345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.43.80.6  user=root
Jan  6 05:50:11 host sshd[6345]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 05:50:13 host sshd[6345]: Failed password for invalid user root from 179.43.80.6 port 54314 ssh2
Jan  6 05:50:13 host sshd[6345]: Received disconnect from 179.43.80.6 port 54314:11: Bye Bye [preauth]
Jan  6 05:50:13 host sshd[6345]: Disconnected from 179.43.80.6 port 54314 [preauth]
Jan  6 05:50:23 host sshd[6378]: Invalid user sss from 163.197.211.119 port 56224
Jan  6 05:50:23 host sshd[6378]: input_userauth_request: invalid user sss [preauth]
Jan  6 05:50:23 host sshd[6378]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 05:50:23 host sshd[6378]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.197.211.119
Jan  6 05:50:25 host sshd[6378]: Failed password for invalid user sss from 163.197.211.119 port 56224 ssh2
Jan  6 05:50:25 host sshd[6378]: Received disconnect from 163.197.211.119 port 56224:11: Bye Bye [preauth]
Jan  6 05:50:25 host sshd[6378]: Disconnected from 163.197.211.119 port 56224 [preauth]
Jan  6 05:50:37 host sshd[6417]: Invalid user tomas from 138.197.141.89 port 34146
Jan  6 05:50:37 host sshd[6417]: input_userauth_request: invalid user tomas [preauth]
Jan  6 05:50:37 host sshd[6417]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 05:50:37 host sshd[6417]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.141.89
Jan  6 05:50:39 host sshd[6417]: Failed password for invalid user tomas from 138.197.141.89 port 34146 ssh2
Jan  6 05:50:39 host sshd[6417]: Received disconnect from 138.197.141.89 port 34146:11: Bye Bye [preauth]
Jan  6 05:50:39 host sshd[6417]: Disconnected from 138.197.141.89 port 34146 [preauth]
Jan  6 05:51:48 host sshd[6560]: User root from 194.146.50.54 not allowed because not listed in AllowUsers
Jan  6 05:51:48 host sshd[6560]: input_userauth_request: invalid user root [preauth]
Jan  6 05:51:48 host unix_chkpwd[6565]: password check failed for user (root)
Jan  6 05:51:48 host sshd[6560]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.146.50.54  user=root
Jan  6 05:51:48 host sshd[6560]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 05:51:51 host sshd[6560]: Failed password for invalid user root from 194.146.50.54 port 44918 ssh2
Jan  6 05:51:51 host sshd[6560]: Received disconnect from 194.146.50.54 port 44918:11: Bye Bye [preauth]
Jan  6 05:51:51 host sshd[6560]: Disconnected from 194.146.50.54 port 44918 [preauth]
Jan  6 05:51:59 host sshd[6583]: User root from 163.197.211.119 not allowed because not listed in AllowUsers
Jan  6 05:51:59 host sshd[6583]: input_userauth_request: invalid user root [preauth]
Jan  6 05:51:59 host unix_chkpwd[6588]: password check failed for user (root)
Jan  6 05:51:59 host sshd[6583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.197.211.119  user=root
Jan  6 05:51:59 host sshd[6583]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 05:52:01 host sshd[6583]: Failed password for invalid user root from 163.197.211.119 port 51408 ssh2
Jan  6 05:52:01 host sshd[6583]: Received disconnect from 163.197.211.119 port 51408:11: Bye Bye [preauth]
Jan  6 05:52:01 host sshd[6583]: Disconnected from 163.197.211.119 port 51408 [preauth]
Jan  6 05:53:30 host sshd[6937]: Invalid user user05 from 165.22.1.73 port 53352
Jan  6 05:53:30 host sshd[6937]: input_userauth_request: invalid user user05 [preauth]
Jan  6 05:53:30 host sshd[6937]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 05:53:30 host sshd[6937]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.1.73
Jan  6 05:53:32 host sshd[6937]: Failed password for invalid user user05 from 165.22.1.73 port 53352 ssh2
Jan  6 05:53:32 host sshd[6937]: Received disconnect from 165.22.1.73 port 53352:11: Bye Bye [preauth]
Jan  6 05:53:32 host sshd[6937]: Disconnected from 165.22.1.73 port 53352 [preauth]
Jan  6 05:53:34 host sshd[6945]: Invalid user eric from 103.66.86.101 port 45222
Jan  6 05:53:34 host sshd[6945]: input_userauth_request: invalid user eric [preauth]
Jan  6 05:53:34 host sshd[6945]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 05:53:34 host sshd[6945]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.66.86.101
Jan  6 05:53:36 host sshd[6945]: Failed password for invalid user eric from 103.66.86.101 port 45222 ssh2
Jan  6 05:53:36 host sshd[6945]: Received disconnect from 103.66.86.101 port 45222:11: Bye Bye [preauth]
Jan  6 05:53:36 host sshd[6945]: Disconnected from 103.66.86.101 port 45222 [preauth]
Jan  6 05:54:50 host sshd[7086]: Invalid user tom from 165.22.1.73 port 52692
Jan  6 05:54:50 host sshd[7086]: input_userauth_request: invalid user tom [preauth]
Jan  6 05:54:50 host sshd[7086]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 05:54:50 host sshd[7086]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.1.73
Jan  6 05:54:52 host sshd[7086]: Failed password for invalid user tom from 165.22.1.73 port 52692 ssh2
Jan  6 05:55:00 host sshd[7128]: User root from 195.226.194.242 not allowed because not listed in AllowUsers
Jan  6 05:55:00 host sshd[7128]: input_userauth_request: invalid user root [preauth]
Jan  6 05:55:00 host unix_chkpwd[7130]: password check failed for user (root)
Jan  6 05:55:00 host sshd[7128]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.242  user=root
Jan  6 05:55:00 host sshd[7128]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 05:55:02 host sshd[7128]: Failed password for invalid user root from 195.226.194.242 port 30192 ssh2
Jan  6 05:55:03 host sshd[7128]: Received disconnect from 195.226.194.242 port 30192:11: Bye Bye [preauth]
Jan  6 05:55:03 host sshd[7128]: Disconnected from 195.226.194.242 port 30192 [preauth]
Jan  6 05:55:19 host sshd[7176]: Invalid user bet from 194.146.50.54 port 58152
Jan  6 05:55:19 host sshd[7176]: input_userauth_request: invalid user bet [preauth]
Jan  6 05:55:19 host sshd[7176]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 05:55:19 host sshd[7176]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.146.50.54
Jan  6 05:55:21 host sshd[7176]: Failed password for invalid user bet from 194.146.50.54 port 58152 ssh2
Jan  6 05:55:21 host sshd[7176]: Received disconnect from 194.146.50.54 port 58152:11: Bye Bye [preauth]
Jan  6 05:55:21 host sshd[7176]: Disconnected from 194.146.50.54 port 58152 [preauth]
Jan  6 05:55:28 host sshd[7240]: Invalid user test from 138.197.141.89 port 53226
Jan  6 05:55:28 host sshd[7240]: input_userauth_request: invalid user test [preauth]
Jan  6 05:55:28 host sshd[7240]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 05:55:28 host sshd[7240]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.141.89
Jan  6 05:55:30 host sshd[7240]: Failed password for invalid user test from 138.197.141.89 port 53226 ssh2
Jan  6 05:55:31 host sshd[7240]: Received disconnect from 138.197.141.89 port 53226:11: Bye Bye [preauth]
Jan  6 05:55:31 host sshd[7240]: Disconnected from 138.197.141.89 port 53226 [preauth]
Jan  6 05:55:43 host sshd[7254]: Invalid user oracle2 from 103.66.86.101 port 57264
Jan  6 05:55:43 host sshd[7254]: input_userauth_request: invalid user oracle2 [preauth]
Jan  6 05:55:43 host sshd[7254]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 05:55:43 host sshd[7254]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.66.86.101
Jan  6 05:55:44 host sshd[7273]: Invalid user service from 194.169.175.102 port 63404
Jan  6 05:55:44 host sshd[7273]: input_userauth_request: invalid user service [preauth]
Jan  6 05:55:44 host sshd[7273]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 05:55:44 host sshd[7273]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.169.175.102
Jan  6 05:55:45 host sshd[7254]: Failed password for invalid user oracle2 from 103.66.86.101 port 57264 ssh2
Jan  6 05:55:45 host sshd[7254]: Received disconnect from 103.66.86.101 port 57264:11: Bye Bye [preauth]
Jan  6 05:55:45 host sshd[7254]: Disconnected from 103.66.86.101 port 57264 [preauth]
Jan  6 05:55:46 host sshd[7273]: Failed password for invalid user service from 194.169.175.102 port 63404 ssh2
Jan  6 05:55:46 host sshd[7273]: Received disconnect from 194.169.175.102 port 63404:11: Client disconnecting normally [preauth]
Jan  6 05:55:46 host sshd[7273]: Disconnected from 194.169.175.102 port 63404 [preauth]
Jan  6 05:56:50 host sshd[7379]: Invalid user roy from 138.197.141.89 port 47974
Jan  6 05:56:50 host sshd[7379]: input_userauth_request: invalid user roy [preauth]
Jan  6 05:56:50 host sshd[7379]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 05:56:50 host sshd[7379]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.141.89
Jan  6 05:56:52 host sshd[7379]: Failed password for invalid user roy from 138.197.141.89 port 47974 ssh2
Jan  6 05:57:29 host sshd[7480]: Invalid user tomas from 103.66.86.101 port 40496
Jan  6 05:57:29 host sshd[7480]: input_userauth_request: invalid user tomas [preauth]
Jan  6 05:57:29 host sshd[7480]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 05:57:29 host sshd[7480]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.66.86.101
Jan  6 05:57:31 host sshd[7480]: Failed password for invalid user tomas from 103.66.86.101 port 40496 ssh2
Jan  6 05:57:31 host sshd[7480]: Received disconnect from 103.66.86.101 port 40496:11: Bye Bye [preauth]
Jan  6 05:57:31 host sshd[7480]: Disconnected from 103.66.86.101 port 40496 [preauth]
Jan  6 05:57:38 host sshd[7669]: Invalid user pi from 179.43.80.6 port 38400
Jan  6 05:57:38 host sshd[7669]: input_userauth_request: invalid user pi [preauth]
Jan  6 05:57:38 host sshd[7669]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 05:57:38 host sshd[7669]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.43.80.6
Jan  6 05:57:39 host sshd[7669]: Failed password for invalid user pi from 179.43.80.6 port 38400 ssh2
Jan  6 05:57:40 host sshd[7669]: Received disconnect from 179.43.80.6 port 38400:11: Bye Bye [preauth]
Jan  6 05:57:40 host sshd[7669]: Disconnected from 179.43.80.6 port 38400 [preauth]
Jan  6 06:02:51 host sshd[8601]: Invalid user ai from 194.110.203.109 port 44432
Jan  6 06:02:51 host sshd[8601]: input_userauth_request: invalid user ai [preauth]
Jan  6 06:02:51 host sshd[8601]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 06:02:51 host sshd[8601]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109
Jan  6 06:02:52 host sshd[8601]: Failed password for invalid user ai from 194.110.203.109 port 44432 ssh2
Jan  6 06:02:56 host sshd[8601]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 06:02:57 host sshd[8601]: Failed password for invalid user ai from 194.110.203.109 port 44432 ssh2
Jan  6 06:03:01 host sshd[8601]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 06:03:02 host sshd[8601]: Failed password for invalid user ai from 194.110.203.109 port 44432 ssh2
Jan  6 06:03:05 host sshd[8601]: Connection closed by 194.110.203.109 port 44432 [preauth]
Jan  6 06:03:05 host sshd[8601]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109
Jan  6 06:11:46 host sshd[10113]: Connection closed by 172.104.11.51 port 6032 [preauth]
Jan  6 06:11:48 host sshd[10118]: Connection closed by 172.104.11.51 port 6038 [preauth]
Jan  6 06:11:49 host sshd[10123]: Connection closed by 172.104.11.51 port 6050 [preauth]
Jan  6 06:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  6 06:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 06:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 06:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  6 06:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 06:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 06:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  6 06:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 06:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 06:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  6 06:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 06:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 06:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  6 06:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 06:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 06:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  6 06:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 06:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 06:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  6 06:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 06:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 06:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  6 06:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 06:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 06:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  6 06:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 06:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 06:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  6 06:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 06:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 06:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  6 06:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 06:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 06:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  6 06:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 06:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 06:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  6 06:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 06:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 06:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=remysagr user-2=disposeat user-3=wwwkmaorg user-4=wwwkapin user-5=woodpeck user-6=vfmassets user-7=shalinijames user-8=wwwtestugo user-9=pmcresources user-10=bonifacegroup user-11=wwwevmhonda user-12=wwwletsstalkfood user-13=straightcurve user-14=palco123 user-15=gifterman user-16=phmetals user-17=kottayamcalldriv user-18=mrsclean user-19=wwwnexidigital user-20=wwwkaretakers user-21=cochintaxi user-22=a2zgroup user-23=dartsimp user-24=laundryboniface user-25=wwwpmcresource user-26=travelboniface user-27=wwwresourcehunte user-28=keralaholi user-29=wwwrmswll user-30=ugotscom feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  6 06:21:54 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  6 06:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 06:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 06:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  6 06:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 06:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 06:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-74ppZakm6Z3nor5h.~
Jan  6 06:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 06:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 06:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-74ppZakm6Z3nor5h.~'
Jan  6 06:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 06:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 06:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-74ppZakm6Z3nor5h.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  6 06:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 06:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 06:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  6 06:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 06:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 06:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  6 06:21:58 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 06:21:58 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 06:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  6 06:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 06:21:59 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 06:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  6 06:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 06:21:59 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 06:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  6 06:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 06:21:59 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 06:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  6 06:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 06:21:59 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 06:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  6 06:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 06:22:00 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 06:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  6 06:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  6 06:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  6 06:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  6 06:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  6 06:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  6 06:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  6 06:22:03 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  6 06:22:08 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  6 06:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  6 06:22:08 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 06:22:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 06:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  6 06:22:09 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 06:22:10 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 06:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  6 06:22:10 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 06:22:15 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 06:22:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  6 06:22:15 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 06:22:16 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 06:22:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  6 06:22:17 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 06:22:18 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 06:22:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  6 06:22:19 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  6 06:22:20 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  6 06:26:07 host sshd[12599]: Invalid user vagrant from 195.226.194.142 port 20258
Jan  6 06:26:07 host sshd[12599]: input_userauth_request: invalid user vagrant [preauth]
Jan  6 06:26:07 host sshd[12599]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 06:26:07 host sshd[12599]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.142
Jan  6 06:26:09 host sshd[12599]: Failed password for invalid user vagrant from 195.226.194.142 port 20258 ssh2
Jan  6 06:26:09 host sshd[12599]: Received disconnect from 195.226.194.142 port 20258:11: Bye Bye [preauth]
Jan  6 06:26:09 host sshd[12599]: Disconnected from 195.226.194.142 port 20258 [preauth]
Jan  6 06:35:50 host sshd[14315]: User root from 80.94.92.241 not allowed because not listed in AllowUsers
Jan  6 06:35:50 host sshd[14315]: input_userauth_request: invalid user root [preauth]
Jan  6 06:35:51 host sshd[14317]: User root from 80.94.92.241 not allowed because not listed in AllowUsers
Jan  6 06:35:51 host sshd[14317]: input_userauth_request: invalid user root [preauth]
Jan  6 06:35:52 host unix_chkpwd[14329]: password check failed for user (root)
Jan  6 06:35:52 host sshd[14315]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.94.92.241  user=root
Jan  6 06:35:52 host sshd[14315]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 06:35:52 host unix_chkpwd[14330]: password check failed for user (root)
Jan  6 06:35:52 host sshd[14317]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.94.92.241  user=root
Jan  6 06:35:52 host sshd[14317]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 06:35:54 host sshd[14315]: Failed password for invalid user root from 80.94.92.241 port 37854 ssh2
Jan  6 06:35:54 host sshd[14315]: Connection closed by 80.94.92.241 port 37854 [preauth]
Jan  6 06:35:54 host sshd[14317]: Failed password for invalid user root from 80.94.92.241 port 37874 ssh2
Jan  6 06:35:54 host sshd[14317]: Connection closed by 80.94.92.241 port 37874 [preauth]
Jan  6 06:43:58 host sshd[15571]: Invalid user admin from 31.41.244.124 port 38475
Jan  6 06:43:58 host sshd[15571]: input_userauth_request: invalid user admin [preauth]
Jan  6 06:43:59 host sshd[15571]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 06:43:59 host sshd[15571]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.41.244.124
Jan  6 06:44:01 host sshd[15571]: Failed password for invalid user admin from 31.41.244.124 port 38475 ssh2
Jan  6 06:44:01 host sshd[15571]: Received disconnect from 31.41.244.124 port 38475:11: Client disconnecting normally [preauth]
Jan  6 06:44:01 host sshd[15571]: Disconnected from 31.41.244.124 port 38475 [preauth]
Jan  6 06:44:02 host sshd[15592]: User tomcat from 31.41.244.124 not allowed because not listed in AllowUsers
Jan  6 06:44:02 host sshd[15592]: input_userauth_request: invalid user tomcat [preauth]
Jan  6 06:44:02 host unix_chkpwd[15597]: password check failed for user (tomcat)
Jan  6 06:44:02 host sshd[15592]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.41.244.124  user=tomcat
Jan  6 06:44:02 host sshd[15592]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "tomcat"
Jan  6 06:44:04 host sshd[15592]: Failed password for invalid user tomcat from 31.41.244.124 port 43113 ssh2
Jan  6 06:44:04 host sshd[15592]: Received disconnect from 31.41.244.124 port 43113:11: Client disconnecting normally [preauth]
Jan  6 06:44:04 host sshd[15592]: Disconnected from 31.41.244.124 port 43113 [preauth]
Jan  6 06:44:05 host sshd[15610]: Invalid user nagios from 31.41.244.124 port 47279
Jan  6 06:44:05 host sshd[15610]: input_userauth_request: invalid user nagios [preauth]
Jan  6 06:44:05 host sshd[15610]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 06:44:05 host sshd[15610]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.41.244.124
Jan  6 06:44:07 host sshd[15610]: Failed password for invalid user nagios from 31.41.244.124 port 47279 ssh2
Jan  6 06:44:07 host sshd[15610]: Received disconnect from 31.41.244.124 port 47279:11: Client disconnecting normally [preauth]
Jan  6 06:44:07 host sshd[15610]: Disconnected from 31.41.244.124 port 47279 [preauth]
Jan  6 06:55:35 host sshd[17372]: Invalid user odoo from 195.226.194.242 port 35250
Jan  6 06:55:35 host sshd[17372]: input_userauth_request: invalid user odoo [preauth]
Jan  6 06:55:35 host sshd[17372]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 06:55:35 host sshd[17372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.242
Jan  6 06:55:37 host sshd[17372]: Failed password for invalid user odoo from 195.226.194.242 port 35250 ssh2
Jan  6 06:55:37 host sshd[17372]: Received disconnect from 195.226.194.242 port 35250:11: Bye Bye [preauth]
Jan  6 06:55:37 host sshd[17372]: Disconnected from 195.226.194.242 port 35250 [preauth]
Jan  6 07:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  6 07:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 07:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 07:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  6 07:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 07:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 07:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  6 07:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 07:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 07:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  6 07:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 07:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 07:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  6 07:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 07:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 07:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  6 07:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 07:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 07:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  6 07:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 07:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 07:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  6 07:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 07:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 07:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  6 07:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 07:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 07:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  6 07:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 07:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 07:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  6 07:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 07:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 07:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  6 07:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 07:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 07:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  6 07:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 07:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 07:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=pmcresources user-2=vfmassets user-3=wwwtestugo user-4=shalinijames user-5=wwwkapin user-6=woodpeck user-7=wwwkmaorg user-8=disposeat user-9=remysagr user-10=wwwnexidigital user-11=mrsclean user-12=gifterman user-13=palco123 user-14=phmetals user-15=kottayamcalldriv user-16=wwwletsstalkfood user-17=straightcurve user-18=bonifacegroup user-19=wwwevmhonda user-20=laundryboniface user-21=dartsimp user-22=a2zgroup user-23=cochintaxi user-24=wwwkaretakers user-25=wwwrmswll user-26=wwwresourcehunte user-27=keralaholi user-28=ugotscom user-29=travelboniface user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  6 07:21:54 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  6 07:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 07:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 07:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  6 07:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 07:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 07:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-KTVTnvG495pl9VMl.~
Jan  6 07:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 07:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 07:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-KTVTnvG495pl9VMl.~'
Jan  6 07:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 07:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 07:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-KTVTnvG495pl9VMl.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  6 07:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 07:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 07:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  6 07:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 07:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 07:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  6 07:21:58 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 07:21:58 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 07:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  6 07:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 07:21:59 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 07:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  6 07:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 07:21:59 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 07:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  6 07:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 07:21:59 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 07:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  6 07:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 07:21:59 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 07:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  6 07:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 07:22:00 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 07:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  6 07:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  6 07:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  6 07:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  6 07:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  6 07:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  6 07:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  6 07:22:03 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  6 07:22:05 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  6 07:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  6 07:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 07:22:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 07:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  6 07:22:09 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 07:22:10 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 07:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  6 07:22:10 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 07:22:15 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 07:22:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  6 07:22:15 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 07:22:19 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 07:22:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  6 07:22:19 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 07:22:26 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 07:22:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  6 07:22:26 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  6 07:22:27 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  6 07:25:49 host sshd[22091]: User root from 195.226.194.242 not allowed because not listed in AllowUsers
Jan  6 07:25:49 host sshd[22091]: input_userauth_request: invalid user root [preauth]
Jan  6 07:25:49 host unix_chkpwd[22096]: password check failed for user (root)
Jan  6 07:25:49 host sshd[22091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.242  user=root
Jan  6 07:25:49 host sshd[22091]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 07:25:51 host sshd[22091]: Failed password for invalid user root from 195.226.194.242 port 61576 ssh2
Jan  6 07:25:51 host sshd[22091]: Received disconnect from 195.226.194.242 port 61576:11: Bye Bye [preauth]
Jan  6 07:25:51 host sshd[22091]: Disconnected from 195.226.194.242 port 61576 [preauth]
Jan  6 07:26:14 host sshd[22174]: Did not receive identification string from 24.116.119.220 port 50550
Jan  6 07:31:26 host sshd[22934]: Invalid user pi from 72.199.230.130 port 50864
Jan  6 07:31:26 host sshd[22934]: input_userauth_request: invalid user pi [preauth]
Jan  6 07:31:26 host sshd[22935]: Invalid user pi from 72.199.230.130 port 50862
Jan  6 07:31:26 host sshd[22935]: input_userauth_request: invalid user pi [preauth]
Jan  6 07:31:26 host sshd[22934]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 07:31:26 host sshd[22934]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.199.230.130
Jan  6 07:31:26 host sshd[22935]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 07:31:26 host sshd[22935]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.199.230.130
Jan  6 07:31:29 host sshd[22934]: Failed password for invalid user pi from 72.199.230.130 port 50864 ssh2
Jan  6 07:31:29 host sshd[22935]: Failed password for invalid user pi from 72.199.230.130 port 50862 ssh2
Jan  6 07:31:29 host sshd[22934]: Connection closed by 72.199.230.130 port 50864 [preauth]
Jan  6 07:31:29 host sshd[22935]: Connection closed by 72.199.230.130 port 50862 [preauth]
Jan  6 07:31:31 host sshd[22923]: Invalid user admin from 118.34.123.43 port 55963
Jan  6 07:31:31 host sshd[22923]: input_userauth_request: invalid user admin [preauth]
Jan  6 07:31:31 host sshd[22923]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 07:31:31 host sshd[22923]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.34.123.43
Jan  6 07:31:33 host sshd[22923]: Failed password for invalid user admin from 118.34.123.43 port 55963 ssh2
Jan  6 07:31:34 host sshd[22923]: Connection closed by 118.34.123.43 port 55963 [preauth]
Jan  6 08:15:49 host sshd[29505]: Invalid user mysq1 from 209.141.55.27 port 38936
Jan  6 08:15:49 host sshd[29505]: input_userauth_request: invalid user mysq1 [preauth]
Jan  6 08:15:49 host sshd[29505]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 08:15:49 host sshd[29505]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.55.27
Jan  6 08:15:51 host sshd[29505]: Failed password for invalid user mysq1 from 209.141.55.27 port 38936 ssh2
Jan  6 08:15:51 host sshd[29505]: Received disconnect from 209.141.55.27 port 38936:11: Normal Shutdown, Thank you for playing [preauth]
Jan  6 08:15:51 host sshd[29505]: Disconnected from 209.141.55.27 port 38936 [preauth]
Jan  6 08:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  6 08:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 08:21:51 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 08:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  6 08:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 08:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 08:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  6 08:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 08:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 08:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  6 08:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 08:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 08:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  6 08:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 08:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 08:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  6 08:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 08:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 08:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  6 08:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 08:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 08:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  6 08:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 08:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 08:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  6 08:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 08:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 08:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  6 08:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 08:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 08:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  6 08:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 08:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 08:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  6 08:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 08:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 08:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  6 08:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 08:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 08:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkaretakers user-2=cochintaxi user-3=dartsimp user-4=a2zgroup user-5=laundryboniface user-6=wwwpmcresource user-7=travelboniface user-8=wwwrmswll user-9=wwwresourcehunte user-10=keralaholi user-11=ugotscom user-12=wwwkmaorg user-13=disposeat user-14=remysagr user-15=wwwkapin user-16=woodpeck user-17=vfmassets user-18=wwwtestugo user-19=shalinijames user-20=pmcresources user-21=bonifacegroup user-22=wwwevmhonda user-23=straightcurve user-24=wwwletsstalkfood user-25=gifterman user-26=palco123 user-27=kottayamcalldriv user-28=phmetals user-29=mrsclean user-30=wwwnexidigital feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  6 08:21:54 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  6 08:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 08:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 08:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  6 08:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 08:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 08:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-f6W34UsM86eB2yif.~
Jan  6 08:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 08:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 08:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-f6W34UsM86eB2yif.~'
Jan  6 08:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 08:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 08:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-f6W34UsM86eB2yif.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  6 08:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 08:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 08:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  6 08:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 08:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 08:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  6 08:21:55 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 08:21:55 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 08:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  6 08:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 08:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 08:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  6 08:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 08:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 08:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  6 08:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 08:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 08:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  6 08:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 08:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 08:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  6 08:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 08:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 08:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  6 08:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  6 08:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  6 08:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  6 08:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  6 08:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  6 08:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  6 08:21:59 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  6 08:22:01 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  6 08:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  6 08:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 08:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 08:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  6 08:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 08:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 08:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  6 08:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 08:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 08:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  6 08:22:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 08:22:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 08:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  6 08:22:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 08:22:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 08:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  6 08:22:09 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  6 08:22:10 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  6 08:22:10 host sshd[30643]: Invalid user aj from 194.110.203.109 port 54420
Jan  6 08:22:11 host sshd[30643]: input_userauth_request: invalid user aj [preauth]
Jan  6 08:22:11 host sshd[30643]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 08:22:11 host sshd[30643]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109
Jan  6 08:22:13 host sshd[30643]: Failed password for invalid user aj from 194.110.203.109 port 54420 ssh2
Jan  6 08:22:16 host sshd[30643]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 08:22:17 host sshd[30643]: Failed password for invalid user aj from 194.110.203.109 port 54420 ssh2
Jan  6 08:22:21 host sshd[30643]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 08:22:23 host sshd[30643]: Failed password for invalid user aj from 194.110.203.109 port 54420 ssh2
Jan  6 08:22:26 host sshd[30643]: Connection closed by 194.110.203.109 port 54420 [preauth]
Jan  6 08:22:26 host sshd[30643]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109
Jan  6 08:28:05 host sshd[31566]: Invalid user admin1 from 195.226.194.142 port 23432
Jan  6 08:28:05 host sshd[31566]: input_userauth_request: invalid user admin1 [preauth]
Jan  6 08:28:05 host sshd[31566]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 08:28:05 host sshd[31566]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.142
Jan  6 08:28:07 host sshd[31566]: Failed password for invalid user admin1 from 195.226.194.142 port 23432 ssh2
Jan  6 08:28:07 host sshd[31566]: Received disconnect from 195.226.194.142 port 23432:11: Bye Bye [preauth]
Jan  6 08:28:07 host sshd[31566]: Disconnected from 195.226.194.142 port 23432 [preauth]
Jan  6 08:30:40 host sshd[32082]: Did not receive identification string from 92.255.85.115 port 63095
Jan  6 08:41:38 host sshd[1260]: Invalid user  from 64.62.197.26 port 16971
Jan  6 08:41:38 host sshd[1260]: input_userauth_request: invalid user  [preauth]
Jan  6 08:41:41 host sshd[1260]: Connection closed by 64.62.197.26 port 16971 [preauth]
Jan  6 08:42:34 host sshd[1396]: Invalid user gerald from 107.189.30.59 port 57352
Jan  6 08:42:34 host sshd[1396]: input_userauth_request: invalid user gerald [preauth]
Jan  6 08:42:34 host sshd[1396]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 08:42:34 host sshd[1396]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59
Jan  6 08:42:36 host sshd[1396]: Failed password for invalid user gerald from 107.189.30.59 port 57352 ssh2
Jan  6 08:42:37 host sshd[1396]: Connection closed by 107.189.30.59 port 57352 [preauth]
Jan  6 08:54:32 host sshd[3114]: User root from 61.83.229.226 not allowed because not listed in AllowUsers
Jan  6 08:54:32 host sshd[3114]: input_userauth_request: invalid user root [preauth]
Jan  6 08:54:32 host unix_chkpwd[3117]: password check failed for user (root)
Jan  6 08:54:32 host sshd[3114]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.83.229.226  user=root
Jan  6 08:54:32 host sshd[3114]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 08:54:34 host sshd[3114]: Failed password for invalid user root from 61.83.229.226 port 53698 ssh2
Jan  6 08:54:35 host sshd[3114]: Received disconnect from 61.83.229.226 port 53698:11: Bye Bye [preauth]
Jan  6 08:54:35 host sshd[3114]: Disconnected from 61.83.229.226 port 53698 [preauth]
Jan  6 08:55:07 host sshd[3189]: Invalid user administrator from 200.94.86.84 port 47112
Jan  6 08:55:07 host sshd[3189]: input_userauth_request: invalid user administrator [preauth]
Jan  6 08:55:07 host sshd[3189]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 08:55:07 host sshd[3189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.94.86.84
Jan  6 08:55:09 host sshd[3189]: Failed password for invalid user administrator from 200.94.86.84 port 47112 ssh2
Jan  6 08:55:10 host sshd[3189]: Received disconnect from 200.94.86.84 port 47112:11: Bye Bye [preauth]
Jan  6 08:55:10 host sshd[3189]: Disconnected from 200.94.86.84 port 47112 [preauth]
Jan  6 08:57:09 host sshd[3558]: User adm from 200.94.86.84 not allowed because not listed in AllowUsers
Jan  6 08:57:09 host sshd[3558]: input_userauth_request: invalid user adm [preauth]
Jan  6 08:57:09 host unix_chkpwd[3563]: password check failed for user (adm)
Jan  6 08:57:09 host sshd[3558]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.94.86.84  user=adm
Jan  6 08:57:09 host sshd[3558]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "adm"
Jan  6 08:57:12 host sshd[3558]: Failed password for invalid user adm from 200.94.86.84 port 33461 ssh2
Jan  6 08:57:12 host sshd[3558]: Received disconnect from 200.94.86.84 port 33461:11: Bye Bye [preauth]
Jan  6 08:57:12 host sshd[3558]: Disconnected from 200.94.86.84 port 33461 [preauth]
Jan  6 08:57:12 host sshd[3566]: User root from 61.83.229.226 not allowed because not listed in AllowUsers
Jan  6 08:57:12 host sshd[3566]: input_userauth_request: invalid user root [preauth]
Jan  6 08:57:12 host unix_chkpwd[3575]: password check failed for user (root)
Jan  6 08:57:12 host sshd[3566]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.83.229.226  user=root
Jan  6 08:57:12 host sshd[3566]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 08:57:14 host sshd[3566]: Failed password for invalid user root from 61.83.229.226 port 33090 ssh2
Jan  6 08:57:14 host sshd[3566]: Received disconnect from 61.83.229.226 port 33090:11: Bye Bye [preauth]
Jan  6 08:57:14 host sshd[3566]: Disconnected from 61.83.229.226 port 33090 [preauth]
Jan  6 09:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  6 09:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 09:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 09:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  6 09:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 09:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 09:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  6 09:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 09:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 09:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  6 09:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 09:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 09:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  6 09:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 09:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 09:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  6 09:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 09:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 09:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  6 09:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 09:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 09:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  6 09:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 09:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 09:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  6 09:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 09:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 09:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  6 09:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 09:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 09:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  6 09:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 09:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 09:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  6 09:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 09:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 09:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  6 09:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 09:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 09:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=cochintaxi user-2=wwwkaretakers user-3=laundryboniface user-4=a2zgroup user-5=dartsimp user-6=wwwpmcresource user-7=ugotscom user-8=wwwresourcehunte user-9=keralaholi user-10=wwwrmswll user-11=travelboniface user-12=woodpeck user-13=wwwkapin user-14=disposeat user-15=wwwkmaorg user-16=remysagr user-17=pmcresources user-18=shalinijames user-19=wwwtestugo user-20=vfmassets user-21=straightcurve user-22=wwwletsstalkfood user-23=wwwevmhonda user-24=bonifacegroup user-25=mrsclean user-26=wwwnexidigital user-27=phmetals user-28=kottayamcalldriv user-29=palco123 user-30=gifterman feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  6 09:21:54 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  6 09:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 09:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 09:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  6 09:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 09:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 09:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-YhlDM9xA7UBWKUUK.~
Jan  6 09:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 09:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 09:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-YhlDM9xA7UBWKUUK.~'
Jan  6 09:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 09:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 09:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-YhlDM9xA7UBWKUUK.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  6 09:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 09:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 09:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  6 09:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 09:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 09:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  6 09:21:58 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 09:21:58 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 09:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  6 09:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 09:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 09:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  6 09:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 09:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 09:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  6 09:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 09:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 09:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  6 09:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 09:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 09:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  6 09:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 09:21:59 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 09:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  6 09:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  6 09:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  6 09:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  6 09:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  6 09:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  6 09:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  6 09:22:02 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  6 09:22:04 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  6 09:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  6 09:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 09:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 09:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  6 09:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 09:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 09:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  6 09:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 09:22:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 09:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  6 09:22:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 09:22:10 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 09:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  6 09:22:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 09:22:16 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 09:22:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  6 09:22:17 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  6 09:22:21 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  6 09:27:51 host sshd[8604]: User sshd from 195.226.194.142 not allowed because not listed in AllowUsers
Jan  6 09:27:51 host sshd[8604]: input_userauth_request: invalid user sshd [preauth]
Jan  6 09:27:51 host sshd[8604]: Failed none for invalid user sshd from 195.226.194.142 port 56340 ssh2
Jan  6 09:27:51 host sshd[8604]: Received disconnect from 195.226.194.142 port 56340:11: Bye Bye [preauth]
Jan  6 09:27:51 host sshd[8604]: Disconnected from 195.226.194.142 port 56340 [preauth]
Jan  6 09:38:32 host sshd[10391]: Invalid user testuser from 128.199.22.244 port 39666
Jan  6 09:38:32 host sshd[10391]: input_userauth_request: invalid user testuser [preauth]
Jan  6 09:38:32 host sshd[10391]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 09:38:32 host sshd[10391]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.22.244
Jan  6 09:38:34 host sshd[10391]: Failed password for invalid user testuser from 128.199.22.244 port 39666 ssh2
Jan  6 09:38:34 host sshd[10391]: Connection closed by 128.199.22.244 port 39666 [preauth]
Jan  6 09:42:36 host sshd[11020]: Invalid user test from 128.199.22.244 port 43824
Jan  6 09:42:36 host sshd[11020]: input_userauth_request: invalid user test [preauth]
Jan  6 09:42:36 host sshd[11020]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 09:42:36 host sshd[11020]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.22.244
Jan  6 09:42:38 host sshd[11020]: Failed password for invalid user test from 128.199.22.244 port 43824 ssh2
Jan  6 09:42:38 host sshd[11020]: Connection closed by 128.199.22.244 port 43824 [preauth]
Jan  6 09:46:41 host sshd[11648]: Invalid user user from 128.199.22.244 port 45286
Jan  6 09:46:41 host sshd[11648]: input_userauth_request: invalid user user [preauth]
Jan  6 09:46:41 host sshd[11648]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 09:46:41 host sshd[11648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.22.244
Jan  6 09:46:43 host sshd[11648]: Failed password for invalid user user from 128.199.22.244 port 45286 ssh2
Jan  6 09:46:43 host sshd[11648]: Connection closed by 128.199.22.244 port 45286 [preauth]
Jan  6 09:55:18 host sshd[12760]: User root from 195.226.194.142 not allowed because not listed in AllowUsers
Jan  6 09:55:18 host sshd[12760]: input_userauth_request: invalid user root [preauth]
Jan  6 09:55:18 host unix_chkpwd[12763]: password check failed for user (root)
Jan  6 09:55:18 host sshd[12760]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.142  user=root
Jan  6 09:55:18 host sshd[12760]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 09:55:20 host sshd[12760]: Failed password for invalid user root from 195.226.194.142 port 28780 ssh2
Jan  6 09:55:20 host sshd[12760]: Received disconnect from 195.226.194.142 port 28780:11: Bye Bye [preauth]
Jan  6 09:55:20 host sshd[12760]: Disconnected from 195.226.194.142 port 28780 [preauth]
Jan  6 10:02:09 host sshd[13876]: Invalid user oracle from 103.225.124.210 port 47330
Jan  6 10:02:09 host sshd[13876]: input_userauth_request: invalid user oracle [preauth]
Jan  6 10:02:09 host sshd[13876]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 10:02:09 host sshd[13876]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.225.124.210
Jan  6 10:02:11 host sshd[13876]: Failed password for invalid user oracle from 103.225.124.210 port 47330 ssh2
Jan  6 10:02:11 host sshd[13876]: Received disconnect from 103.225.124.210 port 47330:11: Bye Bye [preauth]
Jan  6 10:02:11 host sshd[13876]: Disconnected from 103.225.124.210 port 47330 [preauth]
Jan  6 10:02:17 host sshd[13884]: User root from 185.14.184.148 not allowed because not listed in AllowUsers
Jan  6 10:02:17 host sshd[13884]: input_userauth_request: invalid user root [preauth]
Jan  6 10:02:17 host unix_chkpwd[13888]: password check failed for user (root)
Jan  6 10:02:17 host sshd[13884]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.14.184.148  user=root
Jan  6 10:02:17 host sshd[13884]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 10:02:19 host sshd[13890]: Invalid user transmission from 202.74.236.82 port 55698
Jan  6 10:02:19 host sshd[13890]: input_userauth_request: invalid user transmission [preauth]
Jan  6 10:02:19 host sshd[13890]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 10:02:19 host sshd[13890]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.74.236.82
Jan  6 10:02:19 host sshd[13884]: Failed password for invalid user root from 185.14.184.148 port 46844 ssh2
Jan  6 10:02:19 host sshd[13884]: Received disconnect from 185.14.184.148 port 46844:11: Bye Bye [preauth]
Jan  6 10:02:19 host sshd[13884]: Disconnected from 185.14.184.148 port 46844 [preauth]
Jan  6 10:02:21 host sshd[13890]: Failed password for invalid user transmission from 202.74.236.82 port 55698 ssh2
Jan  6 10:02:21 host sshd[13890]: Received disconnect from 202.74.236.82 port 55698:11: Bye Bye [preauth]
Jan  6 10:02:21 host sshd[13890]: Disconnected from 202.74.236.82 port 55698 [preauth]
Jan  6 10:04:55 host sshd[14253]: Invalid user ly from 43.156.34.40 port 58514
Jan  6 10:04:55 host sshd[14253]: input_userauth_request: invalid user ly [preauth]
Jan  6 10:04:55 host sshd[14253]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 10:04:55 host sshd[14253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.34.40
Jan  6 10:04:58 host sshd[14253]: Failed password for invalid user ly from 43.156.34.40 port 58514 ssh2
Jan  6 10:04:58 host sshd[14253]: Received disconnect from 43.156.34.40 port 58514:11: Bye Bye [preauth]
Jan  6 10:04:58 host sshd[14253]: Disconnected from 43.156.34.40 port 58514 [preauth]
Jan  6 10:05:29 host sshd[14369]: Invalid user ftpuser1 from 35.226.126.79 port 48822
Jan  6 10:05:29 host sshd[14369]: input_userauth_request: invalid user ftpuser1 [preauth]
Jan  6 10:05:29 host sshd[14369]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 10:05:29 host sshd[14369]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.226.126.79
Jan  6 10:05:32 host sshd[14369]: Failed password for invalid user ftpuser1 from 35.226.126.79 port 48822 ssh2
Jan  6 10:05:32 host sshd[14369]: Received disconnect from 35.226.126.79 port 48822:11: Bye Bye [preauth]
Jan  6 10:05:32 host sshd[14369]: Disconnected from 35.226.126.79 port 48822 [preauth]
Jan  6 10:05:32 host sshd[14379]: Invalid user minecraft from 209.73.215.135 port 42944
Jan  6 10:05:32 host sshd[14379]: input_userauth_request: invalid user minecraft [preauth]
Jan  6 10:05:32 host sshd[14379]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 10:05:32 host sshd[14379]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.73.215.135
Jan  6 10:05:35 host sshd[14379]: Failed password for invalid user minecraft from 209.73.215.135 port 42944 ssh2
Jan  6 10:05:35 host sshd[14379]: Received disconnect from 209.73.215.135 port 42944:11: Bye Bye [preauth]
Jan  6 10:05:35 host sshd[14379]: Disconnected from 209.73.215.135 port 42944 [preauth]
Jan  6 10:06:14 host sshd[14487]: Invalid user transmission from 189.112.196.1 port 30452
Jan  6 10:06:14 host sshd[14487]: input_userauth_request: invalid user transmission [preauth]
Jan  6 10:06:14 host sshd[14487]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 10:06:14 host sshd[14487]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.112.196.1
Jan  6 10:06:17 host sshd[14487]: Failed password for invalid user transmission from 189.112.196.1 port 30452 ssh2
Jan  6 10:06:17 host sshd[14487]: Received disconnect from 189.112.196.1 port 30452:11: Bye Bye [preauth]
Jan  6 10:06:17 host sshd[14487]: Disconnected from 189.112.196.1 port 30452 [preauth]
Jan  6 10:06:52 host sshd[14566]: Invalid user ubuntu from 158.101.97.210 port 48150
Jan  6 10:06:52 host sshd[14566]: input_userauth_request: invalid user ubuntu [preauth]
Jan  6 10:06:52 host sshd[14566]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 10:06:52 host sshd[14566]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.101.97.210
Jan  6 10:06:54 host sshd[14566]: Failed password for invalid user ubuntu from 158.101.97.210 port 48150 ssh2
Jan  6 10:06:54 host sshd[14566]: Received disconnect from 158.101.97.210 port 48150:11: Bye Bye [preauth]
Jan  6 10:06:54 host sshd[14566]: Disconnected from 158.101.97.210 port 48150 [preauth]
Jan  6 10:06:57 host sshd[14573]: User root from 209.73.215.135 not allowed because not listed in AllowUsers
Jan  6 10:06:57 host sshd[14573]: input_userauth_request: invalid user root [preauth]
Jan  6 10:06:57 host unix_chkpwd[14576]: password check failed for user (root)
Jan  6 10:06:57 host sshd[14573]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.73.215.135  user=root
Jan  6 10:06:57 host sshd[14573]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 10:06:59 host sshd[14573]: Failed password for invalid user root from 209.73.215.135 port 44612 ssh2
Jan  6 10:06:59 host sshd[14573]: Received disconnect from 209.73.215.135 port 44612:11: Bye Bye [preauth]
Jan  6 10:06:59 host sshd[14573]: Disconnected from 209.73.215.135 port 44612 [preauth]
Jan  6 10:07:10 host sshd[14734]: Invalid user robert from 35.226.126.79 port 38428
Jan  6 10:07:10 host sshd[14734]: input_userauth_request: invalid user robert [preauth]
Jan  6 10:07:10 host sshd[14734]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 10:07:10 host sshd[14734]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.226.126.79
Jan  6 10:07:11 host sshd[14734]: Failed password for invalid user robert from 35.226.126.79 port 38428 ssh2
Jan  6 10:07:12 host sshd[14734]: Received disconnect from 35.226.126.79 port 38428:11: Bye Bye [preauth]
Jan  6 10:07:12 host sshd[14734]: Disconnected from 35.226.126.79 port 38428 [preauth]
Jan  6 10:07:24 host sshd[14749]: User root from 103.225.124.210 not allowed because not listed in AllowUsers
Jan  6 10:07:24 host sshd[14749]: input_userauth_request: invalid user root [preauth]
Jan  6 10:07:24 host unix_chkpwd[14751]: password check failed for user (root)
Jan  6 10:07:24 host sshd[14749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.225.124.210  user=root
Jan  6 10:07:24 host sshd[14749]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 10:07:26 host sshd[14749]: Failed password for invalid user root from 103.225.124.210 port 40056 ssh2
Jan  6 10:07:26 host sshd[14749]: Received disconnect from 103.225.124.210 port 40056:11: Bye Bye [preauth]
Jan  6 10:07:26 host sshd[14749]: Disconnected from 103.225.124.210 port 40056 [preauth]
Jan  6 10:07:28 host sshd[14782]: Invalid user master from 202.74.236.82 port 47990
Jan  6 10:07:28 host sshd[14782]: input_userauth_request: invalid user master [preauth]
Jan  6 10:07:28 host sshd[14782]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 10:07:28 host sshd[14782]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.74.236.82
Jan  6 10:07:29 host sshd[14782]: Failed password for invalid user master from 202.74.236.82 port 47990 ssh2
Jan  6 10:07:29 host sshd[14782]: Received disconnect from 202.74.236.82 port 47990:11: Bye Bye [preauth]
Jan  6 10:07:29 host sshd[14782]: Disconnected from 202.74.236.82 port 47990 [preauth]
Jan  6 10:07:45 host sshd[14840]: Invalid user test from 185.14.184.148 port 48502
Jan  6 10:07:45 host sshd[14840]: input_userauth_request: invalid user test [preauth]
Jan  6 10:07:45 host sshd[14840]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 10:07:45 host sshd[14840]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.14.184.148
Jan  6 10:07:47 host sshd[14840]: Failed password for invalid user test from 185.14.184.148 port 48502 ssh2
Jan  6 10:07:47 host sshd[14840]: Received disconnect from 185.14.184.148 port 48502:11: Bye Bye [preauth]
Jan  6 10:07:47 host sshd[14840]: Disconnected from 185.14.184.148 port 48502 [preauth]
Jan  6 10:07:53 host sshd[14881]: Invalid user user1 from 43.156.34.40 port 36564
Jan  6 10:07:53 host sshd[14881]: input_userauth_request: invalid user user1 [preauth]
Jan  6 10:07:53 host sshd[14881]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 10:07:53 host sshd[14881]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.34.40
Jan  6 10:07:55 host sshd[14881]: Failed password for invalid user user1 from 43.156.34.40 port 36564 ssh2
Jan  6 10:07:55 host sshd[14881]: Received disconnect from 43.156.34.40 port 36564:11: Bye Bye [preauth]
Jan  6 10:07:55 host sshd[14881]: Disconnected from 43.156.34.40 port 36564 [preauth]
Jan  6 10:08:24 host sshd[14931]: Invalid user cloud from 35.226.126.79 port 42102
Jan  6 10:08:24 host sshd[14931]: input_userauth_request: invalid user cloud [preauth]
Jan  6 10:08:24 host sshd[14931]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 10:08:24 host sshd[14931]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.226.126.79
Jan  6 10:08:27 host sshd[14931]: Failed password for invalid user cloud from 35.226.126.79 port 42102 ssh2
Jan  6 10:08:44 host sshd[15014]: User root from 202.74.236.82 not allowed because not listed in AllowUsers
Jan  6 10:08:44 host sshd[15014]: input_userauth_request: invalid user root [preauth]
Jan  6 10:08:44 host unix_chkpwd[15016]: password check failed for user (root)
Jan  6 10:08:44 host sshd[15014]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.74.236.82  user=root
Jan  6 10:08:44 host sshd[15014]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 10:08:46 host sshd[15014]: Failed password for invalid user root from 202.74.236.82 port 43234 ssh2
Jan  6 10:08:58 host sshd[15074]: User root from 189.112.196.1 not allowed because not listed in AllowUsers
Jan  6 10:08:58 host sshd[15074]: input_userauth_request: invalid user root [preauth]
Jan  6 10:08:58 host unix_chkpwd[15079]: password check failed for user (root)
Jan  6 10:08:58 host sshd[15074]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.112.196.1  user=root
Jan  6 10:08:58 host sshd[15074]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 10:09:00 host sshd[15074]: Failed password for invalid user root from 189.112.196.1 port 42368 ssh2
Jan  6 10:09:00 host sshd[15074]: Received disconnect from 189.112.196.1 port 42368:11: Bye Bye [preauth]
Jan  6 10:09:00 host sshd[15074]: Disconnected from 189.112.196.1 port 42368 [preauth]
Jan  6 10:09:09 host sshd[15146]: User root from 43.156.34.40 not allowed because not listed in AllowUsers
Jan  6 10:09:09 host sshd[15146]: input_userauth_request: invalid user root [preauth]
Jan  6 10:09:09 host unix_chkpwd[15148]: password check failed for user (root)
Jan  6 10:09:09 host sshd[15146]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.34.40  user=root
Jan  6 10:09:09 host sshd[15146]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 10:09:10 host sshd[15146]: Failed password for invalid user root from 43.156.34.40 port 59994 ssh2
Jan  6 10:09:50 host sshd[15259]: User root from 158.101.97.210 not allowed because not listed in AllowUsers
Jan  6 10:09:50 host sshd[15259]: input_userauth_request: invalid user root [preauth]
Jan  6 10:09:50 host unix_chkpwd[15262]: password check failed for user (root)
Jan  6 10:09:50 host sshd[15259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.101.97.210  user=root
Jan  6 10:09:50 host sshd[15259]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 10:09:52 host sshd[15259]: Failed password for invalid user root from 158.101.97.210 port 51994 ssh2
Jan  6 10:09:53 host sshd[15259]: Received disconnect from 158.101.97.210 port 51994:11: Bye Bye [preauth]
Jan  6 10:09:53 host sshd[15259]: Disconnected from 158.101.97.210 port 51994 [preauth]
Jan  6 10:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  6 10:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 10:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 10:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  6 10:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 10:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 10:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  6 10:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 10:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 10:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  6 10:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 10:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 10:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  6 10:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 10:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 10:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  6 10:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 10:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 10:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  6 10:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 10:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 10:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  6 10:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 10:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 10:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  6 10:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 10:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 10:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  6 10:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 10:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 10:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  6 10:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 10:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 10:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  6 10:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 10:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 10:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  6 10:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 10:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 10:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=ugotscom user-3=wwwrmswll user-4=wwwresourcehunte user-5=keralaholi user-6=travelboniface user-7=wwwkaretakers user-8=cochintaxi user-9=laundryboniface user-10=dartsimp user-11=a2zgroup user-12=wwwletsstalkfood user-13=straightcurve user-14=wwwevmhonda user-15=bonifacegroup user-16=mrsclean user-17=wwwnexidigital user-18=kottayamcalldriv user-19=phmetals user-20=gifterman user-21=palco123 user-22=wwwkapin user-23=woodpeck user-24=wwwkmaorg user-25=disposeat user-26=remysagr user-27=pmcresources user-28=wwwtestugo user-29=shalinijames user-30=vfmassets feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  6 10:21:54 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  6 10:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 10:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 10:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  6 10:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 10:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 10:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-EKZRfQyDTmg8t89U.~
Jan  6 10:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 10:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 10:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-EKZRfQyDTmg8t89U.~'
Jan  6 10:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 10:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 10:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-EKZRfQyDTmg8t89U.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  6 10:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 10:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 10:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  6 10:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 10:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 10:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  6 10:21:55 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 10:21:55 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 10:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  6 10:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 10:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 10:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  6 10:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 10:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 10:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  6 10:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 10:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 10:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  6 10:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 10:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 10:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  6 10:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 10:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 10:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  6 10:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  6 10:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  6 10:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  6 10:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  6 10:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  6 10:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  6 10:22:00 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  6 10:22:02 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  6 10:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  6 10:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 10:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 10:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  6 10:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 10:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 10:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  6 10:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 10:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 10:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  6 10:22:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 10:22:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 10:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  6 10:22:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 10:22:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 10:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  6 10:22:10 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  6 10:22:11 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  6 10:27:33 host sshd[18605]: User mysql from 195.226.194.142 not allowed because not listed in AllowUsers
Jan  6 10:27:33 host sshd[18605]: input_userauth_request: invalid user mysql [preauth]
Jan  6 10:27:33 host unix_chkpwd[18607]: password check failed for user (mysql)
Jan  6 10:27:33 host sshd[18605]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.142  user=mysql
Jan  6 10:27:33 host sshd[18605]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "mysql"
Jan  6 10:27:36 host sshd[18605]: Failed password for invalid user mysql from 195.226.194.142 port 17716 ssh2
Jan  6 10:41:17 host sshd[21241]: Invalid user ak from 194.110.203.109 port 38886
Jan  6 10:41:17 host sshd[21241]: input_userauth_request: invalid user ak [preauth]
Jan  6 10:41:17 host sshd[21241]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 10:41:17 host sshd[21241]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109
Jan  6 10:41:19 host sshd[21241]: Failed password for invalid user ak from 194.110.203.109 port 38886 ssh2
Jan  6 10:41:23 host sshd[21241]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 10:41:25 host sshd[21241]: Failed password for invalid user ak from 194.110.203.109 port 38886 ssh2
Jan  6 10:41:28 host sshd[21241]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 10:41:30 host sshd[21241]: Failed password for invalid user ak from 194.110.203.109 port 38886 ssh2
Jan  6 10:41:33 host sshd[21241]: Connection closed by 194.110.203.109 port 38886 [preauth]
Jan  6 10:41:33 host sshd[21241]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109
Jan  6 10:42:37 host sshd[21400]: Invalid user bzrx1098ui from 92.255.85.115 port 40112
Jan  6 10:42:37 host sshd[21400]: input_userauth_request: invalid user bzrx1098ui [preauth]
Jan  6 10:42:37 host sshd[21400]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 10:42:37 host sshd[21400]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.255.85.115
Jan  6 10:42:39 host sshd[21400]: Failed password for invalid user bzrx1098ui from 92.255.85.115 port 40112 ssh2
Jan  6 10:42:40 host sshd[21400]: Connection reset by 92.255.85.115 port 40112 [preauth]
Jan  6 10:51:40 host sshd[22741]: Invalid user admin from 92.255.85.115 port 43852
Jan  6 10:51:40 host sshd[22741]: input_userauth_request: invalid user admin [preauth]
Jan  6 10:51:40 host sshd[22741]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 10:51:40 host sshd[22741]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.255.85.115
Jan  6 10:51:42 host sshd[22741]: Failed password for invalid user admin from 92.255.85.115 port 43852 ssh2
Jan  6 10:51:42 host sshd[22741]: Connection reset by 92.255.85.115 port 43852 [preauth]
Jan  6 11:00:30 host sshd[24226]: Invalid user support from 92.255.85.115 port 3893
Jan  6 11:00:30 host sshd[24226]: input_userauth_request: invalid user support [preauth]
Jan  6 11:00:30 host sshd[24226]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 11:00:30 host sshd[24226]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.255.85.115
Jan  6 11:00:32 host sshd[24226]: Failed password for invalid user support from 92.255.85.115 port 3893 ssh2
Jan  6 11:10:22 host sshd[26189]: Invalid user test_ftp from 51.79.65.236 port 37296
Jan  6 11:10:22 host sshd[26189]: input_userauth_request: invalid user test_ftp [preauth]
Jan  6 11:10:22 host sshd[26189]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 11:10:22 host sshd[26189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.79.65.236
Jan  6 11:10:24 host sshd[26189]: Failed password for invalid user test_ftp from 51.79.65.236 port 37296 ssh2
Jan  6 11:10:24 host sshd[26189]: Received disconnect from 51.79.65.236 port 37296:11: Bye Bye [preauth]
Jan  6 11:10:24 host sshd[26189]: Disconnected from 51.79.65.236 port 37296 [preauth]
Jan  6 11:10:49 host sshd[26291]: Invalid user student7 from 157.230.218.88 port 50090
Jan  6 11:10:49 host sshd[26291]: input_userauth_request: invalid user student7 [preauth]
Jan  6 11:10:49 host sshd[26291]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 11:10:49 host sshd[26291]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.218.88
Jan  6 11:10:51 host sshd[26298]: Invalid user martin from 119.65.149.106 port 6030
Jan  6 11:10:51 host sshd[26298]: input_userauth_request: invalid user martin [preauth]
Jan  6 11:10:51 host sshd[26298]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 11:10:51 host sshd[26298]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.65.149.106
Jan  6 11:10:51 host sshd[26291]: Failed password for invalid user student7 from 157.230.218.88 port 50090 ssh2
Jan  6 11:10:51 host sshd[26291]: Received disconnect from 157.230.218.88 port 50090:11: Bye Bye [preauth]
Jan  6 11:10:51 host sshd[26291]: Disconnected from 157.230.218.88 port 50090 [preauth]
Jan  6 11:10:53 host sshd[26298]: Failed password for invalid user martin from 119.65.149.106 port 6030 ssh2
Jan  6 11:10:53 host sshd[26298]: Received disconnect from 119.65.149.106 port 6030:11: Bye Bye [preauth]
Jan  6 11:10:53 host sshd[26298]: Disconnected from 119.65.149.106 port 6030 [preauth]
Jan  6 11:12:55 host sshd[26674]: Invalid user jenny from 164.92.66.116 port 33870
Jan  6 11:12:55 host sshd[26674]: input_userauth_request: invalid user jenny [preauth]
Jan  6 11:12:55 host sshd[26674]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 11:12:55 host sshd[26674]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.66.116
Jan  6 11:12:57 host sshd[26674]: Failed password for invalid user jenny from 164.92.66.116 port 33870 ssh2
Jan  6 11:12:57 host sshd[26674]: Received disconnect from 164.92.66.116 port 33870:11: Bye Bye [preauth]
Jan  6 11:12:57 host sshd[26674]: Disconnected from 164.92.66.116 port 33870 [preauth]
Jan  6 11:13:14 host sshd[26749]: User root from 147.182.185.145 not allowed because not listed in AllowUsers
Jan  6 11:13:14 host sshd[26749]: input_userauth_request: invalid user root [preauth]
Jan  6 11:13:14 host unix_chkpwd[26753]: password check failed for user (root)
Jan  6 11:13:14 host sshd[26749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.182.185.145  user=root
Jan  6 11:13:14 host sshd[26749]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 11:13:16 host sshd[26749]: Failed password for invalid user root from 147.182.185.145 port 45546 ssh2
Jan  6 11:13:16 host sshd[26749]: Received disconnect from 147.182.185.145 port 45546:11: Bye Bye [preauth]
Jan  6 11:13:16 host sshd[26749]: Disconnected from 147.182.185.145 port 45546 [preauth]
Jan  6 11:14:30 host sshd[27112]: Invalid user finance from 152.169.12.75 port 43303
Jan  6 11:14:30 host sshd[27112]: input_userauth_request: invalid user finance [preauth]
Jan  6 11:14:30 host sshd[27112]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 11:14:30 host sshd[27112]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.169.12.75
Jan  6 11:14:30 host sshd[27117]: User root from 43.134.186.44 not allowed because not listed in AllowUsers
Jan  6 11:14:30 host sshd[27117]: input_userauth_request: invalid user root [preauth]
Jan  6 11:14:30 host unix_chkpwd[27119]: password check failed for user (root)
Jan  6 11:14:30 host sshd[27117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.134.186.44  user=root
Jan  6 11:14:30 host sshd[27117]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 11:14:32 host sshd[27112]: Failed password for invalid user finance from 152.169.12.75 port 43303 ssh2
Jan  6 11:14:32 host sshd[27117]: Failed password for invalid user root from 43.134.186.44 port 59544 ssh2
Jan  6 11:14:32 host sshd[27117]: Received disconnect from 43.134.186.44 port 59544:11: Bye Bye [preauth]
Jan  6 11:14:32 host sshd[27117]: Disconnected from 43.134.186.44 port 59544 [preauth]
Jan  6 11:14:32 host sshd[27112]: Received disconnect from 152.169.12.75 port 43303:11: Bye Bye [preauth]
Jan  6 11:14:32 host sshd[27112]: Disconnected from 152.169.12.75 port 43303 [preauth]
Jan  6 11:15:33 host sshd[27313]: User root from 41.33.118.92 not allowed because not listed in AllowUsers
Jan  6 11:15:33 host sshd[27313]: input_userauth_request: invalid user root [preauth]
Jan  6 11:15:33 host unix_chkpwd[27317]: password check failed for user (root)
Jan  6 11:15:33 host sshd[27313]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.33.118.92  user=root
Jan  6 11:15:33 host sshd[27313]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 11:15:35 host sshd[27313]: Failed password for invalid user root from 41.33.118.92 port 54062 ssh2
Jan  6 11:15:35 host sshd[27313]: Received disconnect from 41.33.118.92 port 54062:11: Bye Bye [preauth]
Jan  6 11:15:35 host sshd[27313]: Disconnected from 41.33.118.92 port 54062 [preauth]
Jan  6 11:16:03 host sshd[27372]: Invalid user test from 119.65.149.106 port 25022
Jan  6 11:16:03 host sshd[27372]: input_userauth_request: invalid user test [preauth]
Jan  6 11:16:03 host sshd[27372]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 11:16:03 host sshd[27372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.65.149.106
Jan  6 11:16:04 host sshd[27372]: Failed password for invalid user test from 119.65.149.106 port 25022 ssh2
Jan  6 11:16:05 host sshd[27372]: Received disconnect from 119.65.149.106 port 25022:11: Bye Bye [preauth]
Jan  6 11:16:05 host sshd[27372]: Disconnected from 119.65.149.106 port 25022 [preauth]
Jan  6 11:16:09 host sshd[27385]: User root from 157.230.218.88 not allowed because not listed in AllowUsers
Jan  6 11:16:09 host sshd[27385]: input_userauth_request: invalid user root [preauth]
Jan  6 11:16:09 host unix_chkpwd[27389]: password check failed for user (root)
Jan  6 11:16:09 host sshd[27385]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.218.88  user=root
Jan  6 11:16:09 host sshd[27385]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 11:16:11 host sshd[27385]: Failed password for invalid user root from 157.230.218.88 port 50290 ssh2
Jan  6 11:16:11 host sshd[27385]: Received disconnect from 157.230.218.88 port 50290:11: Bye Bye [preauth]
Jan  6 11:16:11 host sshd[27385]: Disconnected from 157.230.218.88 port 50290 [preauth]
Jan  6 11:16:12 host sshd[27392]: User root from 147.182.185.145 not allowed because not listed in AllowUsers
Jan  6 11:16:12 host sshd[27392]: input_userauth_request: invalid user root [preauth]
Jan  6 11:16:12 host unix_chkpwd[27396]: password check failed for user (root)
Jan  6 11:16:12 host sshd[27392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.182.185.145  user=root
Jan  6 11:16:12 host sshd[27392]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 11:16:13 host sshd[27392]: Failed password for invalid user root from 147.182.185.145 port 55210 ssh2
Jan  6 11:16:52 host sshd[27571]: Invalid user solr from 164.92.66.116 port 47226
Jan  6 11:16:52 host sshd[27571]: input_userauth_request: invalid user solr [preauth]
Jan  6 11:16:52 host sshd[27571]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 11:16:52 host sshd[27571]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.66.116
Jan  6 11:16:54 host sshd[27571]: Failed password for invalid user solr from 164.92.66.116 port 47226 ssh2
Jan  6 11:16:54 host sshd[27571]: Received disconnect from 164.92.66.116 port 47226:11: Bye Bye [preauth]
Jan  6 11:16:54 host sshd[27571]: Disconnected from 164.92.66.116 port 47226 [preauth]
Jan  6 11:17:06 host sshd[27618]: User root from 43.134.186.44 not allowed because not listed in AllowUsers
Jan  6 11:17:06 host sshd[27618]: input_userauth_request: invalid user root [preauth]
Jan  6 11:17:06 host unix_chkpwd[27620]: password check failed for user (root)
Jan  6 11:17:06 host sshd[27618]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.134.186.44  user=root
Jan  6 11:17:06 host sshd[27618]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 11:17:08 host sshd[27618]: Failed password for invalid user root from 43.134.186.44 port 55806 ssh2
Jan  6 11:17:27 host sshd[27717]: Invalid user marcela from 119.65.149.106 port 8398
Jan  6 11:17:27 host sshd[27717]: input_userauth_request: invalid user marcela [preauth]
Jan  6 11:17:27 host sshd[27717]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 11:17:27 host sshd[27717]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.65.149.106
Jan  6 11:17:29 host sshd[27717]: Failed password for invalid user marcela from 119.65.149.106 port 8398 ssh2
Jan  6 11:17:34 host sshd[27782]: Invalid user factura from 51.79.65.236 port 37720
Jan  6 11:17:34 host sshd[27782]: input_userauth_request: invalid user factura [preauth]
Jan  6 11:17:34 host sshd[27782]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 11:17:34 host sshd[27782]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.79.65.236
Jan  6 11:17:36 host sshd[27782]: Failed password for invalid user factura from 51.79.65.236 port 37720 ssh2
Jan  6 11:17:37 host sshd[27782]: Received disconnect from 51.79.65.236 port 37720:11: Bye Bye [preauth]
Jan  6 11:17:37 host sshd[27782]: Disconnected from 51.79.65.236 port 37720 [preauth]
Jan  6 11:17:52 host sshd[27817]: User root from 20.226.9.118 not allowed because not listed in AllowUsers
Jan  6 11:17:52 host sshd[27817]: input_userauth_request: invalid user root [preauth]
Jan  6 11:17:52 host unix_chkpwd[27826]: password check failed for user (root)
Jan  6 11:17:52 host sshd[27817]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.226.9.118  user=root
Jan  6 11:17:52 host sshd[27817]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 11:17:53 host sshd[27824]: User centos from 62.84.118.25 not allowed because not listed in AllowUsers
Jan  6 11:17:53 host sshd[27824]: input_userauth_request: invalid user centos [preauth]
Jan  6 11:17:53 host unix_chkpwd[27830]: password check failed for user (centos)
Jan  6 11:17:53 host sshd[27824]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.84.118.25  user=centos
Jan  6 11:17:54 host sshd[27817]: Failed password for invalid user root from 20.226.9.118 port 56040 ssh2
Jan  6 11:17:54 host sshd[27817]: Received disconnect from 20.226.9.118 port 56040:11: Bye Bye [preauth]
Jan  6 11:17:54 host sshd[27817]: Disconnected from 20.226.9.118 port 56040 [preauth]
Jan  6 11:17:54 host sshd[27824]: Failed password for invalid user centos from 62.84.118.25 port 37480 ssh2
Jan  6 11:17:55 host sshd[27824]: Received disconnect from 62.84.118.25 port 37480:11: Bye Bye [preauth]
Jan  6 11:17:55 host sshd[27824]: Disconnected from 62.84.118.25 port 37480 [preauth]
Jan  6 11:17:56 host sshd[27834]: Invalid user admin from 164.92.66.116 port 42440
Jan  6 11:17:56 host sshd[27834]: input_userauth_request: invalid user admin [preauth]
Jan  6 11:17:56 host sshd[27834]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 11:17:56 host sshd[27834]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.66.116
Jan  6 11:17:57 host sshd[27836]: User root from 41.33.118.92 not allowed because not listed in AllowUsers
Jan  6 11:17:57 host sshd[27836]: input_userauth_request: invalid user root [preauth]
Jan  6 11:17:57 host unix_chkpwd[27840]: password check failed for user (root)
Jan  6 11:17:57 host sshd[27836]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.33.118.92  user=root
Jan  6 11:17:57 host sshd[27836]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 11:17:58 host sshd[27834]: Failed password for invalid user admin from 164.92.66.116 port 42440 ssh2
Jan  6 11:17:59 host sshd[27836]: Failed password for invalid user root from 41.33.118.92 port 48320 ssh2
Jan  6 11:18:08 host sshd[27937]: Invalid user factura from 152.169.12.75 port 33920
Jan  6 11:18:08 host sshd[27937]: input_userauth_request: invalid user factura [preauth]
Jan  6 11:18:08 host sshd[27937]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 11:18:08 host sshd[27937]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.169.12.75
Jan  6 11:18:09 host sshd[27941]: Invalid user administrator from 190.242.104.110 port 42046
Jan  6 11:18:09 host sshd[27941]: input_userauth_request: invalid user administrator [preauth]
Jan  6 11:18:09 host sshd[27941]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 11:18:09 host sshd[27941]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.242.104.110
Jan  6 11:18:10 host sshd[27937]: Failed password for invalid user factura from 152.169.12.75 port 33920 ssh2
Jan  6 11:18:10 host sshd[27937]: Received disconnect from 152.169.12.75 port 33920:11: Bye Bye [preauth]
Jan  6 11:18:10 host sshd[27937]: Disconnected from 152.169.12.75 port 33920 [preauth]
Jan  6 11:18:12 host sshd[27941]: Failed password for invalid user administrator from 190.242.104.110 port 42046 ssh2
Jan  6 11:18:12 host sshd[27941]: Received disconnect from 190.242.104.110 port 42046:11: Bye Bye [preauth]
Jan  6 11:18:12 host sshd[27941]: Disconnected from 190.242.104.110 port 42046 [preauth]
Jan  6 11:18:21 host sshd[27971]: Invalid user vincent from 31.220.50.99 port 34690
Jan  6 11:18:21 host sshd[27971]: input_userauth_request: invalid user vincent [preauth]
Jan  6 11:18:21 host sshd[27971]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 11:18:21 host sshd[27971]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.220.50.99
Jan  6 11:18:24 host sshd[27971]: Failed password for invalid user vincent from 31.220.50.99 port 34690 ssh2
Jan  6 11:18:24 host sshd[27971]: Received disconnect from 31.220.50.99 port 34690:11: Bye Bye [preauth]
Jan  6 11:18:24 host sshd[27971]: Disconnected from 31.220.50.99 port 34690 [preauth]
Jan  6 11:18:30 host sshd[28019]: Invalid user ftb from 51.79.65.236 port 58310
Jan  6 11:18:30 host sshd[28019]: input_userauth_request: invalid user ftb [preauth]
Jan  6 11:18:30 host sshd[28019]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 11:18:30 host sshd[28019]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.79.65.236
Jan  6 11:18:32 host sshd[28019]: Failed password for invalid user ftb from 51.79.65.236 port 58310 ssh2
Jan  6 11:18:33 host sshd[28019]: Received disconnect from 51.79.65.236 port 58310:11: Bye Bye [preauth]
Jan  6 11:18:33 host sshd[28019]: Disconnected from 51.79.65.236 port 58310 [preauth]
Jan  6 11:19:16 host sshd[28254]: Invalid user steve from 220.117.232.74 port 34124
Jan  6 11:19:16 host sshd[28254]: input_userauth_request: invalid user steve [preauth]
Jan  6 11:19:16 host sshd[28254]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 11:19:16 host sshd[28254]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.117.232.74
Jan  6 11:19:18 host sshd[28254]: Failed password for invalid user steve from 220.117.232.74 port 34124 ssh2
Jan  6 11:19:18 host sshd[28254]: Received disconnect from 220.117.232.74 port 34124:11: Bye Bye [preauth]
Jan  6 11:19:18 host sshd[28254]: Disconnected from 220.117.232.74 port 34124 [preauth]
Jan  6 11:19:27 host sshd[28304]: Invalid user testuser from 195.16.74.23 port 43610
Jan  6 11:19:27 host sshd[28304]: input_userauth_request: invalid user testuser [preauth]
Jan  6 11:19:27 host sshd[28304]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 11:19:27 host sshd[28304]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.16.74.23
Jan  6 11:19:29 host sshd[28304]: Failed password for invalid user testuser from 195.16.74.23 port 43610 ssh2
Jan  6 11:19:29 host sshd[28304]: Received disconnect from 195.16.74.23 port 43610:11: Bye Bye [preauth]
Jan  6 11:19:29 host sshd[28304]: Disconnected from 195.16.74.23 port 43610 [preauth]
Jan  6 11:19:35 host sshd[28335]: User root from 152.169.12.75 not allowed because not listed in AllowUsers
Jan  6 11:19:35 host sshd[28335]: input_userauth_request: invalid user root [preauth]
Jan  6 11:19:35 host unix_chkpwd[28341]: password check failed for user (root)
Jan  6 11:19:35 host sshd[28335]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.169.12.75  user=root
Jan  6 11:19:35 host sshd[28335]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 11:19:37 host sshd[28335]: Failed password for invalid user root from 152.169.12.75 port 45713 ssh2
Jan  6 11:19:38 host sshd[28335]: Received disconnect from 152.169.12.75 port 45713:11: Bye Bye [preauth]
Jan  6 11:19:38 host sshd[28335]: Disconnected from 152.169.12.75 port 45713 [preauth]
Jan  6 11:20:20 host sshd[28519]: Invalid user taiga from 86.105.27.141 port 54012
Jan  6 11:20:20 host sshd[28519]: input_userauth_request: invalid user taiga [preauth]
Jan  6 11:20:20 host sshd[28519]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 11:20:20 host sshd[28519]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.105.27.141
Jan  6 11:20:22 host sshd[28519]: Failed password for invalid user taiga from 86.105.27.141 port 54012 ssh2
Jan  6 11:20:22 host sshd[28519]: Received disconnect from 86.105.27.141 port 54012:11: Bye Bye [preauth]
Jan  6 11:20:22 host sshd[28519]: Disconnected from 86.105.27.141 port 54012 [preauth]
Jan  6 11:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  6 11:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 11:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 11:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  6 11:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 11:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 11:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  6 11:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 11:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 11:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  6 11:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 11:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 11:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  6 11:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 11:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 11:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  6 11:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 11:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 11:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  6 11:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 11:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 11:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  6 11:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 11:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 11:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  6 11:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 11:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 11:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  6 11:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 11:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 11:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  6 11:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 11:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 11:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  6 11:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 11:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 11:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  6 11:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 11:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 11:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=kottayamcalldriv user-2=phmetals user-3=palco123 user-4=gifterman user-5=wwwnexidigital user-6=mrsclean user-7=wwwevmhonda user-8=bonifacegroup user-9=wwwletsstalkfood user-10=straightcurve user-11=shalinijames user-12=wwwtestugo user-13=vfmassets user-14=pmcresources user-15=disposeat user-16=wwwkmaorg user-17=remysagr user-18=woodpeck user-19=wwwkapin user-20=travelboniface user-21=ugotscom user-22=keralaholi user-23=wwwresourcehunte user-24=wwwrmswll user-25=wwwpmcresource user-26=a2zgroup user-27=dartsimp user-28=laundryboniface user-29=cochintaxi user-30=wwwkaretakers feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  6 11:21:55 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  6 11:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 11:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 11:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  6 11:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 11:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 11:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Iv8hUnb0VxNA0c9K.~
Jan  6 11:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 11:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 11:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Iv8hUnb0VxNA0c9K.~'
Jan  6 11:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 11:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 11:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Iv8hUnb0VxNA0c9K.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  6 11:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 11:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 11:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  6 11:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 11:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 11:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  6 11:21:59 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 11:21:59 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 11:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  6 11:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 11:22:00 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 11:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  6 11:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 11:22:00 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 11:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  6 11:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 11:22:00 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 11:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  6 11:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 11:22:00 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 11:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  6 11:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 11:22:01 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 11:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  6 11:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  6 11:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  6 11:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  6 11:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  6 11:22:09 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  6 11:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  6 11:22:09 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  6 11:22:11 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  6 11:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  6 11:22:11 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 11:22:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 11:22:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  6 11:22:13 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 11:22:13 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 11:22:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  6 11:22:13 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 11:22:16 host sshd[29139]: Invalid user ceph from 31.220.50.99 port 60052
Jan  6 11:22:16 host sshd[29139]: input_userauth_request: invalid user ceph [preauth]
Jan  6 11:22:16 host sshd[29139]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 11:22:16 host sshd[29139]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.220.50.99
Jan  6 11:22:18 host sshd[29139]: Failed password for invalid user ceph from 31.220.50.99 port 60052 ssh2
Jan  6 11:22:18 host sshd[29139]: Received disconnect from 31.220.50.99 port 60052:11: Bye Bye [preauth]
Jan  6 11:22:18 host sshd[29139]: Disconnected from 31.220.50.99 port 60052 [preauth]
Jan  6 11:22:18 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 11:22:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  6 11:22:18 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 11:22:25 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 11:22:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  6 11:22:25 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 11:22:26 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 11:22:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  6 11:22:27 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  6 11:22:28 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  6 11:22:57 host sshd[29298]: Invalid user yuan from 86.105.27.141 port 60616
Jan  6 11:22:57 host sshd[29298]: input_userauth_request: invalid user yuan [preauth]
Jan  6 11:22:57 host sshd[29298]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 11:22:57 host sshd[29298]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.105.27.141
Jan  6 11:22:58 host sshd[29304]: Invalid user admin from 220.117.232.74 port 49002
Jan  6 11:22:58 host sshd[29304]: input_userauth_request: invalid user admin [preauth]
Jan  6 11:22:58 host sshd[29304]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 11:22:58 host sshd[29304]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.117.232.74
Jan  6 11:22:58 host sshd[29298]: Failed password for invalid user yuan from 86.105.27.141 port 60616 ssh2
Jan  6 11:22:59 host sshd[29298]: Received disconnect from 86.105.27.141 port 60616:11: Bye Bye [preauth]
Jan  6 11:22:59 host sshd[29298]: Disconnected from 86.105.27.141 port 60616 [preauth]
Jan  6 11:23:00 host sshd[29304]: Failed password for invalid user admin from 220.117.232.74 port 49002 ssh2
Jan  6 11:23:00 host sshd[29304]: Received disconnect from 220.117.232.74 port 49002:11: Bye Bye [preauth]
Jan  6 11:23:00 host sshd[29304]: Disconnected from 220.117.232.74 port 49002 [preauth]
Jan  6 11:23:01 host sshd[29310]: Invalid user jenkins from 20.226.9.118 port 34170
Jan  6 11:23:01 host sshd[29310]: input_userauth_request: invalid user jenkins [preauth]
Jan  6 11:23:01 host sshd[29310]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 11:23:01 host sshd[29310]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.226.9.118
Jan  6 11:23:03 host sshd[29310]: Failed password for invalid user jenkins from 20.226.9.118 port 34170 ssh2
Jan  6 11:23:03 host sshd[29310]: Received disconnect from 20.226.9.118 port 34170:11: Bye Bye [preauth]
Jan  6 11:23:03 host sshd[29310]: Disconnected from 20.226.9.118 port 34170 [preauth]
Jan  6 11:23:24 host sshd[29429]: Invalid user jenkins from 31.220.50.99 port 34534
Jan  6 11:23:24 host sshd[29429]: input_userauth_request: invalid user jenkins [preauth]
Jan  6 11:23:24 host sshd[29429]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 11:23:24 host sshd[29429]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.220.50.99
Jan  6 11:23:26 host sshd[29429]: Failed password for invalid user jenkins from 31.220.50.99 port 34534 ssh2
Jan  6 11:23:26 host sshd[29429]: Received disconnect from 31.220.50.99 port 34534:11: Bye Bye [preauth]
Jan  6 11:23:26 host sshd[29429]: Disconnected from 31.220.50.99 port 34534 [preauth]
Jan  6 11:23:39 host sshd[29521]: Invalid user ceph from 195.16.74.23 port 45688
Jan  6 11:23:39 host sshd[29521]: input_userauth_request: invalid user ceph [preauth]
Jan  6 11:23:39 host sshd[29521]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 11:23:39 host sshd[29521]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.16.74.23
Jan  6 11:23:40 host sshd[29521]: Failed password for invalid user ceph from 195.16.74.23 port 45688 ssh2
Jan  6 11:23:40 host sshd[29521]: Received disconnect from 195.16.74.23 port 45688:11: Bye Bye [preauth]
Jan  6 11:23:40 host sshd[29521]: Disconnected from 195.16.74.23 port 45688 [preauth]
Jan  6 11:23:47 host sshd[29547]: Invalid user administrator from 62.84.118.25 port 34878
Jan  6 11:23:47 host sshd[29547]: input_userauth_request: invalid user administrator [preauth]
Jan  6 11:23:47 host sshd[29547]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 11:23:47 host sshd[29547]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.84.118.25
Jan  6 11:23:49 host sshd[29547]: Failed password for invalid user administrator from 62.84.118.25 port 34878 ssh2
Jan  6 11:23:49 host sshd[29547]: Received disconnect from 62.84.118.25 port 34878:11: Bye Bye [preauth]
Jan  6 11:23:49 host sshd[29547]: Disconnected from 62.84.118.25 port 34878 [preauth]
Jan  6 11:24:15 host sshd[29780]: Invalid user testuser from 190.242.104.110 port 60578
Jan  6 11:24:15 host sshd[29780]: input_userauth_request: invalid user testuser [preauth]
Jan  6 11:24:15 host sshd[29780]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 11:24:15 host sshd[29780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.242.104.110
Jan  6 11:24:17 host sshd[29780]: Failed password for invalid user testuser from 190.242.104.110 port 60578 ssh2
Jan  6 11:24:17 host sshd[29792]: User root from 86.105.27.141 not allowed because not listed in AllowUsers
Jan  6 11:24:17 host sshd[29792]: input_userauth_request: invalid user root [preauth]
Jan  6 11:24:17 host unix_chkpwd[29795]: password check failed for user (root)
Jan  6 11:24:17 host sshd[29792]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.105.27.141  user=root
Jan  6 11:24:17 host sshd[29792]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 11:24:17 host sshd[29780]: Received disconnect from 190.242.104.110 port 60578:11: Bye Bye [preauth]
Jan  6 11:24:17 host sshd[29780]: Disconnected from 190.242.104.110 port 60578 [preauth]
Jan  6 11:24:18 host sshd[29792]: Failed password for invalid user root from 86.105.27.141 port 60076 ssh2
Jan  6 11:24:26 host sshd[29847]: User root from 220.117.232.74 not allowed because not listed in AllowUsers
Jan  6 11:24:26 host sshd[29847]: input_userauth_request: invalid user root [preauth]
Jan  6 11:24:26 host unix_chkpwd[29871]: password check failed for user (root)
Jan  6 11:24:26 host sshd[29847]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.117.232.74  user=root
Jan  6 11:24:26 host sshd[29847]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 11:24:28 host sshd[29847]: Failed password for invalid user root from 220.117.232.74 port 48688 ssh2
Jan  6 11:24:48 host sshd[29977]: User root from 195.16.74.23 not allowed because not listed in AllowUsers
Jan  6 11:24:48 host sshd[29977]: input_userauth_request: invalid user root [preauth]
Jan  6 11:24:48 host unix_chkpwd[29982]: password check failed for user (root)
Jan  6 11:24:48 host sshd[29977]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.16.74.23  user=root
Jan  6 11:24:48 host sshd[29977]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 11:24:50 host sshd[29977]: Failed password for invalid user root from 195.16.74.23 port 54330 ssh2
Jan  6 11:24:50 host sshd[29977]: Received disconnect from 195.16.74.23 port 54330:11: Bye Bye [preauth]
Jan  6 11:24:50 host sshd[29977]: Disconnected from 195.16.74.23 port 54330 [preauth]
Jan  6 11:25:29 host sshd[30178]: Invalid user postgres from 190.242.104.110 port 58636
Jan  6 11:25:29 host sshd[30178]: input_userauth_request: invalid user postgres [preauth]
Jan  6 11:25:29 host sshd[30178]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 11:25:29 host sshd[30178]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.242.104.110
Jan  6 11:25:32 host sshd[30178]: Failed password for invalid user postgres from 190.242.104.110 port 58636 ssh2
Jan  6 11:25:32 host sshd[30178]: Received disconnect from 190.242.104.110 port 58636:11: Bye Bye [preauth]
Jan  6 11:25:32 host sshd[30178]: Disconnected from 190.242.104.110 port 58636 [preauth]
Jan  6 11:39:14 host sshd[916]: Invalid user victor from 222.252.25.169 port 41710
Jan  6 11:39:14 host sshd[916]: input_userauth_request: invalid user victor [preauth]
Jan  6 11:39:14 host sshd[916]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 11:39:14 host sshd[916]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.252.25.169
Jan  6 11:39:17 host sshd[916]: Failed password for invalid user victor from 222.252.25.169 port 41710 ssh2
Jan  6 11:39:17 host sshd[916]: Received disconnect from 222.252.25.169 port 41710:11: Bye Bye [preauth]
Jan  6 11:39:17 host sshd[916]: Disconnected from 222.252.25.169 port 41710 [preauth]
Jan  6 11:39:56 host sshd[1132]: Bad protocol version identification '\003' from 31.43.185.65 port 64038
Jan  6 11:40:08 host sshd[1174]: Invalid user mailer from 118.193.62.92 port 61884
Jan  6 11:40:08 host sshd[1174]: input_userauth_request: invalid user mailer [preauth]
Jan  6 11:40:08 host sshd[1174]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 11:40:08 host sshd[1174]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.193.62.92
Jan  6 11:40:11 host sshd[1174]: Failed password for invalid user mailer from 118.193.62.92 port 61884 ssh2
Jan  6 11:40:11 host sshd[1174]: Received disconnect from 118.193.62.92 port 61884:11: Bye Bye [preauth]
Jan  6 11:40:11 host sshd[1174]: Disconnected from 118.193.62.92 port 61884 [preauth]
Jan  6 11:40:24 host sshd[1219]: Invalid user usuario from 128.199.194.1 port 34642
Jan  6 11:40:24 host sshd[1219]: input_userauth_request: invalid user usuario [preauth]
Jan  6 11:40:24 host sshd[1219]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 11:40:24 host sshd[1219]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.194.1
Jan  6 11:40:26 host sshd[1219]: Failed password for invalid user usuario from 128.199.194.1 port 34642 ssh2
Jan  6 11:40:26 host sshd[1219]: Received disconnect from 128.199.194.1 port 34642:11: Bye Bye [preauth]
Jan  6 11:40:26 host sshd[1219]: Disconnected from 128.199.194.1 port 34642 [preauth]
Jan  6 11:40:54 host sshd[1305]: Invalid user zookeeper from 197.246.173.12 port 40734
Jan  6 11:40:54 host sshd[1305]: input_userauth_request: invalid user zookeeper [preauth]
Jan  6 11:40:54 host sshd[1305]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 11:40:54 host sshd[1305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.246.173.12
Jan  6 11:40:56 host sshd[1305]: Failed password for invalid user zookeeper from 197.246.173.12 port 40734 ssh2
Jan  6 11:40:56 host sshd[1305]: Received disconnect from 197.246.173.12 port 40734:11: Bye Bye [preauth]
Jan  6 11:40:56 host sshd[1305]: Disconnected from 197.246.173.12 port 40734 [preauth]
Jan  6 11:43:11 host sshd[1758]: Invalid user nagios from 66.130.241.129 port 49079
Jan  6 11:43:11 host sshd[1758]: input_userauth_request: invalid user nagios [preauth]
Jan  6 11:43:11 host sshd[1758]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 11:43:11 host sshd[1758]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.130.241.129
Jan  6 11:43:12 host sshd[1758]: Failed password for invalid user nagios from 66.130.241.129 port 49079 ssh2
Jan  6 11:43:13 host sshd[1758]: Received disconnect from 66.130.241.129 port 49079:11: Bye Bye [preauth]
Jan  6 11:43:13 host sshd[1758]: Disconnected from 66.130.241.129 port 49079 [preauth]
Jan  6 11:43:27 host sshd[1831]: User root from 165.227.142.62 not allowed because not listed in AllowUsers
Jan  6 11:43:27 host sshd[1831]: input_userauth_request: invalid user root [preauth]
Jan  6 11:43:27 host unix_chkpwd[1834]: password check failed for user (root)
Jan  6 11:43:27 host sshd[1831]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.142.62  user=root
Jan  6 11:43:27 host sshd[1831]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 11:43:29 host sshd[1831]: Failed password for invalid user root from 165.227.142.62 port 58376 ssh2
Jan  6 11:43:29 host sshd[1831]: Received disconnect from 165.227.142.62 port 58376:11: Bye Bye [preauth]
Jan  6 11:43:29 host sshd[1831]: Disconnected from 165.227.142.62 port 58376 [preauth]
Jan  6 11:43:30 host sshd[1846]: User mysql from 51.178.30.100 not allowed because not listed in AllowUsers
Jan  6 11:43:30 host sshd[1846]: input_userauth_request: invalid user mysql [preauth]
Jan  6 11:43:30 host unix_chkpwd[1850]: password check failed for user (mysql)
Jan  6 11:43:30 host sshd[1846]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.30.100  user=mysql
Jan  6 11:43:30 host sshd[1846]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "mysql"
Jan  6 11:43:32 host sshd[1846]: Failed password for invalid user mysql from 51.178.30.100 port 40524 ssh2
Jan  6 11:43:32 host sshd[1846]: Received disconnect from 51.178.30.100 port 40524:11: Bye Bye [preauth]
Jan  6 11:43:32 host sshd[1846]: Disconnected from 51.178.30.100 port 40524 [preauth]
Jan  6 11:43:36 host sshd[1875]: Invalid user nico from 191.91.109.98 port 57796
Jan  6 11:43:36 host sshd[1875]: input_userauth_request: invalid user nico [preauth]
Jan  6 11:43:36 host sshd[1875]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 11:43:36 host sshd[1875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.91.109.98
Jan  6 11:43:38 host sshd[1875]: Failed password for invalid user nico from 191.91.109.98 port 57796 ssh2
Jan  6 11:43:38 host sshd[1875]: Received disconnect from 191.91.109.98 port 57796:11: Bye Bye [preauth]
Jan  6 11:43:38 host sshd[1875]: Disconnected from 191.91.109.98 port 57796 [preauth]
Jan  6 11:43:45 host sshd[1896]: Invalid user nagios from 43.155.101.32 port 60254
Jan  6 11:43:45 host sshd[1896]: input_userauth_request: invalid user nagios [preauth]
Jan  6 11:43:45 host sshd[1896]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 11:43:45 host sshd[1896]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.101.32
Jan  6 11:43:47 host sshd[1896]: Failed password for invalid user nagios from 43.155.101.32 port 60254 ssh2
Jan  6 11:43:47 host sshd[1896]: Received disconnect from 43.155.101.32 port 60254:11: Bye Bye [preauth]
Jan  6 11:43:47 host sshd[1896]: Disconnected from 43.155.101.32 port 60254 [preauth]
Jan  6 11:44:49 host sshd[2057]: User root from 92.36.146.180 not allowed because not listed in AllowUsers
Jan  6 11:44:49 host sshd[2057]: input_userauth_request: invalid user root [preauth]
Jan  6 11:44:49 host unix_chkpwd[2061]: password check failed for user (root)
Jan  6 11:44:49 host sshd[2057]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.36.146.180  user=root
Jan  6 11:44:49 host sshd[2057]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 11:44:51 host sshd[2057]: Failed password for invalid user root from 92.36.146.180 port 42636 ssh2
Jan  6 11:44:52 host sshd[2057]: Received disconnect from 92.36.146.180 port 42636:11: Bye Bye [preauth]
Jan  6 11:44:52 host sshd[2057]: Disconnected from 92.36.146.180 port 42636 [preauth]
Jan  6 11:45:23 host sshd[2136]: Invalid user ubuntu from 51.178.30.100 port 49552
Jan  6 11:45:23 host sshd[2136]: input_userauth_request: invalid user ubuntu [preauth]
Jan  6 11:45:23 host sshd[2136]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 11:45:23 host sshd[2136]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.30.100
Jan  6 11:45:25 host sshd[2136]: Failed password for invalid user ubuntu from 51.178.30.100 port 49552 ssh2
Jan  6 11:45:26 host sshd[2136]: Received disconnect from 51.178.30.100 port 49552:11: Bye Bye [preauth]
Jan  6 11:45:26 host sshd[2136]: Disconnected from 51.178.30.100 port 49552 [preauth]
Jan  6 11:45:44 host sshd[2340]: Invalid user alvin from 118.193.62.92 port 58718
Jan  6 11:45:44 host sshd[2340]: input_userauth_request: invalid user alvin [preauth]
Jan  6 11:45:44 host sshd[2340]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 11:45:44 host sshd[2340]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.193.62.92
Jan  6 11:45:47 host sshd[2340]: Failed password for invalid user alvin from 118.193.62.92 port 58718 ssh2
Jan  6 11:45:47 host sshd[2340]: Received disconnect from 118.193.62.92 port 58718:11: Bye Bye [preauth]
Jan  6 11:45:47 host sshd[2340]: Disconnected from 118.193.62.92 port 58718 [preauth]
Jan  6 11:45:47 host sshd[2357]: User root from 66.130.241.129 not allowed because not listed in AllowUsers
Jan  6 11:45:47 host sshd[2357]: input_userauth_request: invalid user root [preauth]
Jan  6 11:45:47 host unix_chkpwd[2362]: password check failed for user (root)
Jan  6 11:45:47 host sshd[2357]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.130.241.129  user=root
Jan  6 11:45:47 host sshd[2357]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 11:45:50 host sshd[2357]: Failed password for invalid user root from 66.130.241.129 port 38548 ssh2
Jan  6 11:45:50 host sshd[2357]: Received disconnect from 66.130.241.129 port 38548:11: Bye Bye [preauth]
Jan  6 11:45:50 host sshd[2357]: Disconnected from 66.130.241.129 port 38548 [preauth]
Jan  6 11:46:03 host sshd[2450]: Invalid user test4 from 84.108.40.27 port 35942
Jan  6 11:46:03 host sshd[2450]: input_userauth_request: invalid user test4 [preauth]
Jan  6 11:46:03 host sshd[2450]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 11:46:03 host sshd[2450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.108.40.27
Jan  6 11:46:03 host sshd[2453]: Invalid user ubuntu from 222.252.25.169 port 40050
Jan  6 11:46:03 host sshd[2453]: input_userauth_request: invalid user ubuntu [preauth]
Jan  6 11:46:03 host sshd[2453]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 11:46:03 host sshd[2453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.252.25.169
Jan  6 11:46:05 host sshd[2450]: Failed password for invalid user test4 from 84.108.40.27 port 35942 ssh2
Jan  6 11:46:06 host sshd[2450]: Received disconnect from 84.108.40.27 port 35942:11: Bye Bye [preauth]
Jan  6 11:46:06 host sshd[2450]: Disconnected from 84.108.40.27 port 35942 [preauth]
Jan  6 11:46:06 host sshd[2453]: Failed password for invalid user ubuntu from 222.252.25.169 port 40050 ssh2
Jan  6 11:46:06 host sshd[2453]: Received disconnect from 222.252.25.169 port 40050:11: Bye Bye [preauth]
Jan  6 11:46:06 host sshd[2453]: Disconnected from 222.252.25.169 port 40050 [preauth]
Jan  6 11:46:09 host sshd[2464]: Invalid user victor from 128.199.194.1 port 60209
Jan  6 11:46:09 host sshd[2464]: input_userauth_request: invalid user victor [preauth]
Jan  6 11:46:09 host sshd[2464]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 11:46:09 host sshd[2464]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.194.1
Jan  6 11:46:12 host sshd[2464]: Failed password for invalid user victor from 128.199.194.1 port 60209 ssh2
Jan  6 11:46:12 host sshd[2464]: Received disconnect from 128.199.194.1 port 60209:11: Bye Bye [preauth]
Jan  6 11:46:12 host sshd[2464]: Disconnected from 128.199.194.1 port 60209 [preauth]
Jan  6 11:46:57 host sshd[2572]: Invalid user delme from 92.36.146.180 port 38832
Jan  6 11:46:57 host sshd[2572]: input_userauth_request: invalid user delme [preauth]
Jan  6 11:46:57 host sshd[2572]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 11:46:57 host sshd[2572]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.36.146.180
Jan  6 11:46:59 host sshd[2572]: Failed password for invalid user delme from 92.36.146.180 port 38832 ssh2
Jan  6 11:46:59 host sshd[2572]: Received disconnect from 92.36.146.180 port 38832:11: Bye Bye [preauth]
Jan  6 11:46:59 host sshd[2572]: Disconnected from 92.36.146.180 port 38832 [preauth]
Jan  6 11:47:06 host sshd[2630]: Invalid user ubuntu from 118.193.62.92 port 27220
Jan  6 11:47:06 host sshd[2630]: input_userauth_request: invalid user ubuntu [preauth]
Jan  6 11:47:06 host sshd[2630]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 11:47:06 host sshd[2630]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.193.62.92
Jan  6 11:47:08 host sshd[2630]: Failed password for invalid user ubuntu from 118.193.62.92 port 27220 ssh2
Jan  6 11:47:08 host sshd[2630]: Received disconnect from 118.193.62.92 port 27220:11: Bye Bye [preauth]
Jan  6 11:47:08 host sshd[2630]: Disconnected from 118.193.62.92 port 27220 [preauth]
Jan  6 11:47:10 host sshd[2674]: Invalid user test4 from 178.128.35.197 port 40896
Jan  6 11:47:10 host sshd[2674]: input_userauth_request: invalid user test4 [preauth]
Jan  6 11:47:10 host sshd[2674]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 11:47:10 host sshd[2674]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.35.197
Jan  6 11:47:13 host sshd[2674]: Failed password for invalid user test4 from 178.128.35.197 port 40896 ssh2
Jan  6 11:47:13 host sshd[2680]: User root from 197.246.173.12 not allowed because not listed in AllowUsers
Jan  6 11:47:13 host sshd[2680]: input_userauth_request: invalid user root [preauth]
Jan  6 11:47:13 host unix_chkpwd[2684]: password check failed for user (root)
Jan  6 11:47:13 host sshd[2680]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.246.173.12  user=root
Jan  6 11:47:13 host sshd[2680]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 11:47:13 host sshd[2674]: Received disconnect from 178.128.35.197 port 40896:11: Bye Bye [preauth]
Jan  6 11:47:13 host sshd[2674]: Disconnected from 178.128.35.197 port 40896 [preauth]
Jan  6 11:47:14 host sshd[2680]: Failed password for invalid user root from 197.246.173.12 port 42455 ssh2
Jan  6 11:47:15 host sshd[2680]: Received disconnect from 197.246.173.12 port 42455:11: Bye Bye [preauth]
Jan  6 11:47:15 host sshd[2680]: Disconnected from 197.246.173.12 port 42455 [preauth]
Jan  6 11:47:15 host sshd[2688]: Invalid user testuser from 43.156.13.3 port 48586
Jan  6 11:47:15 host sshd[2688]: input_userauth_request: invalid user testuser [preauth]
Jan  6 11:47:15 host sshd[2688]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 11:47:15 host sshd[2688]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.13.3
Jan  6 11:47:17 host sshd[2688]: Failed password for invalid user testuser from 43.156.13.3 port 48586 ssh2
Jan  6 11:47:17 host sshd[2688]: Received disconnect from 43.156.13.3 port 48586:11: Bye Bye [preauth]
Jan  6 11:47:17 host sshd[2688]: Disconnected from 43.156.13.3 port 48586 [preauth]
Jan  6 11:47:25 host sshd[2735]: User root from 222.252.25.169 not allowed because not listed in AllowUsers
Jan  6 11:47:25 host sshd[2735]: input_userauth_request: invalid user root [preauth]
Jan  6 11:47:25 host unix_chkpwd[2760]: password check failed for user (root)
Jan  6 11:47:25 host sshd[2735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.252.25.169  user=root
Jan  6 11:47:25 host sshd[2735]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 11:47:27 host sshd[2735]: Failed password for invalid user root from 222.252.25.169 port 45002 ssh2
Jan  6 11:47:27 host sshd[2735]: Received disconnect from 222.252.25.169 port 45002:11: Bye Bye [preauth]
Jan  6 11:47:27 host sshd[2735]: Disconnected from 222.252.25.169 port 45002 [preauth]
Jan  6 11:47:30 host sshd[2813]: User root from 43.155.101.32 not allowed because not listed in AllowUsers
Jan  6 11:47:30 host sshd[2813]: input_userauth_request: invalid user root [preauth]
Jan  6 11:47:30 host unix_chkpwd[2816]: password check failed for user (root)
Jan  6 11:47:30 host sshd[2813]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.101.32  user=root
Jan  6 11:47:30 host sshd[2813]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 11:47:33 host sshd[2813]: Failed password for invalid user root from 43.155.101.32 port 40914 ssh2
Jan  6 11:47:33 host sshd[2813]: Received disconnect from 43.155.101.32 port 40914:11: Bye Bye [preauth]
Jan  6 11:47:33 host sshd[2813]: Disconnected from 43.155.101.32 port 40914 [preauth]
Jan  6 11:47:38 host sshd[2864]: Invalid user ts3srv from 128.199.194.1 port 43466
Jan  6 11:47:38 host sshd[2864]: input_userauth_request: invalid user ts3srv [preauth]
Jan  6 11:47:38 host sshd[2864]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 11:47:38 host sshd[2864]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.194.1
Jan  6 11:47:40 host sshd[2864]: Failed password for invalid user ts3srv from 128.199.194.1 port 43466 ssh2
Jan  6 11:47:41 host sshd[2899]: User root from 88.209.86.125 not allowed because not listed in AllowUsers
Jan  6 11:47:41 host sshd[2899]: input_userauth_request: invalid user root [preauth]
Jan  6 11:47:41 host unix_chkpwd[2903]: password check failed for user (root)
Jan  6 11:47:41 host sshd[2899]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.209.86.125  user=root
Jan  6 11:47:41 host sshd[2899]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 11:47:43 host sshd[2899]: Failed password for invalid user root from 88.209.86.125 port 55312 ssh2
Jan  6 11:47:43 host sshd[2899]: Received disconnect from 88.209.86.125 port 55312:11: Bye Bye [preauth]
Jan  6 11:47:43 host sshd[2899]: Disconnected from 88.209.86.125 port 55312 [preauth]
Jan  6 11:47:48 host sshd[2914]: Invalid user kodi from 189.39.112.93 port 41198
Jan  6 11:47:48 host sshd[2914]: input_userauth_request: invalid user kodi [preauth]
Jan  6 11:47:48 host sshd[2914]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 11:47:48 host sshd[2914]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.39.112.93
Jan  6 11:47:49 host sshd[2914]: Failed password for invalid user kodi from 189.39.112.93 port 41198 ssh2
Jan  6 11:47:50 host sshd[2914]: Received disconnect from 189.39.112.93 port 41198:11: Bye Bye [preauth]
Jan  6 11:47:50 host sshd[2914]: Disconnected from 189.39.112.93 port 41198 [preauth]
Jan  6 11:48:02 host sshd[2947]: User root from 92.36.190.89 not allowed because not listed in AllowUsers
Jan  6 11:48:02 host sshd[2947]: input_userauth_request: invalid user root [preauth]
Jan  6 11:48:02 host unix_chkpwd[2969]: password check failed for user (root)
Jan  6 11:48:02 host sshd[2947]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.36.190.89  user=root
Jan  6 11:48:02 host sshd[2947]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 11:48:04 host sshd[2947]: Failed password for invalid user root from 92.36.190.89 port 54628 ssh2
Jan  6 11:48:05 host sshd[2947]: Received disconnect from 92.36.190.89 port 54628:11: Bye Bye [preauth]
Jan  6 11:48:05 host sshd[2947]: Disconnected from 92.36.190.89 port 54628 [preauth]
Jan  6 11:48:10 host sshd[2999]: User root from 194.4.48.40 not allowed because not listed in AllowUsers
Jan  6 11:48:10 host sshd[2999]: input_userauth_request: invalid user root [preauth]
Jan  6 11:48:10 host unix_chkpwd[3002]: password check failed for user (root)
Jan  6 11:48:10 host sshd[2999]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.4.48.40  user=root
Jan  6 11:48:10 host sshd[2999]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 11:48:12 host sshd[2999]: Failed password for invalid user root from 194.4.48.40 port 36948 ssh2
Jan  6 11:48:12 host sshd[2999]: Received disconnect from 194.4.48.40 port 36948:11: Bye Bye [preauth]
Jan  6 11:48:12 host sshd[2999]: Disconnected from 194.4.48.40 port 36948 [preauth]
Jan  6 11:48:33 host sshd[3078]: Invalid user omar from 34.69.39.31 port 56608
Jan  6 11:48:33 host sshd[3078]: input_userauth_request: invalid user omar [preauth]
Jan  6 11:48:33 host sshd[3078]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 11:48:33 host sshd[3078]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.69.39.31
Jan  6 11:48:35 host sshd[3078]: Failed password for invalid user omar from 34.69.39.31 port 56608 ssh2
Jan  6 11:48:35 host sshd[3078]: Received disconnect from 34.69.39.31 port 56608:11: Bye Bye [preauth]
Jan  6 11:48:35 host sshd[3078]: Disconnected from 34.69.39.31 port 56608 [preauth]
Jan  6 11:48:39 host sshd[3091]: User root from 62.94.193.215 not allowed because not listed in AllowUsers
Jan  6 11:48:39 host sshd[3091]: input_userauth_request: invalid user root [preauth]
Jan  6 11:48:39 host unix_chkpwd[3100]: password check failed for user (root)
Jan  6 11:48:39 host sshd[3091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.94.193.215  user=root
Jan  6 11:48:39 host sshd[3091]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 11:48:41 host sshd[3091]: Failed password for invalid user root from 62.94.193.215 port 43104 ssh2
Jan  6 11:48:41 host sshd[3091]: Received disconnect from 62.94.193.215 port 43104:11: Bye Bye [preauth]
Jan  6 11:48:41 host sshd[3091]: Disconnected from 62.94.193.215 port 43104 [preauth]
Jan  6 11:49:05 host sshd[3168]: Invalid user bhx from 92.36.190.89 port 42186
Jan  6 11:49:05 host sshd[3168]: input_userauth_request: invalid user bhx [preauth]
Jan  6 11:49:05 host sshd[3168]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 11:49:05 host sshd[3168]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.36.190.89
Jan  6 11:49:07 host sshd[3168]: Failed password for invalid user bhx from 92.36.190.89 port 42186 ssh2
Jan  6 11:49:07 host sshd[3168]: Received disconnect from 92.36.190.89 port 42186:11: Bye Bye [preauth]
Jan  6 11:49:07 host sshd[3168]: Disconnected from 92.36.190.89 port 42186 [preauth]
Jan  6 11:49:26 host sshd[3237]: User root from 165.227.142.62 not allowed because not listed in AllowUsers
Jan  6 11:49:26 host sshd[3237]: input_userauth_request: invalid user root [preauth]
Jan  6 11:49:26 host unix_chkpwd[3262]: password check failed for user (root)
Jan  6 11:49:26 host sshd[3237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.142.62  user=root
Jan  6 11:49:26 host sshd[3237]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 11:49:27 host sshd[3209]: Received disconnect from 191.91.109.98 port 54740:11: Bye Bye [preauth]
Jan  6 11:49:27 host sshd[3209]: Disconnected from 191.91.109.98 port 54740 [preauth]
Jan  6 11:49:28 host sshd[3237]: Failed password for invalid user root from 165.227.142.62 port 56852 ssh2
Jan  6 11:49:29 host sshd[3237]: Received disconnect from 165.227.142.62 port 56852:11: Bye Bye [preauth]
Jan  6 11:49:29 host sshd[3237]: Disconnected from 165.227.142.62 port 56852 [preauth]
Jan  6 11:49:41 host sshd[3337]: User root from 84.108.40.27 not allowed because not listed in AllowUsers
Jan  6 11:49:41 host sshd[3337]: input_userauth_request: invalid user root [preauth]
Jan  6 11:49:41 host unix_chkpwd[3343]: password check failed for user (root)
Jan  6 11:49:41 host sshd[3337]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.108.40.27  user=root
Jan  6 11:49:41 host sshd[3337]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 11:49:43 host sshd[3337]: Failed password for invalid user root from 84.108.40.27 port 48876 ssh2
Jan  6 11:49:43 host sshd[3337]: Received disconnect from 84.108.40.27 port 48876:11: Bye Bye [preauth]
Jan  6 11:49:43 host sshd[3337]: Disconnected from 84.108.40.27 port 48876 [preauth]
Jan  6 11:49:44 host sshd[3349]: User root from 178.128.35.197 not allowed because not listed in AllowUsers
Jan  6 11:49:44 host sshd[3349]: input_userauth_request: invalid user root [preauth]
Jan  6 11:49:44 host unix_chkpwd[3361]: password check failed for user (root)
Jan  6 11:49:44 host sshd[3349]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.35.197  user=root
Jan  6 11:49:44 host sshd[3349]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 11:49:46 host sshd[3349]: Failed password for invalid user root from 178.128.35.197 port 48368 ssh2
Jan  6 11:49:47 host sshd[3349]: Received disconnect from 178.128.35.197 port 48368:11: Bye Bye [preauth]
Jan  6 11:49:47 host sshd[3349]: Disconnected from 178.128.35.197 port 48368 [preauth]
Jan  6 11:49:51 host sshd[3431]: Invalid user ftpuser from 34.69.39.31 port 56696
Jan  6 11:49:51 host sshd[3431]: input_userauth_request: invalid user ftpuser [preauth]
Jan  6 11:49:51 host sshd[3431]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 11:49:51 host sshd[3431]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.69.39.31
Jan  6 11:49:53 host sshd[3431]: Failed password for invalid user ftpuser from 34.69.39.31 port 56696 ssh2
Jan  6 11:49:54 host sshd[3431]: Received disconnect from 34.69.39.31 port 56696:11: Bye Bye [preauth]
Jan  6 11:49:54 host sshd[3431]: Disconnected from 34.69.39.31 port 56696 [preauth]
Jan  6 11:50:12 host sshd[3490]: User root from 189.39.112.93 not allowed because not listed in AllowUsers
Jan  6 11:50:12 host sshd[3490]: input_userauth_request: invalid user root [preauth]
Jan  6 11:50:12 host unix_chkpwd[3495]: password check failed for user (root)
Jan  6 11:50:12 host sshd[3490]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.39.112.93  user=root
Jan  6 11:50:12 host sshd[3490]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 11:50:14 host sshd[3490]: Failed password for invalid user root from 189.39.112.93 port 45890 ssh2
Jan  6 11:50:14 host sshd[3490]: Received disconnect from 189.39.112.93 port 45890:11: Bye Bye [preauth]
Jan  6 11:50:14 host sshd[3490]: Disconnected from 189.39.112.93 port 45890 [preauth]
Jan  6 11:50:21 host sshd[3536]: User root from 194.4.48.40 not allowed because not listed in AllowUsers
Jan  6 11:50:21 host sshd[3536]: input_userauth_request: invalid user root [preauth]
Jan  6 11:50:21 host unix_chkpwd[3540]: password check failed for user (root)
Jan  6 11:50:21 host sshd[3536]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.4.48.40  user=root
Jan  6 11:50:21 host sshd[3536]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 11:50:23 host sshd[3536]: Failed password for invalid user root from 194.4.48.40 port 37070 ssh2
Jan  6 11:50:23 host sshd[3536]: Received disconnect from 194.4.48.40 port 37070:11: Bye Bye [preauth]
Jan  6 11:50:23 host sshd[3536]: Disconnected from 194.4.48.40 port 37070 [preauth]
Jan  6 11:50:25 host sshd[3565]: Invalid user pruebas from 62.94.193.215 port 41528
Jan  6 11:50:25 host sshd[3565]: input_userauth_request: invalid user pruebas [preauth]
Jan  6 11:50:25 host sshd[3565]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 11:50:25 host sshd[3565]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.94.193.215
Jan  6 11:50:27 host sshd[3565]: Failed password for invalid user pruebas from 62.94.193.215 port 41528 ssh2
Jan  6 11:50:27 host sshd[3565]: Received disconnect from 62.94.193.215 port 41528:11: Bye Bye [preauth]
Jan  6 11:50:27 host sshd[3565]: Disconnected from 62.94.193.215 port 41528 [preauth]
Jan  6 11:50:59 host sshd[3810]: Invalid user ftp1 from 34.69.39.31 port 55760
Jan  6 11:50:59 host sshd[3810]: input_userauth_request: invalid user ftp1 [preauth]
Jan  6 11:50:59 host sshd[3810]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 11:50:59 host sshd[3810]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.69.39.31
Jan  6 11:51:00 host sshd[3810]: Failed password for invalid user ftp1 from 34.69.39.31 port 55760 ssh2
Jan  6 11:51:00 host sshd[3810]: Received disconnect from 34.69.39.31 port 55760:11: Bye Bye [preauth]
Jan  6 11:51:00 host sshd[3810]: Disconnected from 34.69.39.31 port 55760 [preauth]
Jan  6 11:51:35 host sshd[3948]: Invalid user ftp1 from 43.156.13.3 port 60744
Jan  6 11:51:35 host sshd[3948]: input_userauth_request: invalid user ftp1 [preauth]
Jan  6 11:51:35 host sshd[3948]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 11:51:35 host sshd[3948]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.13.3
Jan  6 11:51:37 host sshd[3948]: Failed password for invalid user ftp1 from 43.156.13.3 port 60744 ssh2
Jan  6 11:51:37 host sshd[3948]: Received disconnect from 43.156.13.3 port 60744:11: Bye Bye [preauth]
Jan  6 11:51:37 host sshd[3948]: Disconnected from 43.156.13.3 port 60744 [preauth]
Jan  6 11:52:32 host sshd[4082]: Invalid user cumulus from 129.154.202.0 port 36146
Jan  6 11:52:32 host sshd[4082]: input_userauth_request: invalid user cumulus [preauth]
Jan  6 11:52:32 host sshd[4082]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 11:52:32 host sshd[4082]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.154.202.0
Jan  6 11:52:34 host sshd[4082]: Failed password for invalid user cumulus from 129.154.202.0 port 36146 ssh2
Jan  6 11:52:35 host sshd[4082]: Received disconnect from 129.154.202.0 port 36146:11: Bye Bye [preauth]
Jan  6 11:52:35 host sshd[4082]: Disconnected from 129.154.202.0 port 36146 [preauth]
Jan  6 11:53:02 host sshd[4169]: Invalid user test from 43.156.13.3 port 56216
Jan  6 11:53:02 host sshd[4169]: input_userauth_request: invalid user test [preauth]
Jan  6 11:53:02 host sshd[4169]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 11:53:02 host sshd[4169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.13.3
Jan  6 11:53:04 host sshd[4169]: Failed password for invalid user test from 43.156.13.3 port 56216 ssh2
Jan  6 11:53:18 host sshd[4222]: User root from 191.91.109.98 not allowed because not listed in AllowUsers
Jan  6 11:53:18 host sshd[4222]: input_userauth_request: invalid user root [preauth]
Jan  6 11:53:18 host unix_chkpwd[4232]: password check failed for user (root)
Jan  6 11:53:18 host sshd[4222]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.91.109.98  user=root
Jan  6 11:53:18 host sshd[4222]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 11:53:19 host sshd[4222]: Failed password for invalid user root from 191.91.109.98 port 50696 ssh2
Jan  6 11:53:20 host sshd[4222]: Received disconnect from 191.91.109.98 port 50696:11: Bye Bye [preauth]
Jan  6 11:53:20 host sshd[4222]: Disconnected from 191.91.109.98 port 50696 [preauth]
Jan  6 11:54:58 host sshd[4701]: User root from 129.154.202.0 not allowed because not listed in AllowUsers
Jan  6 11:54:58 host sshd[4701]: input_userauth_request: invalid user root [preauth]
Jan  6 11:54:58 host unix_chkpwd[4704]: password check failed for user (root)
Jan  6 11:54:58 host sshd[4701]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.154.202.0  user=root
Jan  6 11:54:58 host sshd[4701]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 11:55:00 host sshd[4701]: Failed password for invalid user root from 129.154.202.0 port 36258 ssh2
Jan  6 11:55:00 host sshd[4701]: Received disconnect from 129.154.202.0 port 36258:11: Bye Bye [preauth]
Jan  6 11:55:00 host sshd[4701]: Disconnected from 129.154.202.0 port 36258 [preauth]
Jan  6 11:56:17 host sshd[5187]: User root from 88.209.86.125 not allowed because not listed in AllowUsers
Jan  6 11:56:17 host sshd[5187]: input_userauth_request: invalid user root [preauth]
Jan  6 11:56:17 host unix_chkpwd[5192]: password check failed for user (root)
Jan  6 11:56:17 host sshd[5187]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.209.86.125  user=root
Jan  6 11:56:17 host sshd[5187]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 11:56:19 host sshd[5187]: Failed password for invalid user root from 88.209.86.125 port 56272 ssh2
Jan  6 11:56:19 host sshd[5187]: Received disconnect from 88.209.86.125 port 56272:11: Bye Bye [preauth]
Jan  6 11:56:19 host sshd[5187]: Disconnected from 88.209.86.125 port 56272 [preauth]
Jan  6 12:04:14 host sshd[6677]: Bad protocol version identification '\003' from 31.43.185.65 port 63493
Jan  6 12:17:00 host sshd[9699]: Connection closed by 45.79.181.251 port 63284 [preauth]
Jan  6 12:17:02 host sshd[9714]: Connection closed by 45.79.181.251 port 5670 [preauth]
Jan  6 12:17:04 host sshd[9776]: Connection closed by 45.79.181.251 port 5684 [preauth]
Jan  6 12:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  6 12:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 12:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 12:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  6 12:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 12:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 12:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  6 12:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 12:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 12:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  6 12:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 12:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 12:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  6 12:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 12:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 12:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  6 12:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 12:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 12:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  6 12:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 12:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 12:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  6 12:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 12:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 12:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  6 12:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 12:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 12:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  6 12:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 12:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 12:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  6 12:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 12:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 12:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  6 12:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 12:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 12:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  6 12:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 12:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 12:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=ugotscom user-3=wwwrmswll user-4=keralaholi user-5=wwwresourcehunte user-6=travelboniface user-7=cochintaxi user-8=wwwkaretakers user-9=laundryboniface user-10=dartsimp user-11=a2zgroup user-12=straightcurve user-13=wwwletsstalkfood user-14=wwwevmhonda user-15=bonifacegroup user-16=wwwnexidigital user-17=mrsclean user-18=phmetals user-19=kottayamcalldriv user-20=gifterman user-21=palco123 user-22=woodpeck user-23=wwwkapin user-24=disposeat user-25=wwwkmaorg user-26=remysagr user-27=pmcresources user-28=wwwtestugo user-29=shalinijames user-30=vfmassets feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  6 12:21:54 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  6 12:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 12:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 12:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  6 12:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 12:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 12:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-liQmLkCgNOhBWYQQ.~
Jan  6 12:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 12:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 12:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-liQmLkCgNOhBWYQQ.~'
Jan  6 12:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 12:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 12:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-liQmLkCgNOhBWYQQ.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  6 12:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 12:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 12:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  6 12:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 12:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 12:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  6 12:21:58 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 12:21:58 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 12:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  6 12:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 12:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 12:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  6 12:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 12:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 12:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  6 12:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 12:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 12:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  6 12:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 12:21:59 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 12:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  6 12:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 12:21:59 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 12:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  6 12:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  6 12:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  6 12:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  6 12:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  6 12:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  6 12:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  6 12:22:03 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  6 12:22:05 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  6 12:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  6 12:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 12:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 12:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  6 12:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 12:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 12:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  6 12:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 12:22:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 12:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  6 12:22:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 12:22:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 12:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  6 12:22:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 12:22:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 12:22:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  6 12:22:13 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  6 12:22:14 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  6 12:35:41 host sshd[13918]: Did not receive identification string from 145.239.135.90 port 34956
Jan  6 13:01:26 host sshd[17540]: Invalid user al from 194.110.203.109 port 58404
Jan  6 13:01:26 host sshd[17540]: input_userauth_request: invalid user al [preauth]
Jan  6 13:01:26 host sshd[17540]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 13:01:26 host sshd[17540]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109
Jan  6 13:01:28 host sshd[17540]: Failed password for invalid user al from 194.110.203.109 port 58404 ssh2
Jan  6 13:01:31 host sshd[17540]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 13:01:33 host sshd[17540]: Failed password for invalid user al from 194.110.203.109 port 58404 ssh2
Jan  6 13:01:37 host sshd[17540]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 13:01:39 host sshd[17540]: Failed password for invalid user al from 194.110.203.109 port 58404 ssh2
Jan  6 13:01:42 host sshd[17540]: Connection closed by 194.110.203.109 port 58404 [preauth]
Jan  6 13:01:42 host sshd[17540]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109
Jan  6 13:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  6 13:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 13:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 13:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  6 13:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 13:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 13:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  6 13:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 13:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 13:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  6 13:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 13:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 13:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  6 13:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 13:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 13:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  6 13:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 13:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 13:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  6 13:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 13:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 13:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  6 13:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 13:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 13:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  6 13:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 13:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 13:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  6 13:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 13:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 13:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  6 13:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 13:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 13:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  6 13:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 13:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 13:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  6 13:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 13:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 13:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=a2zgroup user-2=dartsimp user-3=laundryboniface user-4=wwwkaretakers user-5=cochintaxi user-6=travelboniface user-7=ugotscom user-8=keralaholi user-9=wwwresourcehunte user-10=wwwrmswll user-11=wwwpmcresource user-12=shalinijames user-13=wwwtestugo user-14=vfmassets user-15=pmcresources user-16=remysagr user-17=disposeat user-18=wwwkmaorg user-19=woodpeck user-20=wwwkapin user-21=kottayamcalldriv user-22=phmetals user-23=palco123 user-24=gifterman user-25=mrsclean user-26=wwwnexidigital user-27=wwwevmhonda user-28=bonifacegroup user-29=wwwletsstalkfood user-30=straightcurve feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  6 13:21:54 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  6 13:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 13:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 13:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  6 13:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 13:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 13:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-0CL8we5OYz2F9eno.~
Jan  6 13:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 13:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 13:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-0CL8we5OYz2F9eno.~'
Jan  6 13:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 13:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 13:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-0CL8we5OYz2F9eno.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  6 13:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 13:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 13:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  6 13:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 13:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 13:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  6 13:21:55 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 13:21:55 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 13:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  6 13:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 13:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 13:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  6 13:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 13:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 13:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  6 13:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 13:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 13:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  6 13:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 13:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 13:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  6 13:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 13:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 13:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  6 13:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  6 13:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  6 13:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  6 13:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  6 13:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  6 13:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  6 13:22:00 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  6 13:22:01 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  6 13:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  6 13:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 13:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 13:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  6 13:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 13:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 13:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  6 13:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 13:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 13:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  6 13:22:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 13:22:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 13:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  6 13:22:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 13:22:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 13:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  6 13:22:09 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  6 13:22:10 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  6 13:27:33 host sshd[21438]: Did not receive identification string from 13.124.93.139 port 38052
Jan  6 13:28:07 host sshd[21498]: Invalid user admin from 13.124.93.139 port 35692
Jan  6 13:28:07 host sshd[21498]: input_userauth_request: invalid user admin [preauth]
Jan  6 13:28:07 host sshd[21498]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 13:28:07 host sshd[21498]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.124.93.139
Jan  6 13:28:09 host sshd[21498]: Failed password for invalid user admin from 13.124.93.139 port 35692 ssh2
Jan  6 13:28:09 host sshd[21498]: Connection closed by 13.124.93.139 port 35692 [preauth]
Jan  6 13:28:51 host sshd[21582]: Invalid user admin from 13.124.93.139 port 55034
Jan  6 13:28:51 host sshd[21582]: input_userauth_request: invalid user admin [preauth]
Jan  6 13:28:51 host sshd[21582]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 13:28:51 host sshd[21582]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.124.93.139
Jan  6 13:28:52 host sshd[21582]: Failed password for invalid user admin from 13.124.93.139 port 55034 ssh2
Jan  6 13:28:52 host sshd[21582]: Connection closed by 13.124.93.139 port 55034 [preauth]
Jan  6 13:43:23 host sshd[23623]: Invalid user keith from 107.189.30.59 port 43812
Jan  6 13:43:23 host sshd[23623]: input_userauth_request: invalid user keith [preauth]
Jan  6 13:43:23 host sshd[23623]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 13:43:23 host sshd[23623]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59
Jan  6 13:43:25 host sshd[23623]: Failed password for invalid user keith from 107.189.30.59 port 43812 ssh2
Jan  6 13:43:25 host sshd[23623]: Connection closed by 107.189.30.59 port 43812 [preauth]
Jan  6 14:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  6 14:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 14:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 14:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  6 14:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 14:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 14:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  6 14:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 14:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 14:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  6 14:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 14:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 14:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  6 14:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 14:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 14:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  6 14:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 14:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 14:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  6 14:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 14:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 14:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  6 14:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 14:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 14:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  6 14:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 14:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 14:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  6 14:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 14:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 14:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  6 14:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 14:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 14:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  6 14:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 14:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 14:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  6 14:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 14:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 14:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwnexidigital user-2=mrsclean user-3=gifterman user-4=palco123 user-5=phmetals user-6=kottayamcalldriv user-7=wwwletsstalkfood user-8=straightcurve user-9=bonifacegroup user-10=wwwevmhonda user-11=pmcresources user-12=vfmassets user-13=wwwtestugo user-14=shalinijames user-15=wwwkapin user-16=woodpeck user-17=wwwkmaorg user-18=disposeat user-19=remysagr user-20=wwwrmswll user-21=keralaholi user-22=wwwresourcehunte user-23=ugotscom user-24=travelboniface user-25=wwwpmcresource user-26=laundryboniface user-27=dartsimp user-28=a2zgroup user-29=wwwkaretakers user-30=cochintaxi feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  6 14:21:54 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  6 14:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 14:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 14:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  6 14:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 14:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 14:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-y1nsItpx9Z5fmtjw.~
Jan  6 14:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 14:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 14:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-y1nsItpx9Z5fmtjw.~'
Jan  6 14:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 14:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 14:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-y1nsItpx9Z5fmtjw.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  6 14:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 14:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 14:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  6 14:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 14:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 14:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  6 14:21:55 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 14:21:55 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 14:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  6 14:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 14:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 14:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  6 14:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 14:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 14:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  6 14:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 14:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 14:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  6 14:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 14:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 14:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  6 14:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 14:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 14:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  6 14:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  6 14:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  6 14:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  6 14:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  6 14:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  6 14:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  6 14:22:00 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  6 14:22:02 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  6 14:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  6 14:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 14:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 14:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  6 14:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 14:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 14:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  6 14:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 14:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 14:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  6 14:22:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 14:22:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 14:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  6 14:22:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 14:22:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 14:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  6 14:22:10 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  6 14:22:11 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  6 14:40:39 host sshd[32414]: Invalid user edward from 46.101.29.76 port 34126
Jan  6 14:40:39 host sshd[32414]: input_userauth_request: invalid user edward [preauth]
Jan  6 14:40:39 host sshd[32414]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 14:40:39 host sshd[32414]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.29.76
Jan  6 14:40:41 host sshd[32414]: Failed password for invalid user edward from 46.101.29.76 port 34126 ssh2
Jan  6 14:40:41 host sshd[32414]: Received disconnect from 46.101.29.76 port 34126:11: Bye Bye [preauth]
Jan  6 14:40:41 host sshd[32414]: Disconnected from 46.101.29.76 port 34126 [preauth]
Jan  6 14:41:13 host sshd[32488]: Invalid user mcserver from 165.22.97.194 port 53190
Jan  6 14:41:13 host sshd[32488]: input_userauth_request: invalid user mcserver [preauth]
Jan  6 14:41:13 host sshd[32488]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 14:41:13 host sshd[32488]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.97.194
Jan  6 14:41:14 host sshd[32488]: Failed password for invalid user mcserver from 165.22.97.194 port 53190 ssh2
Jan  6 14:41:14 host sshd[32488]: Received disconnect from 165.22.97.194 port 53190:11: Bye Bye [preauth]
Jan  6 14:41:14 host sshd[32488]: Disconnected from 165.22.97.194 port 53190 [preauth]
Jan  6 14:42:11 host sshd[32607]: User root from 144.217.87.192 not allowed because not listed in AllowUsers
Jan  6 14:42:11 host sshd[32607]: input_userauth_request: invalid user root [preauth]
Jan  6 14:42:11 host unix_chkpwd[32611]: password check failed for user (root)
Jan  6 14:42:11 host sshd[32607]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.87.192  user=root
Jan  6 14:42:11 host sshd[32607]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 14:42:13 host sshd[32607]: Failed password for invalid user root from 144.217.87.192 port 44944 ssh2
Jan  6 14:42:13 host sshd[32607]: Received disconnect from 144.217.87.192 port 44944:11: Bye Bye [preauth]
Jan  6 14:42:13 host sshd[32607]: Disconnected from 144.217.87.192 port 44944 [preauth]
Jan  6 14:43:58 host sshd[480]: User root from 46.101.29.76 not allowed because not listed in AllowUsers
Jan  6 14:43:58 host sshd[480]: input_userauth_request: invalid user root [preauth]
Jan  6 14:43:58 host unix_chkpwd[485]: password check failed for user (root)
Jan  6 14:43:58 host sshd[480]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.29.76  user=root
Jan  6 14:43:58 host sshd[480]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 14:44:00 host sshd[480]: Failed password for invalid user root from 46.101.29.76 port 40302 ssh2
Jan  6 14:44:01 host sshd[480]: Received disconnect from 46.101.29.76 port 40302:11: Bye Bye [preauth]
Jan  6 14:44:01 host sshd[480]: Disconnected from 46.101.29.76 port 40302 [preauth]
Jan  6 14:44:53 host sshd[651]: Invalid user elk from 144.217.87.192 port 55004
Jan  6 14:44:53 host sshd[651]: input_userauth_request: invalid user elk [preauth]
Jan  6 14:44:53 host sshd[651]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 14:44:53 host sshd[651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.87.192
Jan  6 14:44:55 host sshd[651]: Failed password for invalid user elk from 144.217.87.192 port 55004 ssh2
Jan  6 14:44:55 host sshd[651]: Received disconnect from 144.217.87.192 port 55004:11: Bye Bye [preauth]
Jan  6 14:44:55 host sshd[651]: Disconnected from 144.217.87.192 port 55004 [preauth]
Jan  6 14:45:05 host sshd[732]: Invalid user administrador from 186.84.174.241 port 60407
Jan  6 14:45:05 host sshd[732]: input_userauth_request: invalid user administrador [preauth]
Jan  6 14:45:05 host sshd[732]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 14:45:05 host sshd[732]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.84.174.241
Jan  6 14:45:06 host sshd[732]: Failed password for invalid user administrador from 186.84.174.241 port 60407 ssh2
Jan  6 14:45:07 host sshd[732]: Received disconnect from 186.84.174.241 port 60407:11: Bye Bye [preauth]
Jan  6 14:45:07 host sshd[732]: Disconnected from 186.84.174.241 port 60407 [preauth]
Jan  6 14:45:36 host sshd[827]: User root from 165.22.97.194 not allowed because not listed in AllowUsers
Jan  6 14:45:36 host sshd[827]: input_userauth_request: invalid user root [preauth]
Jan  6 14:45:36 host unix_chkpwd[829]: password check failed for user (root)
Jan  6 14:45:36 host sshd[827]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.97.194  user=root
Jan  6 14:45:36 host sshd[827]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 14:45:38 host sshd[827]: Failed password for invalid user root from 165.22.97.194 port 39464 ssh2
Jan  6 14:45:38 host sshd[827]: Received disconnect from 165.22.97.194 port 39464:11: Bye Bye [preauth]
Jan  6 14:45:38 host sshd[827]: Disconnected from 165.22.97.194 port 39464 [preauth]
Jan  6 14:47:28 host sshd[1089]: User root from 186.84.174.241 not allowed because not listed in AllowUsers
Jan  6 14:47:28 host sshd[1089]: input_userauth_request: invalid user root [preauth]
Jan  6 14:47:28 host unix_chkpwd[1093]: password check failed for user (root)
Jan  6 14:47:28 host sshd[1089]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.84.174.241  user=root
Jan  6 14:47:28 host sshd[1089]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 14:47:31 host sshd[1089]: Failed password for invalid user root from 186.84.174.241 port 33228 ssh2
Jan  6 14:47:31 host sshd[1089]: Received disconnect from 186.84.174.241 port 33228:11: Bye Bye [preauth]
Jan  6 14:47:31 host sshd[1089]: Disconnected from 186.84.174.241 port 33228 [preauth]
Jan  6 15:09:48 host sshd[4245]: Invalid user am from 194.110.203.109 port 39632
Jan  6 15:09:48 host sshd[4245]: input_userauth_request: invalid user am [preauth]
Jan  6 15:09:48 host sshd[4245]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 15:09:48 host sshd[4245]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109
Jan  6 15:09:51 host sshd[4245]: Failed password for invalid user am from 194.110.203.109 port 39632 ssh2
Jan  6 15:09:54 host sshd[4245]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 15:09:56 host sshd[4245]: Failed password for invalid user am from 194.110.203.109 port 39632 ssh2
Jan  6 15:09:59 host sshd[4245]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 15:10:01 host sshd[4245]: Failed password for invalid user am from 194.110.203.109 port 39632 ssh2
Jan  6 15:10:04 host sshd[4245]: Connection closed by 194.110.203.109 port 39632 [preauth]
Jan  6 15:10:04 host sshd[4245]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109
Jan  6 15:13:00 host sshd[4785]: Did not receive identification string from 20.106.97.141 port 1920
Jan  6 15:13:06 host sshd[4809]: Did not receive identification string from 20.106.97.141 port 1921
Jan  6 15:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  6 15:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 15:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 15:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  6 15:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 15:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 15:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  6 15:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 15:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 15:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  6 15:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 15:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 15:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  6 15:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 15:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 15:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  6 15:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 15:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 15:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  6 15:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 15:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 15:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  6 15:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 15:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 15:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  6 15:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 15:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 15:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  6 15:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 15:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 15:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  6 15:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 15:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 15:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  6 15:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 15:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 15:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  6 15:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 15:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 15:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkapin user-2=woodpeck user-3=disposeat user-4=wwwkmaorg user-5=remysagr user-6=pmcresources user-7=vfmassets user-8=wwwtestugo user-9=shalinijames user-10=straightcurve user-11=wwwletsstalkfood user-12=bonifacegroup user-13=wwwevmhonda user-14=wwwnexidigital user-15=mrsclean user-16=gifterman user-17=palco123 user-18=phmetals user-19=kottayamcalldriv user-20=wwwkaretakers user-21=cochintaxi user-22=laundryboniface user-23=dartsimp user-24=a2zgroup user-25=wwwpmcresource user-26=wwwrmswll user-27=wwwresourcehunte user-28=keralaholi user-29=ugotscom user-30=travelboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  6 15:21:54 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  6 15:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 15:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 15:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  6 15:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 15:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 15:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-3nMrDRtQ9ifeJkAT.~
Jan  6 15:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 15:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 15:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-3nMrDRtQ9ifeJkAT.~'
Jan  6 15:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 15:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 15:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-3nMrDRtQ9ifeJkAT.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  6 15:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 15:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 15:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  6 15:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 15:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 15:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  6 15:21:58 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 15:21:58 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 15:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  6 15:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 15:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 15:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  6 15:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 15:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 15:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  6 15:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 15:21:59 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 15:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  6 15:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 15:21:59 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 15:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  6 15:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 15:22:00 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 15:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  6 15:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  6 15:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  6 15:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  6 15:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  6 15:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  6 15:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  6 15:22:03 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  6 15:22:04 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  6 15:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  6 15:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 15:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 15:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  6 15:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 15:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 15:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  6 15:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 15:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 15:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  6 15:22:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 15:22:10 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 15:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  6 15:22:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 15:22:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 15:22:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  6 15:22:12 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  6 15:22:13 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  6 15:57:21 host sshd[10972]: Connection closed by 107.170.252.6 port 55950 [preauth]
Jan  6 16:18:59 host sshd[14230]: User root from 89.109.22.99 not allowed because not listed in AllowUsers
Jan  6 16:18:59 host sshd[14230]: input_userauth_request: invalid user root [preauth]
Jan  6 16:18:59 host unix_chkpwd[14233]: password check failed for user (root)
Jan  6 16:18:59 host sshd[14230]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.109.22.99  user=root
Jan  6 16:18:59 host sshd[14230]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 16:19:01 host sshd[14230]: Failed password for invalid user root from 89.109.22.99 port 30918 ssh2
Jan  6 16:19:01 host unix_chkpwd[14247]: password check failed for user (root)
Jan  6 16:19:01 host sshd[14230]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 16:19:04 host sshd[14230]: Failed password for invalid user root from 89.109.22.99 port 30918 ssh2
Jan  6 16:19:04 host unix_chkpwd[14251]: password check failed for user (root)
Jan  6 16:19:04 host sshd[14230]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 16:19:06 host sshd[14230]: Failed password for invalid user root from 89.109.22.99 port 30918 ssh2
Jan  6 16:19:06 host unix_chkpwd[14253]: password check failed for user (root)
Jan  6 16:19:06 host sshd[14230]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 16:19:08 host sshd[14230]: Failed password for invalid user root from 89.109.22.99 port 30918 ssh2
Jan  6 16:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  6 16:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 16:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 16:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  6 16:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 16:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 16:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  6 16:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 16:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 16:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  6 16:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 16:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 16:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  6 16:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 16:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 16:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  6 16:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 16:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 16:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  6 16:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 16:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 16:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  6 16:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 16:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 16:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  6 16:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 16:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 16:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  6 16:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 16:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 16:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  6 16:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 16:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 16:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  6 16:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 16:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 16:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  6 16:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 16:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 16:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=shalinijames user-2=wwwtestugo user-3=vfmassets user-4=pmcresources user-5=disposeat user-6=wwwkmaorg user-7=remysagr user-8=woodpeck user-9=wwwkapin user-10=phmetals user-11=kottayamcalldriv user-12=palco123 user-13=gifterman user-14=wwwnexidigital user-15=mrsclean user-16=wwwevmhonda user-17=bonifacegroup user-18=wwwletsstalkfood user-19=straightcurve user-20=a2zgroup user-21=dartsimp user-22=laundryboniface user-23=wwwkaretakers user-24=cochintaxi user-25=travelboniface user-26=ugotscom user-27=wwwresourcehunte user-28=keralaholi user-29=wwwrmswll user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  6 16:21:54 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  6 16:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 16:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 16:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  6 16:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 16:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 16:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-IKd6ZtNju5HYxfyg.~
Jan  6 16:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 16:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 16:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-IKd6ZtNju5HYxfyg.~'
Jan  6 16:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 16:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 16:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-IKd6ZtNju5HYxfyg.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  6 16:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 16:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 16:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  6 16:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 16:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 16:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  6 16:21:55 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 16:21:55 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 16:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  6 16:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 16:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 16:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  6 16:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 16:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 16:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  6 16:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 16:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 16:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  6 16:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 16:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 16:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  6 16:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 16:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 16:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  6 16:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  6 16:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  6 16:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  6 16:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  6 16:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  6 16:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  6 16:22:00 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  6 16:22:02 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  6 16:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  6 16:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 16:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 16:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  6 16:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 16:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 16:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  6 16:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 16:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 16:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  6 16:22:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 16:22:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 16:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  6 16:22:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 16:22:10 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 16:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  6 16:22:11 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  6 16:22:12 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  6 16:39:19 host sshd[17170]: Did not receive identification string from 34.92.211.177 port 44452
Jan  6 16:39:19 host sshd[17173]: Invalid user oracle from 34.92.211.177 port 45306
Jan  6 16:39:19 host sshd[17171]: Invalid user gitlab-runner from 34.92.211.177 port 45302
Jan  6 16:39:19 host sshd[17172]: Invalid user esuser from 34.92.211.177 port 45304
Jan  6 16:39:19 host sshd[17171]: input_userauth_request: invalid user gitlab-runner [preauth]
Jan  6 16:39:19 host sshd[17173]: input_userauth_request: invalid user oracle [preauth]
Jan  6 16:39:19 host sshd[17172]: input_userauth_request: invalid user esuser [preauth]
Jan  6 16:39:19 host sshd[17171]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 16:39:19 host sshd[17172]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 16:39:19 host sshd[17173]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 16:39:19 host sshd[17172]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.92.211.177
Jan  6 16:39:19 host sshd[17173]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.92.211.177
Jan  6 16:39:19 host sshd[17171]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.92.211.177
Jan  6 16:39:21 host sshd[17172]: Failed password for invalid user esuser from 34.92.211.177 port 45304 ssh2
Jan  6 16:39:21 host sshd[17171]: Failed password for invalid user gitlab-runner from 34.92.211.177 port 45302 ssh2
Jan  6 16:39:21 host sshd[17173]: Failed password for invalid user oracle from 34.92.211.177 port 45306 ssh2
Jan  6 16:39:21 host sshd[17171]: Connection closed by 34.92.211.177 port 45302 [preauth]
Jan  6 16:39:21 host sshd[17172]: Connection closed by 34.92.211.177 port 45304 [preauth]
Jan  6 16:39:21 host sshd[17173]: Connection closed by 34.92.211.177 port 45306 [preauth]
Jan  6 16:46:59 host sshd[18328]: Did not receive identification string from 81.68.169.243 port 39966
Jan  6 16:48:16 host sshd[18483]: Bad protocol version identification 'MGLNDD_167.71.234.10_22' from 198.199.101.240 port 35196
Jan  6 16:59:11 host sshd[20004]: Did not receive identification string from 168.167.72.97 port 12509
Jan  6 16:59:13 host sshd[20005]: User mysql from 168.167.72.97 not allowed because not listed in AllowUsers
Jan  6 16:59:13 host sshd[20005]: input_userauth_request: invalid user mysql [preauth]
Jan  6 16:59:13 host sshd[20006]: Invalid user esuser from 168.167.72.97 port 12518
Jan  6 16:59:13 host sshd[20006]: input_userauth_request: invalid user esuser [preauth]
Jan  6 16:59:13 host sshd[20008]: Invalid user devops from 168.167.72.97 port 12512
Jan  6 16:59:13 host sshd[20008]: input_userauth_request: invalid user devops [preauth]
Jan  6 16:59:13 host sshd[20007]: Invalid user steam from 168.167.72.97 port 12511
Jan  6 16:59:13 host sshd[20007]: input_userauth_request: invalid user steam [preauth]
Jan  6 16:59:13 host sshd[20009]: Invalid user postgres from 168.167.72.97 port 12517
Jan  6 16:59:13 host sshd[20009]: input_userauth_request: invalid user postgres [preauth]
Jan  6 16:59:13 host sshd[20011]: Invalid user esuser from 168.167.72.97 port 12510
Jan  6 16:59:13 host sshd[20011]: input_userauth_request: invalid user esuser [preauth]
Jan  6 16:59:13 host sshd[20010]: Invalid user test from 168.167.72.97 port 12515
Jan  6 16:59:13 host sshd[20010]: input_userauth_request: invalid user test [preauth]
Jan  6 16:59:13 host unix_chkpwd[20028]: password check failed for user (mysql)
Jan  6 16:59:13 host sshd[20005]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.167.72.97  user=mysql
Jan  6 16:59:13 host sshd[20005]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "mysql"
Jan  6 16:59:13 host sshd[20006]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 16:59:13 host sshd[20006]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.167.72.97
Jan  6 16:59:13 host sshd[20008]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 16:59:13 host sshd[20008]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.167.72.97
Jan  6 16:59:13 host sshd[20007]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 16:59:13 host sshd[20007]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.167.72.97
Jan  6 16:59:13 host sshd[20009]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 16:59:13 host sshd[20009]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.167.72.97
Jan  6 16:59:13 host sshd[20011]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 16:59:13 host sshd[20011]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.167.72.97
Jan  6 16:59:13 host sshd[20010]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 16:59:13 host sshd[20010]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.167.72.97
Jan  6 16:59:13 host sshd[20020]: Invalid user oracle from 168.167.72.97 port 12519
Jan  6 16:59:13 host sshd[20020]: input_userauth_request: invalid user oracle [preauth]
Jan  6 16:59:14 host sshd[20021]: Invalid user steam from 168.167.72.97 port 12516
Jan  6 16:59:14 host sshd[20021]: input_userauth_request: invalid user steam [preauth]
Jan  6 16:59:14 host sshd[20023]: User mysql from 168.167.72.97 not allowed because not listed in AllowUsers
Jan  6 16:59:14 host sshd[20023]: input_userauth_request: invalid user mysql [preauth]
Jan  6 16:59:14 host sshd[20020]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 16:59:14 host sshd[20020]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.167.72.97
Jan  6 16:59:14 host sshd[20021]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 16:59:14 host sshd[20021]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.167.72.97
Jan  6 16:59:14 host unix_chkpwd[20029]: password check failed for user (mysql)
Jan  6 16:59:14 host sshd[20023]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.167.72.97  user=mysql
Jan  6 16:59:14 host sshd[20023]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "mysql"
Jan  6 16:59:15 host sshd[20020]: Failed password for invalid user oracle from 168.167.72.97 port 12519 ssh2
Jan  6 16:59:15 host sshd[20005]: Failed password for invalid user mysql from 168.167.72.97 port 12513 ssh2
Jan  6 16:59:15 host sshd[20006]: Failed password for invalid user esuser from 168.167.72.97 port 12518 ssh2
Jan  6 16:59:15 host sshd[20008]: Failed password for invalid user devops from 168.167.72.97 port 12512 ssh2
Jan  6 16:59:15 host sshd[20007]: Failed password for invalid user steam from 168.167.72.97 port 12511 ssh2
Jan  6 16:59:15 host sshd[20009]: Failed password for invalid user postgres from 168.167.72.97 port 12517 ssh2
Jan  6 16:59:15 host sshd[20011]: Failed password for invalid user esuser from 168.167.72.97 port 12510 ssh2
Jan  6 16:59:15 host sshd[20010]: Failed password for invalid user test from 168.167.72.97 port 12515 ssh2
Jan  6 16:59:15 host sshd[20021]: Failed password for invalid user steam from 168.167.72.97 port 12516 ssh2
Jan  6 16:59:15 host sshd[20023]: Failed password for invalid user mysql from 168.167.72.97 port 12514 ssh2
Jan  6 16:59:15 host sshd[20005]: Connection closed by 168.167.72.97 port 12513 [preauth]
Jan  6 16:59:15 host sshd[20020]: Connection closed by 168.167.72.97 port 12519 [preauth]
Jan  6 16:59:15 host sshd[20006]: Connection closed by 168.167.72.97 port 12518 [preauth]
Jan  6 16:59:15 host sshd[20008]: Connection closed by 168.167.72.97 port 12512 [preauth]
Jan  6 16:59:15 host sshd[20007]: Connection closed by 168.167.72.97 port 12511 [preauth]
Jan  6 16:59:15 host sshd[20009]: Connection closed by 168.167.72.97 port 12517 [preauth]
Jan  6 16:59:15 host sshd[20011]: Connection closed by 168.167.72.97 port 12510 [preauth]
Jan  6 16:59:15 host sshd[20010]: Connection closed by 168.167.72.97 port 12515 [preauth]
Jan  6 16:59:16 host sshd[20021]: Connection closed by 168.167.72.97 port 12516 [preauth]
Jan  6 16:59:16 host sshd[20023]: Connection closed by 168.167.72.97 port 12514 [preauth]
Jan  6 16:59:16 host sshd[20037]: Invalid user steam from 168.167.72.97 port 12524
Jan  6 16:59:16 host sshd[20037]: input_userauth_request: invalid user steam [preauth]
Jan  6 16:59:16 host sshd[20036]: Invalid user test from 168.167.72.97 port 12522
Jan  6 16:59:16 host sshd[20036]: input_userauth_request: invalid user test [preauth]
Jan  6 16:59:16 host sshd[20038]: Invalid user testuser from 168.167.72.97 port 12520
Jan  6 16:59:16 host sshd[20038]: input_userauth_request: invalid user testuser [preauth]
Jan  6 17:18:42 host sshd[22850]: Invalid user an from 194.110.203.109 port 55364
Jan  6 17:18:42 host sshd[22850]: input_userauth_request: invalid user an [preauth]
Jan  6 17:18:42 host sshd[22850]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 17:18:42 host sshd[22850]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109
Jan  6 17:18:43 host sshd[22850]: Failed password for invalid user an from 194.110.203.109 port 55364 ssh2
Jan  6 17:18:46 host sshd[22850]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 17:18:48 host sshd[22850]: Failed password for invalid user an from 194.110.203.109 port 55364 ssh2
Jan  6 17:18:51 host sshd[22850]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 17:18:53 host sshd[22850]: Failed password for invalid user an from 194.110.203.109 port 55364 ssh2
Jan  6 17:18:56 host sshd[22850]: Connection closed by 194.110.203.109 port 55364 [preauth]
Jan  6 17:18:56 host sshd[22850]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109
Jan  6 17:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  6 17:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 17:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 17:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  6 17:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 17:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 17:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  6 17:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 17:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 17:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  6 17:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 17:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 17:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  6 17:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 17:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 17:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  6 17:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 17:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 17:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  6 17:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 17:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 17:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  6 17:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 17:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 17:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  6 17:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 17:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 17:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  6 17:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 17:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 17:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  6 17:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 17:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 17:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  6 17:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 17:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 17:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  6 17:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 17:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 17:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=pmcresources user-2=shalinijames user-3=wwwtestugo user-4=vfmassets user-5=woodpeck user-6=wwwkapin user-7=wwwkmaorg user-8=disposeat user-9=remysagr user-10=mrsclean user-11=wwwnexidigital user-12=phmetals user-13=kottayamcalldriv user-14=palco123 user-15=gifterman user-16=wwwletsstalkfood user-17=straightcurve user-18=wwwevmhonda user-19=bonifacegroup user-20=laundryboniface user-21=a2zgroup user-22=dartsimp user-23=wwwkaretakers user-24=cochintaxi user-25=ugotscom user-26=wwwresourcehunte user-27=keralaholi user-28=wwwrmswll user-29=travelboniface user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  6 17:21:54 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  6 17:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 17:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 17:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  6 17:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 17:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 17:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-9by2L32X9W7E3YSU.~
Jan  6 17:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 17:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 17:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-9by2L32X9W7E3YSU.~'
Jan  6 17:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 17:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 17:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-9by2L32X9W7E3YSU.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  6 17:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 17:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 17:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  6 17:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 17:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 17:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  6 17:21:55 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 17:21:55 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 17:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  6 17:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 17:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 17:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  6 17:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 17:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 17:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  6 17:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 17:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 17:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  6 17:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 17:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 17:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  6 17:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 17:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 17:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  6 17:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  6 17:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  6 17:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  6 17:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  6 17:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  6 17:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  6 17:22:00 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  6 17:22:02 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  6 17:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  6 17:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 17:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 17:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  6 17:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 17:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 17:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  6 17:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 17:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 17:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  6 17:22:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 17:22:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 17:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  6 17:22:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 17:22:10 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 17:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  6 17:22:10 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  6 17:22:12 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  6 17:49:36 host sshd[27582]: User root from 85.234.125.13 not allowed because not listed in AllowUsers
Jan  6 17:49:36 host sshd[27582]: input_userauth_request: invalid user root [preauth]
Jan  6 17:49:36 host unix_chkpwd[27589]: password check failed for user (root)
Jan  6 17:49:36 host sshd[27582]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.234.125.13  user=root
Jan  6 17:49:36 host sshd[27582]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 17:49:39 host sshd[27582]: Failed password for invalid user root from 85.234.125.13 port 37540 ssh2
Jan  6 17:49:39 host sshd[27582]: Received disconnect from 85.234.125.13 port 37540:11: Bye Bye [preauth]
Jan  6 17:49:39 host sshd[27582]: Disconnected from 85.234.125.13 port 37540 [preauth]
Jan  6 17:52:35 host sshd[28043]: User root from 134.17.16.37 not allowed because not listed in AllowUsers
Jan  6 17:52:35 host sshd[28043]: input_userauth_request: invalid user root [preauth]
Jan  6 17:52:35 host unix_chkpwd[28046]: password check failed for user (root)
Jan  6 17:52:35 host sshd[28043]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.17.16.37  user=root
Jan  6 17:52:35 host sshd[28043]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 17:52:37 host sshd[28043]: Failed password for invalid user root from 134.17.16.37 port 35908 ssh2
Jan  6 17:52:37 host sshd[28043]: Received disconnect from 134.17.16.37 port 35908:11: Bye Bye [preauth]
Jan  6 17:52:37 host sshd[28043]: Disconnected from 134.17.16.37 port 35908 [preauth]
Jan  6 17:54:04 host sshd[28351]: Invalid user frappe from 134.17.16.37 port 35909
Jan  6 17:54:04 host sshd[28351]: input_userauth_request: invalid user frappe [preauth]
Jan  6 17:54:04 host sshd[28351]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 17:54:04 host sshd[28351]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.17.16.37
Jan  6 17:54:06 host sshd[28351]: Failed password for invalid user frappe from 134.17.16.37 port 35909 ssh2
Jan  6 17:54:07 host sshd[28351]: Received disconnect from 134.17.16.37 port 35909:11: Bye Bye [preauth]
Jan  6 17:54:07 host sshd[28351]: Disconnected from 134.17.16.37 port 35909 [preauth]
Jan  6 17:54:14 host sshd[28399]: Invalid user username from 114.35.182.104 port 55368
Jan  6 17:54:14 host sshd[28399]: input_userauth_request: invalid user username [preauth]
Jan  6 17:54:14 host sshd[28399]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 17:54:14 host sshd[28399]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.35.182.104
Jan  6 17:54:16 host sshd[28399]: Failed password for invalid user username from 114.35.182.104 port 55368 ssh2
Jan  6 17:54:17 host sshd[28399]: Received disconnect from 114.35.182.104 port 55368:11: Bye Bye [preauth]
Jan  6 17:54:17 host sshd[28399]: Disconnected from 114.35.182.104 port 55368 [preauth]
Jan  6 17:56:20 host sshd[28706]: User root from 85.234.125.13 not allowed because not listed in AllowUsers
Jan  6 17:56:20 host sshd[28706]: input_userauth_request: invalid user root [preauth]
Jan  6 17:56:20 host unix_chkpwd[28711]: password check failed for user (root)
Jan  6 17:56:20 host sshd[28706]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.234.125.13  user=root
Jan  6 17:56:20 host sshd[28706]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 17:56:22 host sshd[28706]: Failed password for invalid user root from 85.234.125.13 port 38298 ssh2
Jan  6 17:56:47 host sshd[28814]: User root from 114.35.182.104 not allowed because not listed in AllowUsers
Jan  6 17:56:47 host sshd[28814]: input_userauth_request: invalid user root [preauth]
Jan  6 17:56:47 host unix_chkpwd[28819]: password check failed for user (root)
Jan  6 17:56:47 host sshd[28814]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.35.182.104  user=root
Jan  6 17:56:47 host sshd[28814]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 17:56:49 host sshd[28814]: Failed password for invalid user root from 114.35.182.104 port 42916 ssh2
Jan  6 17:56:49 host sshd[28814]: Received disconnect from 114.35.182.104 port 42916:11: Bye Bye [preauth]
Jan  6 17:56:49 host sshd[28814]: Disconnected from 114.35.182.104 port 42916 [preauth]
Jan  6 18:12:42 host sshd[31449]: Connection closed by 192.155.90.220 port 59716 [preauth]
Jan  6 18:12:43 host sshd[31459]: Did not receive identification string from 192.155.90.220 port 8320
Jan  6 18:12:44 host sshd[31461]: Did not receive identification string from 192.155.90.220 port 8330
Jan  6 18:15:46 host sshd[31884]: Invalid user service from 194.169.175.102 port 51685
Jan  6 18:15:46 host sshd[31884]: input_userauth_request: invalid user service [preauth]
Jan  6 18:15:46 host sshd[31884]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 18:15:46 host sshd[31884]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.169.175.102
Jan  6 18:15:48 host sshd[31884]: Failed password for invalid user service from 194.169.175.102 port 51685 ssh2
Jan  6 18:15:49 host sshd[31884]: Received disconnect from 194.169.175.102 port 51685:11: Client disconnecting normally [preauth]
Jan  6 18:15:49 host sshd[31884]: Disconnected from 194.169.175.102 port 51685 [preauth]
Jan  6 18:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  6 18:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 18:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 18:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  6 18:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 18:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 18:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  6 18:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 18:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 18:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  6 18:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 18:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 18:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  6 18:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 18:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 18:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  6 18:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 18:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 18:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  6 18:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 18:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 18:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  6 18:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 18:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 18:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  6 18:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 18:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 18:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  6 18:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 18:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 18:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  6 18:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 18:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 18:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  6 18:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 18:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 18:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  6 18:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 18:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 18:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkaretakers user-2=cochintaxi user-3=laundryboniface user-4=a2zgroup user-5=dartsimp user-6=wwwpmcresource user-7=ugotscom user-8=wwwresourcehunte user-9=keralaholi user-10=wwwrmswll user-11=travelboniface user-12=woodpeck user-13=wwwkapin user-14=disposeat user-15=remysagr user-16=wwwkmaorg user-17=pmcresources user-18=shalinijames user-19=wwwtestugo user-20=vfmassets user-21=wwwletsstalkfood user-22=straightcurve user-23=wwwevmhonda user-24=bonifacegroup user-25=mrsclean user-26=wwwnexidigital user-27=phmetals user-28=kottayamcalldriv user-29=palco123 user-30=gifterman feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  6 18:21:58 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  6 18:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 18:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 18:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  6 18:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 18:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 18:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Byiwz37N3KdpFHWl.~
Jan  6 18:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 18:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 18:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Byiwz37N3KdpFHWl.~'
Jan  6 18:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 18:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 18:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Byiwz37N3KdpFHWl.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  6 18:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 18:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 18:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  6 18:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 18:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 18:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  6 18:21:59 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 18:21:59 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 18:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  6 18:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 18:21:59 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 18:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  6 18:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 18:21:59 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 18:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  6 18:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 18:21:59 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 18:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  6 18:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 18:22:00 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 18:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  6 18:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 18:22:00 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 18:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  6 18:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  6 18:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  6 18:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  6 18:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  6 18:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  6 18:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  6 18:22:03 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  6 18:22:05 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  6 18:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  6 18:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 18:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 18:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  6 18:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 18:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 18:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  6 18:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 18:22:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 18:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  6 18:22:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 18:22:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 18:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  6 18:22:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 18:22:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 18:22:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  6 18:22:13 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  6 18:22:14 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  6 18:28:20 host sshd[1484]: Invalid user tommy from 128.134.187.112 port 37896
Jan  6 18:28:20 host sshd[1484]: input_userauth_request: invalid user tommy [preauth]
Jan  6 18:28:20 host sshd[1484]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 18:28:20 host sshd[1484]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.134.187.112
Jan  6 18:28:21 host sshd[1484]: Failed password for invalid user tommy from 128.134.187.112 port 37896 ssh2
Jan  6 18:28:21 host sshd[1484]: Received disconnect from 128.134.187.112 port 37896:11: Bye Bye [preauth]
Jan  6 18:28:21 host sshd[1484]: Disconnected from 128.134.187.112 port 37896 [preauth]
Jan  6 18:33:15 host sshd[2184]: User root from 20.228.182.192 not allowed because not listed in AllowUsers
Jan  6 18:33:15 host sshd[2184]: input_userauth_request: invalid user root [preauth]
Jan  6 18:33:15 host unix_chkpwd[2187]: password check failed for user (root)
Jan  6 18:33:15 host sshd[2184]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.228.182.192  user=root
Jan  6 18:33:15 host sshd[2184]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 18:33:17 host sshd[2184]: Failed password for invalid user root from 20.228.182.192 port 50348 ssh2
Jan  6 18:33:17 host sshd[2184]: Received disconnect from 20.228.182.192 port 50348:11: Bye Bye [preauth]
Jan  6 18:33:17 host sshd[2184]: Disconnected from 20.228.182.192 port 50348 [preauth]
Jan  6 18:34:51 host sshd[2367]: Invalid user appuser from 128.134.187.112 port 39138
Jan  6 18:34:51 host sshd[2367]: input_userauth_request: invalid user appuser [preauth]
Jan  6 18:34:51 host sshd[2367]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 18:34:51 host sshd[2367]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.134.187.112
Jan  6 18:34:53 host sshd[2367]: Failed password for invalid user appuser from 128.134.187.112 port 39138 ssh2
Jan  6 18:34:53 host sshd[2367]: Received disconnect from 128.134.187.112 port 39138:11: Bye Bye [preauth]
Jan  6 18:34:53 host sshd[2367]: Disconnected from 128.134.187.112 port 39138 [preauth]
Jan  6 18:35:32 host sshd[2483]: User root from 209.141.55.27 not allowed because not listed in AllowUsers
Jan  6 18:35:32 host sshd[2483]: input_userauth_request: invalid user root [preauth]
Jan  6 18:35:32 host unix_chkpwd[2486]: password check failed for user (root)
Jan  6 18:35:32 host sshd[2483]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.55.27  user=root
Jan  6 18:35:32 host sshd[2483]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 18:35:34 host sshd[2483]: Failed password for invalid user root from 209.141.55.27 port 35692 ssh2
Jan  6 18:35:34 host sshd[2483]: Received disconnect from 209.141.55.27 port 35692:11: Normal Shutdown, Thank you for playing [preauth]
Jan  6 18:35:34 host sshd[2483]: Disconnected from 209.141.55.27 port 35692 [preauth]
Jan  6 18:36:01 host sshd[2546]: User root from 20.228.182.192 not allowed because not listed in AllowUsers
Jan  6 18:36:01 host sshd[2546]: input_userauth_request: invalid user root [preauth]
Jan  6 18:36:01 host unix_chkpwd[2559]: password check failed for user (root)
Jan  6 18:36:01 host sshd[2546]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.228.182.192  user=root
Jan  6 18:36:01 host sshd[2546]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 18:36:03 host sshd[2546]: Failed password for invalid user root from 20.228.182.192 port 50486 ssh2
Jan  6 18:36:06 host sshd[2596]: Invalid user jeremy from 128.134.187.112 port 34168
Jan  6 18:36:06 host sshd[2596]: input_userauth_request: invalid user jeremy [preauth]
Jan  6 18:36:06 host sshd[2596]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 18:36:06 host sshd[2596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.134.187.112
Jan  6 18:36:08 host sshd[2596]: Failed password for invalid user jeremy from 128.134.187.112 port 34168 ssh2
Jan  6 18:45:33 host sshd[3692]: User root from 54.86.3.233 not allowed because not listed in AllowUsers
Jan  6 18:45:33 host sshd[3692]: input_userauth_request: invalid user root [preauth]
Jan  6 18:45:33 host unix_chkpwd[3786]: password check failed for user (root)
Jan  6 18:45:33 host sshd[3692]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.86.3.233  user=root
Jan  6 18:45:33 host sshd[3692]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  6 18:45:35 host sshd[3692]: Failed password for invalid user root from 54.86.3.233 port 59138 ssh2
Jan  6 18:45:35 host sshd[3692]: Received disconnect from 54.86.3.233 port 59138:11: Bye Bye [preauth]
Jan  6 18:45:35 host sshd[3692]: Disconnected from 54.86.3.233 port 59138 [preauth]
Jan  6 18:53:02 host sshd[4912]: Invalid user samuel from 107.189.30.59 port 58504
Jan  6 18:53:02 host sshd[4912]: input_userauth_request: invalid user samuel [preauth]
Jan  6 18:53:02 host sshd[4912]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 18:53:02 host sshd[4912]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59
Jan  6 18:53:04 host sshd[4912]: Failed password for invalid user samuel from 107.189.30.59 port 58504 ssh2
Jan  6 18:53:05 host sshd[4912]: Connection closed by 107.189.30.59 port 58504 [preauth]
Jan  6 19:01:30 host sshd[6203]: Connection closed by 54.86.3.233 port 37770 [preauth]
Jan  6 19:18:12 host sshd[9684]: Invalid user ao from 194.110.203.109 port 39136
Jan  6 19:18:12 host sshd[9684]: input_userauth_request: invalid user ao [preauth]
Jan  6 19:18:12 host sshd[9684]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 19:18:12 host sshd[9684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109
Jan  6 19:18:14 host sshd[9684]: Failed password for invalid user ao from 194.110.203.109 port 39136 ssh2
Jan  6 19:18:17 host sshd[9684]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 19:18:19 host sshd[9684]: Failed password for invalid user ao from 194.110.203.109 port 39136 ssh2
Jan  6 19:18:22 host sshd[9684]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 19:18:24 host sshd[9684]: Failed password for invalid user ao from 194.110.203.109 port 39136 ssh2
Jan  6 19:18:27 host sshd[9684]: Connection closed by 194.110.203.109 port 39136 [preauth]
Jan  6 19:18:27 host sshd[9684]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109
Jan  6 19:18:33 host sshd[9874]: Invalid user base from 182.93.7.194 port 38974
Jan  6 19:18:33 host sshd[9874]: input_userauth_request: invalid user base [preauth]
Jan  6 19:18:33 host sshd[9874]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 19:18:33 host sshd[9874]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.93.7.194
Jan  6 19:18:35 host sshd[9874]: Failed password for invalid user base from 182.93.7.194 port 38974 ssh2
Jan  6 19:18:35 host sshd[9874]: Received disconnect from 182.93.7.194 port 38974:11: Bye Bye [preauth]
Jan  6 19:18:35 host sshd[9874]: Disconnected from 182.93.7.194 port 38974 [preauth]
Jan  6 19:19:42 host sshd[10543]: Invalid user ubuntu from 212.68.38.179 port 44642
Jan  6 19:19:42 host sshd[10543]: input_userauth_request: invalid user ubuntu [preauth]
Jan  6 19:19:42 host sshd[10543]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 19:19:42 host sshd[10543]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.68.38.179
Jan  6 19:19:42 host sshd[10537]: Invalid user usbmuxd from 190.210.182.179 port 45924
Jan  6 19:19:42 host sshd[10537]: input_userauth_request: invalid user usbmuxd [preauth]
Jan  6 19:19:42 host sshd[10537]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 19:19:42 host sshd[10537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.210.182.179
Jan  6 19:19:44 host sshd[10543]: Failed password for invalid user ubuntu from 212.68.38.179 port 44642 ssh2
Jan  6 19:19:44 host sshd[10543]: Received disconnect from 212.68.38.179 port 44642:11: Bye Bye [preauth]
Jan  6 19:19:44 host sshd[10543]: Disconnected from 212.68.38.179 port 44642 [preauth]
Jan  6 19:19:44 host sshd[10537]: Failed password for invalid user usbmuxd from 190.210.182.179 port 45924 ssh2
Jan  6 19:19:45 host sshd[10537]: Received disconnect from 190.210.182.179 port 45924:11: Bye Bye [preauth]
Jan  6 19:19:45 host sshd[10537]: Disconnected from 190.210.182.179 port 45924 [preauth]
Jan  6 19:21:13 host sshd[11177]: Invalid user pgsql from 182.93.7.194 port 57498
Jan  6 19:21:13 host sshd[11177]: input_userauth_request: invalid user pgsql [preauth]
Jan  6 19:21:13 host sshd[11177]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 19:21:13 host sshd[11177]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.93.7.194
Jan  6 19:21:15 host sshd[11177]: Failed password for invalid user pgsql from 182.93.7.194 port 57498 ssh2
Jan  6 19:21:15 host sshd[11177]: Received disconnect from 182.93.7.194 port 57498:11: Bye Bye [preauth]
Jan  6 19:21:15 host sshd[11177]: Disconnected from 182.93.7.194 port 57498 [preauth]
Jan  6 19:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  6 19:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 19:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 19:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  6 19:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 19:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 19:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  6 19:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 19:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 19:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  6 19:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 19:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 19:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  6 19:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 19:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 19:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  6 19:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 19:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 19:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  6 19:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 19:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 19:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  6 19:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 19:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 19:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  6 19:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 19:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 19:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  6 19:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 19:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 19:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  6 19:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 19:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 19:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  6 19:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 19:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 19:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  6 19:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 19:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 19:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=cochintaxi user-2=wwwkaretakers user-3=laundryboniface user-4=dartsimp user-5=a2zgroup user-6=wwwpmcresource user-7=wwwrmswll user-8=wwwresourcehunte user-9=keralaholi user-10=ugotscom user-11=travelboniface user-12=wwwkapin user-13=woodpeck user-14=disposeat user-15=wwwkmaorg user-16=remysagr user-17=pmcresources user-18=vfmassets user-19=wwwtestugo user-20=shalinijames user-21=straightcurve user-22=wwwletsstalkfood user-23=bonifacegroup user-24=wwwevmhonda user-25=mrsclean user-26=wwwnexidigital user-27=gifterman user-28=palco123 user-29=phmetals user-30=kottayamcalldriv feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  6 19:21:54 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  6 19:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 19:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 19:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  6 19:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 19:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 19:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ViDicdACu6jmrvEZ.~
Jan  6 19:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 19:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 19:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ViDicdACu6jmrvEZ.~'
Jan  6 19:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 19:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 19:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ViDicdACu6jmrvEZ.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  6 19:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 19:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 19:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  6 19:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 19:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 19:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  6 19:21:55 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 19:21:55 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 19:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  6 19:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 19:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 19:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  6 19:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 19:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 19:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  6 19:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 19:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 19:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  6 19:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 19:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 19:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  6 19:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 19:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 19:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  6 19:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  6 19:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  6 19:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  6 19:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  6 19:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  6 19:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  6 19:21:59 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  6 19:22:00 host sshd[11468]: Invalid user rexter from 212.68.38.179 port 36134
Jan  6 19:22:00 host sshd[11468]: input_userauth_request: invalid user rexter [preauth]
Jan  6 19:22:00 host sshd[11468]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 19:22:00 host sshd[11468]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.68.38.179
Jan  6 19:22:01 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  6 19:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  6 19:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 19:22:03 host sshd[11468]: Failed password for invalid user rexter from 212.68.38.179 port 36134 ssh2
Jan  6 19:22:03 host sshd[11468]: Received disconnect from 212.68.38.179 port 36134:11: Bye Bye [preauth]
Jan  6 19:22:03 host sshd[11468]: Disconnected from 212.68.38.179 port 36134 [preauth]
Jan  6 19:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 19:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  6 19:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 19:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 19:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  6 19:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 19:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 19:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  6 19:22:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 19:22:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 19:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  6 19:22:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 19:22:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 19:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  6 19:22:09 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  6 19:22:10 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  6 19:22:17 host sshd[11580]: Invalid user ubuntu from 182.93.7.194 port 38422
Jan  6 19:22:17 host sshd[11580]: input_userauth_request: invalid user ubuntu [preauth]
Jan  6 19:22:17 host sshd[11580]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 19:22:17 host sshd[11580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.93.7.194
Jan  6 19:22:19 host sshd[11580]: Failed password for invalid user ubuntu from 182.93.7.194 port 38422 ssh2
Jan  6 19:22:19 host sshd[11580]: Received disconnect from 182.93.7.194 port 38422:11: Bye Bye [preauth]
Jan  6 19:22:19 host sshd[11580]: Disconnected from 182.93.7.194 port 38422 [preauth]
Jan  6 19:23:14 host sshd[11798]: Invalid user teradata from 212.68.38.179 port 47752
Jan  6 19:23:14 host sshd[11798]: input_userauth_request: invalid user teradata [preauth]
Jan  6 19:23:14 host sshd[11798]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 19:23:14 host sshd[11798]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.68.38.179
Jan  6 19:23:16 host sshd[11798]: Failed password for invalid user teradata from 212.68.38.179 port 47752 ssh2
Jan  6 19:23:17 host sshd[11798]: Received disconnect from 212.68.38.179 port 47752:11: Bye Bye [preauth]
Jan  6 19:23:17 host sshd[11798]: Disconnected from 212.68.38.179 port 47752 [preauth]
Jan  6 19:23:27 host sshd[11866]: Invalid user admin from 190.210.182.179 port 37791
Jan  6 19:23:27 host sshd[11866]: input_userauth_request: invalid user admin [preauth]
Jan  6 19:23:27 host sshd[11866]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 19:23:27 host sshd[11866]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.210.182.179
Jan  6 19:23:30 host sshd[11866]: Failed password for invalid user admin from 190.210.182.179 port 37791 ssh2
Jan  6 19:23:30 host sshd[11866]: Received disconnect from 190.210.182.179 port 37791:11: Bye Bye [preauth]
Jan  6 19:23:30 host sshd[11866]: Disconnected from 190.210.182.179 port 37791 [preauth]
Jan  6 19:24:57 host sshd[12166]: Invalid user ubuntu from 37.47.245.95 port 6124
Jan  6 19:24:57 host sshd[12166]: input_userauth_request: invalid user ubuntu [preauth]
Jan  6 19:24:57 host sshd[12166]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 19:24:57 host sshd[12166]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.47.245.95
Jan  6 19:24:58 host sshd[12166]: Failed password for invalid user ubuntu from 37.47.245.95 port 6124 ssh2
Jan  6 19:24:58 host sshd[12166]: Received disconnect from 37.47.245.95 port 6124:11: Bye Bye [preauth]
Jan  6 19:24:58 host sshd[12166]: Disconnected from 37.47.245.95 port 6124 [preauth]
Jan  6 19:25:04 host sshd[12203]: Invalid user adminuser from 190.210.182.179 port 51460
Jan  6 19:25:04 host sshd[12203]: input_userauth_request: invalid user adminuser [preauth]
Jan  6 19:25:04 host sshd[12203]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 19:25:04 host sshd[12203]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.210.182.179
Jan  6 19:25:06 host sshd[12203]: Failed password for invalid user adminuser from 190.210.182.179 port 51460 ssh2
Jan  6 19:25:07 host sshd[12203]: Received disconnect from 190.210.182.179 port 51460:11: Bye Bye [preauth]
Jan  6 19:25:07 host sshd[12203]: Disconnected from 190.210.182.179 port 51460 [preauth]
Jan  6 19:27:44 host sshd[12847]: Invalid user kwx from 37.47.245.95 port 6828
Jan  6 19:27:44 host sshd[12847]: input_userauth_request: invalid user kwx [preauth]
Jan  6 19:27:44 host sshd[12847]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 19:27:44 host sshd[12847]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.47.245.95
Jan  6 19:27:46 host sshd[12847]: Failed password for invalid user kwx from 37.47.245.95 port 6828 ssh2
Jan  6 19:27:46 host sshd[12847]: Received disconnect from 37.47.245.95 port 6828:11: Bye Bye [preauth]
Jan  6 19:27:46 host sshd[12847]: Disconnected from 37.47.245.95 port 6828 [preauth]
Jan  6 19:29:02 host sshd[13005]: Invalid user liyou from 37.47.245.95 port 28596
Jan  6 19:29:02 host sshd[13005]: input_userauth_request: invalid user liyou [preauth]
Jan  6 19:29:02 host sshd[13005]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 19:29:02 host sshd[13005]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.47.245.95
Jan  6 19:29:04 host sshd[13005]: Failed password for invalid user liyou from 37.47.245.95 port 28596 ssh2
Jan  6 19:29:05 host sshd[13005]: Received disconnect from 37.47.245.95 port 28596:11: Bye Bye [preauth]
Jan  6 19:29:05 host sshd[13005]: Disconnected from 37.47.245.95 port 28596 [preauth]
Jan  6 20:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  6 20:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 20:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 20:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  6 20:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 20:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 20:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  6 20:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 20:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 20:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  6 20:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 20:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 20:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  6 20:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 20:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 20:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  6 20:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 20:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 20:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  6 20:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 20:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 20:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  6 20:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 20:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 20:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  6 20:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 20:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 20:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  6 20:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 20:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 20:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  6 20:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 20:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 20:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  6 20:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 20:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 20:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  6 20:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 20:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 20:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=wwwresourcehunte user-3=keralaholi user-4=wwwrmswll user-5=ugotscom user-6=travelboniface user-7=wwwkaretakers user-8=cochintaxi user-9=laundryboniface user-10=a2zgroup user-11=dartsimp user-12=straightcurve user-13=wwwletsstalkfood user-14=bonifacegroup user-15=wwwevmhonda user-16=mrsclean user-17=wwwnexidigital user-18=palco123 user-19=gifterman user-20=kottayamcalldriv user-21=phmetals user-22=woodpeck user-23=wwwkapin user-24=wwwkmaorg user-25=disposeat user-26=remysagr user-27=pmcresources user-28=vfmassets user-29=shalinijames user-30=wwwtestugo feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  6 20:21:54 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  6 20:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 20:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 20:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  6 20:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 20:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 20:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-gmlGkQ33K1tD0JIE.~
Jan  6 20:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 20:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 20:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-gmlGkQ33K1tD0JIE.~'
Jan  6 20:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 20:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 20:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-gmlGkQ33K1tD0JIE.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  6 20:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 20:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 20:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  6 20:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 20:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 20:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  6 20:21:55 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 20:21:55 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 20:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  6 20:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 20:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 20:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  6 20:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 20:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 20:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  6 20:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 20:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 20:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  6 20:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 20:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 20:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  6 20:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 20:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 20:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  6 20:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  6 20:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  6 20:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  6 20:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  6 20:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  6 20:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  6 20:22:00 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  6 20:22:02 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  6 20:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  6 20:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 20:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 20:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  6 20:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 20:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 20:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  6 20:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 20:22:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 20:22:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  6 20:22:12 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 20:22:13 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 20:22:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  6 20:22:13 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 20:22:14 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 20:22:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  6 20:22:15 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  6 20:22:16 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  6 21:14:30 host sshd[30305]: Invalid user samba from 141.94.106.15 port 60410
Jan  6 21:14:30 host sshd[30305]: input_userauth_request: invalid user samba [preauth]
Jan  6 21:14:30 host sshd[30305]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 21:14:30 host sshd[30305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.94.106.15
Jan  6 21:14:31 host sshd[30305]: Failed password for invalid user samba from 141.94.106.15 port 60410 ssh2
Jan  6 21:14:32 host sshd[30305]: Received disconnect from 141.94.106.15 port 60410:11: Bye Bye [preauth]
Jan  6 21:14:32 host sshd[30305]: Disconnected from 141.94.106.15 port 60410 [preauth]
Jan  6 21:15:17 host sshd[30386]: Invalid user workshop from 202.56.232.54 port 37269
Jan  6 21:15:17 host sshd[30386]: input_userauth_request: invalid user workshop [preauth]
Jan  6 21:15:17 host sshd[30386]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 21:15:17 host sshd[30386]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.56.232.54
Jan  6 21:15:18 host sshd[30386]: Failed password for invalid user workshop from 202.56.232.54 port 37269 ssh2
Jan  6 21:15:18 host sshd[30386]: Received disconnect from 202.56.232.54 port 37269:11: Bye Bye [preauth]
Jan  6 21:15:18 host sshd[30386]: Disconnected from 202.56.232.54 port 37269 [preauth]
Jan  6 21:15:59 host sshd[30569]: Invalid user admin from 83.169.7.212 port 42016
Jan  6 21:15:59 host sshd[30569]: input_userauth_request: invalid user admin [preauth]
Jan  6 21:15:59 host sshd[30569]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 21:15:59 host sshd[30569]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.169.7.212
Jan  6 21:16:01 host sshd[30569]: Failed password for invalid user admin from 83.169.7.212 port 42016 ssh2
Jan  6 21:16:01 host sshd[30569]: Received disconnect from 83.169.7.212 port 42016:11: Bye Bye [preauth]
Jan  6 21:16:01 host sshd[30569]: Disconnected from 83.169.7.212 port 42016 [preauth]
Jan  6 21:16:18 host sshd[30588]: Invalid user ywyoon from 13.94.100.51 port 40070
Jan  6 21:16:18 host sshd[30588]: input_userauth_request: invalid user ywyoon [preauth]
Jan  6 21:16:18 host sshd[30588]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 21:16:18 host sshd[30588]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.94.100.51
Jan  6 21:16:20 host sshd[30588]: Failed password for invalid user ywyoon from 13.94.100.51 port 40070 ssh2
Jan  6 21:16:23 host sshd[30588]: Received disconnect from 13.94.100.51 port 40070:11: Bye Bye [preauth]
Jan  6 21:16:23 host sshd[30588]: Disconnected from 13.94.100.51 port 40070 [preauth]
Jan  6 21:16:52 host sshd[30670]: Invalid user admin from 143.198.104.206 port 52356
Jan  6 21:16:52 host sshd[30670]: input_userauth_request: invalid user admin [preauth]
Jan  6 21:16:52 host sshd[30670]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 21:16:52 host sshd[30670]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.104.206
Jan  6 21:16:53 host sshd[30670]: Failed password for invalid user admin from 143.198.104.206 port 52356 ssh2
Jan  6 21:16:54 host sshd[30670]: Received disconnect from 143.198.104.206 port 52356:11: Bye Bye [preauth]
Jan  6 21:16:54 host sshd[30670]: Disconnected from 143.198.104.206 port 52356 [preauth]
Jan  6 21:19:27 host sshd[30985]: Invalid user ubuntu from 167.99.68.65 port 50130
Jan  6 21:19:27 host sshd[30985]: input_userauth_request: invalid user ubuntu [preauth]
Jan  6 21:19:27 host sshd[30985]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 21:19:27 host sshd[30985]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.68.65
Jan  6 21:19:30 host sshd[30985]: Failed password for invalid user ubuntu from 167.99.68.65 port 50130 ssh2
Jan  6 21:19:30 host sshd[30985]: Received disconnect from 167.99.68.65 port 50130:11: Bye Bye [preauth]
Jan  6 21:19:30 host sshd[30985]: Disconnected from 167.99.68.65 port 50130 [preauth]
Jan  6 21:20:31 host sshd[31108]: Invalid user nortje from 141.94.106.15 port 52842
Jan  6 21:20:31 host sshd[31108]: input_userauth_request: invalid user nortje [preauth]
Jan  6 21:20:31 host sshd[31108]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 21:20:31 host sshd[31108]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.94.106.15
Jan  6 21:20:33 host sshd[31108]: Failed password for invalid user nortje from 141.94.106.15 port 52842 ssh2
Jan  6 21:20:33 host sshd[31108]: Received disconnect from 141.94.106.15 port 52842:11: Bye Bye [preauth]
Jan  6 21:20:33 host sshd[31108]: Disconnected from 141.94.106.15 port 52842 [preauth]
Jan  6 21:20:44 host sshd[31125]: Invalid user rachel from 143.198.104.206 port 42224
Jan  6 21:20:44 host sshd[31125]: input_userauth_request: invalid user rachel [preauth]
Jan  6 21:20:44 host sshd[31125]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 21:20:44 host sshd[31125]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.104.206
Jan  6 21:20:46 host sshd[31125]: Failed password for invalid user rachel from 143.198.104.206 port 42224 ssh2
Jan  6 21:20:46 host sshd[31125]: Received disconnect from 143.198.104.206 port 42224:11: Bye Bye [preauth]
Jan  6 21:20:46 host sshd[31125]: Disconnected from 143.198.104.206 port 42224 [preauth]
Jan  6 21:21:39 host sshd[31357]: Invalid user john from 141.94.106.15 port 52510
Jan  6 21:21:39 host sshd[31357]: input_userauth_request: invalid user john [preauth]
Jan  6 21:21:39 host sshd[31357]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 21:21:39 host sshd[31357]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.94.106.15
Jan  6 21:21:41 host sshd[31357]: Failed password for invalid user john from 141.94.106.15 port 52510 ssh2
Jan  6 21:21:41 host sshd[31357]: Received disconnect from 141.94.106.15 port 52510:11: Bye Bye [preauth]
Jan  6 21:21:41 host sshd[31357]: Disconnected from 141.94.106.15 port 52510 [preauth]
Jan  6 21:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  6 21:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 21:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 21:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  6 21:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 21:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 21:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  6 21:21:52 host sshd[31416]: Invalid user ubuntu from 143.198.104.206 port 41812
Jan  6 21:21:52 host sshd[31416]: input_userauth_request: invalid user ubuntu [preauth]
Jan  6 21:21:52 host sshd[31416]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 21:21:52 host sshd[31416]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.104.206
Jan  6 21:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 21:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 21:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  6 21:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 21:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 21:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  6 21:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 21:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 21:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  6 21:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 21:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 21:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  6 21:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 21:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 21:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  6 21:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 21:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 21:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  6 21:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 21:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 21:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  6 21:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 21:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 21:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  6 21:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 21:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 21:21:54 host sshd[31416]: Failed password for invalid user ubuntu from 143.198.104.206 port 41812 ssh2
Jan  6 21:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  6 21:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 21:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 21:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  6 21:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 21:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 21:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=wwwrmswll user-3=wwwresourcehunte user-4=keralaholi user-5=ugotscom user-6=travelboniface user-7=wwwkaretakers user-8=cochintaxi user-9=laundryboniface user-10=dartsimp user-11=a2zgroup user-12=wwwletsstalkfood user-13=straightcurve user-14=bonifacegroup user-15=wwwevmhonda user-16=wwwnexidigital user-17=mrsclean user-18=gifterman user-19=palco123 user-20=kottayamcalldriv user-21=phmetals user-22=wwwkapin user-23=woodpeck user-24=remysagr user-25=disposeat user-26=wwwkmaorg user-27=pmcresources user-28=vfmassets user-29=wwwtestugo user-30=shalinijames feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  6 21:21:54 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  6 21:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 21:21:54 host sshd[31416]: Received disconnect from 143.198.104.206 port 41812:11: Bye Bye [preauth]
Jan  6 21:21:54 host sshd[31416]: Disconnected from 143.198.104.206 port 41812 [preauth]
Jan  6 21:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 21:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  6 21:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 21:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 21:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-bj5I93oW2p1Zk4J4.~
Jan  6 21:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 21:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 21:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-bj5I93oW2p1Zk4J4.~'
Jan  6 21:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 21:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 21:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-bj5I93oW2p1Zk4J4.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  6 21:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 21:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 21:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  6 21:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 21:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 21:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  6 21:21:55 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 21:21:55 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 21:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  6 21:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 21:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 21:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  6 21:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 21:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 21:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  6 21:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 21:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 21:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  6 21:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 21:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 21:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  6 21:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 21:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 21:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  6 21:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  6 21:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  6 21:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  6 21:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  6 21:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  6 21:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  6 21:22:02 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  6 21:22:04 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  6 21:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  6 21:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 21:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 21:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  6 21:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 21:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 21:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  6 21:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 21:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 21:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  6 21:22:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 21:22:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 21:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  6 21:22:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 21:22:15 host sshd[31694]: Invalid user govindsm from 167.99.68.65 port 54726
Jan  6 21:22:15 host sshd[31694]: input_userauth_request: invalid user govindsm [preauth]
Jan  6 21:22:15 host sshd[31694]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 21:22:15 host sshd[31694]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.68.65
Jan  6 21:22:15 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 21:22:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  6 21:22:16 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  6 21:22:16 host sshd[31694]: Failed password for invalid user govindsm from 167.99.68.65 port 54726 ssh2
Jan  6 21:22:16 host sshd[31694]: Received disconnect from 167.99.68.65 port 54726:11: Bye Bye [preauth]
Jan  6 21:22:16 host sshd[31694]: Disconnected from 167.99.68.65 port 54726 [preauth]
Jan  6 21:22:22 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  6 21:23:26 host sshd[31857]: Invalid user mazheng from 167.99.68.65 port 49294
Jan  6 21:23:26 host sshd[31857]: input_userauth_request: invalid user mazheng [preauth]
Jan  6 21:23:26 host sshd[31857]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 21:23:26 host sshd[31857]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.68.65
Jan  6 21:23:28 host sshd[31857]: Failed password for invalid user mazheng from 167.99.68.65 port 49294 ssh2
Jan  6 21:23:28 host sshd[31857]: Received disconnect from 167.99.68.65 port 49294:11: Bye Bye [preauth]
Jan  6 21:23:28 host sshd[31857]: Disconnected from 167.99.68.65 port 49294 [preauth]
Jan  6 21:24:47 host sshd[32020]: Invalid user rusdi from 83.169.7.212 port 59834
Jan  6 21:24:47 host sshd[32020]: input_userauth_request: invalid user rusdi [preauth]
Jan  6 21:24:47 host sshd[32020]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 21:24:47 host sshd[32020]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.169.7.212
Jan  6 21:24:50 host sshd[32020]: Failed password for invalid user rusdi from 83.169.7.212 port 59834 ssh2
Jan  6 21:24:50 host sshd[32020]: Received disconnect from 83.169.7.212 port 59834:11: Bye Bye [preauth]
Jan  6 21:24:50 host sshd[32020]: Disconnected from 83.169.7.212 port 59834 [preauth]
Jan  6 21:25:23 host sshd[32093]: Invalid user ap from 194.110.203.109 port 42856
Jan  6 21:25:23 host sshd[32093]: input_userauth_request: invalid user ap [preauth]
Jan  6 21:25:23 host sshd[32093]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 21:25:23 host sshd[32093]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109
Jan  6 21:25:25 host sshd[32093]: Failed password for invalid user ap from 194.110.203.109 port 42856 ssh2
Jan  6 21:25:29 host sshd[32093]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 21:25:31 host sshd[32093]: Failed password for invalid user ap from 194.110.203.109 port 42856 ssh2
Jan  6 21:25:34 host sshd[32093]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 21:25:37 host sshd[32093]: Failed password for invalid user ap from 194.110.203.109 port 42856 ssh2
Jan  6 21:25:40 host sshd[32093]: Connection closed by 194.110.203.109 port 42856 [preauth]
Jan  6 21:25:40 host sshd[32093]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109
Jan  6 21:26:34 host sshd[32268]: Invalid user nortje from 83.169.7.212 port 60284
Jan  6 21:26:34 host sshd[32268]: input_userauth_request: invalid user nortje [preauth]
Jan  6 21:26:34 host sshd[32268]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 21:26:34 host sshd[32268]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.169.7.212
Jan  6 21:26:36 host sshd[32268]: Failed password for invalid user nortje from 83.169.7.212 port 60284 ssh2
Jan  6 21:26:36 host sshd[32268]: Received disconnect from 83.169.7.212 port 60284:11: Bye Bye [preauth]
Jan  6 21:26:36 host sshd[32268]: Disconnected from 83.169.7.212 port 60284 [preauth]
Jan  6 21:30:11 host sshd[375]: Connection reset by 13.94.100.51 port 38516 [preauth]
Jan  6 21:38:49 host sshd[1649]: Invalid user workshop from 13.94.100.51 port 37282
Jan  6 21:38:49 host sshd[1649]: input_userauth_request: invalid user workshop [preauth]
Jan  6 21:38:49 host sshd[1649]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 21:38:49 host sshd[1649]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.94.100.51
Jan  6 21:38:51 host sshd[1649]: Failed password for invalid user workshop from 13.94.100.51 port 37282 ssh2
Jan  6 21:38:54 host sshd[1649]: Received disconnect from 13.94.100.51 port 37282:11: Bye Bye [preauth]
Jan  6 21:38:54 host sshd[1649]: Disconnected from 13.94.100.51 port 37282 [preauth]
Jan  6 21:46:37 host sshd[3307]: Invalid user admin from 13.94.100.51 port 36640
Jan  6 21:46:37 host sshd[3307]: input_userauth_request: invalid user admin [preauth]
Jan  6 21:46:37 host sshd[3307]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 21:46:37 host sshd[3307]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.94.100.51
Jan  6 21:46:38 host sshd[3307]: Failed password for invalid user admin from 13.94.100.51 port 36640 ssh2
Jan  6 22:03:59 host sshd[5935]: Invalid user admin from 196.46.63.194 port 37720
Jan  6 22:03:59 host sshd[5935]: input_userauth_request: invalid user admin [preauth]
Jan  6 22:03:59 host sshd[5935]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 22:03:59 host sshd[5935]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.46.63.194
Jan  6 22:04:01 host sshd[5935]: Failed password for invalid user admin from 196.46.63.194 port 37720 ssh2
Jan  6 22:04:01 host sshd[5935]: Received disconnect from 196.46.63.194 port 37720:11: Bye Bye [preauth]
Jan  6 22:04:01 host sshd[5935]: Disconnected from 196.46.63.194 port 37720 [preauth]
Jan  6 22:05:49 host sshd[6209]: Did not receive identification string from 167.71.166.243 port 38456
Jan  6 22:08:18 host sshd[6660]: Invalid user mk from 196.46.63.194 port 60595
Jan  6 22:08:18 host sshd[6660]: input_userauth_request: invalid user mk [preauth]
Jan  6 22:08:18 host sshd[6660]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 22:08:18 host sshd[6660]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.46.63.194
Jan  6 22:08:20 host sshd[6660]: Failed password for invalid user mk from 196.46.63.194 port 60595 ssh2
Jan  6 22:08:21 host sshd[6660]: Received disconnect from 196.46.63.194 port 60595:11: Bye Bye [preauth]
Jan  6 22:08:21 host sshd[6660]: Disconnected from 196.46.63.194 port 60595 [preauth]
Jan  6 22:10:07 host sshd[6857]: Invalid user super from 196.46.63.194 port 46306
Jan  6 22:10:07 host sshd[6857]: input_userauth_request: invalid user super [preauth]
Jan  6 22:10:07 host sshd[6857]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 22:10:07 host sshd[6857]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.46.63.194
Jan  6 22:10:08 host sshd[6857]: Failed password for invalid user super from 196.46.63.194 port 46306 ssh2
Jan  6 22:10:09 host sshd[6857]: Received disconnect from 196.46.63.194 port 46306:11: Bye Bye [preauth]
Jan  6 22:10:09 host sshd[6857]: Disconnected from 196.46.63.194 port 46306 [preauth]
Jan  6 22:16:40 host sshd[7749]: Connection closed by 167.71.166.243 port 60426 [preauth]
Jan  6 22:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  6 22:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 22:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 22:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  6 22:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 22:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 22:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  6 22:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 22:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 22:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  6 22:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 22:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 22:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  6 22:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 22:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 22:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  6 22:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 22:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 22:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  6 22:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 22:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 22:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  6 22:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 22:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 22:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  6 22:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 22:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 22:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  6 22:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 22:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 22:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  6 22:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 22:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 22:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  6 22:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 22:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 22:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  6 22:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 22:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 22:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=laundryboniface user-2=a2zgroup user-3=dartsimp user-4=wwwkaretakers user-5=cochintaxi user-6=ugotscom user-7=wwwresourcehunte user-8=keralaholi user-9=wwwrmswll user-10=travelboniface user-11=wwwpmcresource user-12=pmcresources user-13=shalinijames user-14=wwwtestugo user-15=vfmassets user-16=woodpeck user-17=wwwkapin user-18=disposeat user-19=remysagr user-20=wwwkmaorg user-21=wwwnexidigital user-22=mrsclean user-23=kottayamcalldriv user-24=phmetals user-25=palco123 user-26=gifterman user-27=wwwletsstalkfood user-28=straightcurve user-29=wwwevmhonda user-30=bonifacegroup feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  6 22:21:54 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  6 22:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 22:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 22:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  6 22:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 22:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 22:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-OJpg7WFXG2qdoM1c.~
Jan  6 22:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 22:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 22:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-OJpg7WFXG2qdoM1c.~'
Jan  6 22:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 22:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 22:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-OJpg7WFXG2qdoM1c.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  6 22:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 22:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 22:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  6 22:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 22:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 22:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  6 22:21:55 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 22:21:55 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 22:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  6 22:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 22:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 22:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  6 22:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 22:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 22:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  6 22:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 22:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 22:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  6 22:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 22:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 22:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  6 22:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 22:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 22:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  6 22:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  6 22:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  6 22:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  6 22:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  6 22:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  6 22:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  6 22:21:59 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  6 22:22:01 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  6 22:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  6 22:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 22:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 22:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  6 22:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 22:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 22:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  6 22:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 22:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 22:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  6 22:22:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 22:22:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 22:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  6 22:22:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 22:22:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 22:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  6 22:22:09 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  6 22:22:10 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  6 22:26:03 host sshd[9278]: Invalid user zhangjun from 103.226.248.146 port 38078
Jan  6 22:26:03 host sshd[9278]: input_userauth_request: invalid user zhangjun [preauth]
Jan  6 22:26:03 host sshd[9278]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 22:26:03 host sshd[9278]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.226.248.146
Jan  6 22:26:05 host sshd[9278]: Failed password for invalid user zhangjun from 103.226.248.146 port 38078 ssh2
Jan  6 22:26:05 host sshd[9278]: Received disconnect from 103.226.248.146 port 38078:11: Bye Bye [preauth]
Jan  6 22:26:05 host sshd[9278]: Disconnected from 103.226.248.146 port 38078 [preauth]
Jan  6 22:28:38 host sshd[9652]: Invalid user luoyongheng from 103.226.248.146 port 44116
Jan  6 22:28:38 host sshd[9652]: input_userauth_request: invalid user luoyongheng [preauth]
Jan  6 22:28:38 host sshd[9652]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 22:28:38 host sshd[9652]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.226.248.146
Jan  6 22:28:40 host sshd[9652]: Failed password for invalid user luoyongheng from 103.226.248.146 port 44116 ssh2
Jan  6 22:28:40 host sshd[9652]: Received disconnect from 103.226.248.146 port 44116:11: Bye Bye [preauth]
Jan  6 22:28:40 host sshd[9652]: Disconnected from 103.226.248.146 port 44116 [preauth]
Jan  6 22:30:08 host sshd[9829]: Invalid user mabelita from 103.226.248.146 port 43928
Jan  6 22:30:08 host sshd[9829]: input_userauth_request: invalid user mabelita [preauth]
Jan  6 22:30:08 host sshd[9829]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 22:30:08 host sshd[9829]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.226.248.146
Jan  6 22:30:10 host sshd[9829]: Failed password for invalid user mabelita from 103.226.248.146 port 43928 ssh2
Jan  6 22:30:11 host sshd[9829]: Received disconnect from 103.226.248.146 port 43928:11: Bye Bye [preauth]
Jan  6 22:30:11 host sshd[9829]: Disconnected from 103.226.248.146 port 43928 [preauth]
Jan  6 22:56:18 host sshd[13321]: Did not receive identification string from 130.61.232.86 port 57562
Jan  6 22:58:49 host sshd[13590]: Invalid user may from 130.61.232.86 port 40072
Jan  6 22:58:49 host sshd[13590]: input_userauth_request: invalid user may [preauth]
Jan  6 22:58:49 host sshd[13590]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 22:58:49 host sshd[13590]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.61.232.86
Jan  6 22:58:51 host sshd[13590]: Failed password for invalid user may from 130.61.232.86 port 40072 ssh2
Jan  6 22:58:51 host sshd[13590]: Received disconnect from 130.61.232.86 port 40072:11: Bye Bye [preauth]
Jan  6 22:58:51 host sshd[13590]: Disconnected from 130.61.232.86 port 40072 [preauth]
Jan  6 23:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  6 23:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 23:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 23:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  6 23:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 23:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 23:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  6 23:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 23:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 23:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  6 23:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 23:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 23:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  6 23:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 23:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 23:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  6 23:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 23:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 23:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  6 23:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 23:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 23:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  6 23:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 23:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 23:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  6 23:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 23:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 23:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  6 23:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 23:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 23:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  6 23:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 23:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 23:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  6 23:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 23:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 23:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  6 23:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 23:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 23:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkaretakers user-2=cochintaxi user-3=dartsimp user-4=a2zgroup user-5=laundryboniface user-6=wwwpmcresource user-7=travelboniface user-8=wwwrmswll user-9=keralaholi user-10=wwwresourcehunte user-11=ugotscom user-12=disposeat user-13=remysagr user-14=wwwkmaorg user-15=woodpeck user-16=wwwkapin user-17=vfmassets user-18=wwwtestugo user-19=shalinijames user-20=pmcresources user-21=bonifacegroup user-22=wwwevmhonda user-23=straightcurve user-24=wwwletsstalkfood user-25=gifterman user-26=palco123 user-27=phmetals user-28=kottayamcalldriv user-29=mrsclean user-30=wwwnexidigital feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  6 23:21:54 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  6 23:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 23:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 23:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  6 23:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 23:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 23:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ncMdei3iOnXISvQS.~
Jan  6 23:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 23:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 23:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ncMdei3iOnXISvQS.~'
Jan  6 23:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 23:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 23:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ncMdei3iOnXISvQS.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  6 23:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 23:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 23:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  6 23:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 23:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 23:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  6 23:21:55 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 23:21:55 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 23:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  6 23:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 23:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 23:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  6 23:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 23:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 23:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  6 23:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 23:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 23:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  6 23:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 23:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 23:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  6 23:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  6 23:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  6 23:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  6 23:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  6 23:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  6 23:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  6 23:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  6 23:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  6 23:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  6 23:21:59 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  6 23:22:01 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  6 23:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  6 23:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 23:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 23:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  6 23:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 23:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 23:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  6 23:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  6 23:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  6 23:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  6 23:22:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 23:22:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 23:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  6 23:22:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  6 23:22:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  6 23:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  6 23:22:08 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  6 23:22:09 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  6 23:44:11 host sshd[24111]: Invalid user admin from 114.145.186.3 port 37981
Jan  6 23:44:11 host sshd[24111]: input_userauth_request: invalid user admin [preauth]
Jan  6 23:44:11 host sshd[24111]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 23:44:11 host sshd[24111]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.145.186.3
Jan  6 23:44:14 host sshd[24111]: Failed password for invalid user admin from 114.145.186.3 port 37981 ssh2
Jan  6 23:44:14 host sshd[24111]: Connection closed by 114.145.186.3 port 37981 [preauth]
Jan  6 23:55:05 host sshd[27354]: Invalid user willie from 107.189.30.59 port 44964
Jan  6 23:55:05 host sshd[27354]: input_userauth_request: invalid user willie [preauth]
Jan  6 23:55:05 host sshd[27354]: pam_unix(sshd:auth): check pass; user unknown
Jan  6 23:55:05 host sshd[27354]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59
Jan  6 23:55:07 host sshd[27354]: Failed password for invalid user willie from 107.189.30.59 port 44964 ssh2
Jan  6 23:55:08 host sshd[27354]: Connection closed by 107.189.30.59 port 44964 [preauth]
Jan  7 00:04:16 host sshd[29981]: Invalid user sina from 94.50.162.146 port 37670
Jan  7 00:04:16 host sshd[29981]: input_userauth_request: invalid user sina [preauth]
Jan  7 00:04:16 host sshd[29981]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 00:04:16 host sshd[29981]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.50.162.146
Jan  7 00:04:18 host sshd[29981]: Failed password for invalid user sina from 94.50.162.146 port 37670 ssh2
Jan  7 00:04:18 host sshd[29981]: Received disconnect from 94.50.162.146 port 37670:11: Bye Bye [preauth]
Jan  7 00:04:18 host sshd[29981]: Disconnected from 94.50.162.146 port 37670 [preauth]
Jan  7 00:04:26 host sshd[30000]: Invalid user xrdp from 209.141.34.86 port 52142
Jan  7 00:04:26 host sshd[30000]: input_userauth_request: invalid user xrdp [preauth]
Jan  7 00:04:26 host sshd[30000]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 00:04:26 host sshd[30000]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.34.86
Jan  7 00:04:29 host sshd[30000]: Failed password for invalid user xrdp from 209.141.34.86 port 52142 ssh2
Jan  7 00:04:29 host sshd[30000]: Received disconnect from 209.141.34.86 port 52142:11: Bye Bye [preauth]
Jan  7 00:04:29 host sshd[30000]: Disconnected from 209.141.34.86 port 52142 [preauth]
Jan  7 00:05:00 host sshd[30074]: Invalid user tsserver from 171.118.209.174 port 49350
Jan  7 00:05:00 host sshd[30074]: input_userauth_request: invalid user tsserver [preauth]
Jan  7 00:05:00 host sshd[30074]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 00:05:00 host sshd[30074]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.118.209.174
Jan  7 00:05:02 host sshd[30074]: Failed password for invalid user tsserver from 171.118.209.174 port 49350 ssh2
Jan  7 00:05:02 host sshd[30074]: Received disconnect from 171.118.209.174 port 49350:11: Bye Bye [preauth]
Jan  7 00:05:02 host sshd[30074]: Disconnected from 171.118.209.174 port 49350 [preauth]
Jan  7 00:05:17 host sshd[30133]: Invalid user admin from 143.198.198.92 port 36042
Jan  7 00:05:17 host sshd[30133]: input_userauth_request: invalid user admin [preauth]
Jan  7 00:05:17 host sshd[30133]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 00:05:17 host sshd[30133]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.198.92
Jan  7 00:05:19 host sshd[30133]: Failed password for invalid user admin from 143.198.198.92 port 36042 ssh2
Jan  7 00:05:19 host sshd[30133]: Received disconnect from 143.198.198.92 port 36042:11: Bye Bye [preauth]
Jan  7 00:05:19 host sshd[30133]: Disconnected from 143.198.198.92 port 36042 [preauth]
Jan  7 00:05:40 host sshd[30242]: Invalid user admin from 98.243.72.196 port 39644
Jan  7 00:05:40 host sshd[30242]: input_userauth_request: invalid user admin [preauth]
Jan  7 00:05:40 host sshd[30242]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 00:05:40 host sshd[30242]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.243.72.196
Jan  7 00:05:42 host sshd[30242]: Failed password for invalid user admin from 98.243.72.196 port 39644 ssh2
Jan  7 00:05:42 host sshd[30242]: Received disconnect from 98.243.72.196 port 39644:11: Bye Bye [preauth]
Jan  7 00:05:42 host sshd[30242]: Disconnected from 98.243.72.196 port 39644 [preauth]
Jan  7 00:05:50 host sshd[30288]: Invalid user tim from 150.95.115.28 port 36294
Jan  7 00:05:50 host sshd[30288]: input_userauth_request: invalid user tim [preauth]
Jan  7 00:05:50 host sshd[30288]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 00:05:50 host sshd[30288]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.95.115.28
Jan  7 00:05:51 host sshd[30288]: Failed password for invalid user tim from 150.95.115.28 port 36294 ssh2
Jan  7 00:05:51 host sshd[30288]: Received disconnect from 150.95.115.28 port 36294:11: Bye Bye [preauth]
Jan  7 00:05:51 host sshd[30288]: Disconnected from 150.95.115.28 port 36294 [preauth]
Jan  7 00:06:04 host sshd[30376]: Invalid user bist from 112.213.124.252 port 43690
Jan  7 00:06:04 host sshd[30376]: input_userauth_request: invalid user bist [preauth]
Jan  7 00:06:04 host sshd[30376]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 00:06:04 host sshd[30376]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.213.124.252
Jan  7 00:06:06 host sshd[30376]: Failed password for invalid user bist from 112.213.124.252 port 43690 ssh2
Jan  7 00:06:06 host sshd[30376]: Received disconnect from 112.213.124.252 port 43690:11: Bye Bye [preauth]
Jan  7 00:06:06 host sshd[30376]: Disconnected from 112.213.124.252 port 43690 [preauth]
Jan  7 00:06:13 host sshd[30412]: Invalid user identd from 164.92.116.59 port 42466
Jan  7 00:06:13 host sshd[30412]: input_userauth_request: invalid user identd [preauth]
Jan  7 00:06:13 host sshd[30412]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 00:06:13 host sshd[30412]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.116.59
Jan  7 00:06:14 host sshd[30412]: Failed password for invalid user identd from 164.92.116.59 port 42466 ssh2
Jan  7 00:06:15 host sshd[30412]: Received disconnect from 164.92.116.59 port 42466:11: Bye Bye [preauth]
Jan  7 00:06:15 host sshd[30412]: Disconnected from 164.92.116.59 port 42466 [preauth]
Jan  7 00:06:44 host sshd[30577]: Invalid user bist from 165.232.186.196 port 56361
Jan  7 00:06:44 host sshd[30577]: input_userauth_request: invalid user bist [preauth]
Jan  7 00:06:44 host sshd[30577]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 00:06:44 host sshd[30577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.186.196
Jan  7 00:06:45 host sshd[30577]: Failed password for invalid user bist from 165.232.186.196 port 56361 ssh2
Jan  7 00:06:45 host sshd[30577]: Received disconnect from 165.232.186.196 port 56361:11: Bye Bye [preauth]
Jan  7 00:06:45 host sshd[30577]: Disconnected from 165.232.186.196 port 56361 [preauth]
Jan  7 00:07:06 host sshd[30696]: Invalid user ubuntu from 43.156.60.74 port 44300
Jan  7 00:07:06 host sshd[30696]: input_userauth_request: invalid user ubuntu [preauth]
Jan  7 00:07:06 host sshd[30696]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 00:07:06 host sshd[30696]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.60.74
Jan  7 00:07:07 host sshd[30696]: Failed password for invalid user ubuntu from 43.156.60.74 port 44300 ssh2
Jan  7 00:07:07 host sshd[30696]: Received disconnect from 43.156.60.74 port 44300:11: Bye Bye [preauth]
Jan  7 00:07:07 host sshd[30696]: Disconnected from 43.156.60.74 port 44300 [preauth]
Jan  7 00:08:24 host sshd[31195]: Invalid user worker from 35.200.141.182 port 51088
Jan  7 00:08:24 host sshd[31195]: input_userauth_request: invalid user worker [preauth]
Jan  7 00:08:24 host sshd[31195]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 00:08:24 host sshd[31195]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.200.141.182
Jan  7 00:08:26 host sshd[31195]: Failed password for invalid user worker from 35.200.141.182 port 51088 ssh2
Jan  7 00:08:26 host sshd[31195]: Received disconnect from 35.200.141.182 port 51088:11: Bye Bye [preauth]
Jan  7 00:08:26 host sshd[31195]: Disconnected from 35.200.141.182 port 51088 [preauth]
Jan  7 00:08:37 host sshd[31278]: Invalid user admin from 139.99.135.239 port 55828
Jan  7 00:08:37 host sshd[31278]: input_userauth_request: invalid user admin [preauth]
Jan  7 00:08:37 host sshd[31278]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 00:08:37 host sshd[31278]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.135.239
Jan  7 00:08:38 host sshd[31284]: Invalid user brand from 159.223.74.73 port 58982
Jan  7 00:08:38 host sshd[31284]: input_userauth_request: invalid user brand [preauth]
Jan  7 00:08:38 host sshd[31284]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 00:08:38 host sshd[31284]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.223.74.73
Jan  7 00:08:39 host sshd[31278]: Failed password for invalid user admin from 139.99.135.239 port 55828 ssh2
Jan  7 00:08:39 host sshd[31278]: Received disconnect from 139.99.135.239 port 55828:11: Bye Bye [preauth]
Jan  7 00:08:39 host sshd[31278]: Disconnected from 139.99.135.239 port 55828 [preauth]
Jan  7 00:08:40 host sshd[31284]: Failed password for invalid user brand from 159.223.74.73 port 58982 ssh2
Jan  7 00:08:40 host sshd[31284]: Received disconnect from 159.223.74.73 port 58982:11: Bye Bye [preauth]
Jan  7 00:08:40 host sshd[31284]: Disconnected from 159.223.74.73 port 58982 [preauth]
Jan  7 00:08:55 host sshd[31380]: Invalid user ubuntu from 34.64.76.187 port 50398
Jan  7 00:08:55 host sshd[31380]: input_userauth_request: invalid user ubuntu [preauth]
Jan  7 00:08:55 host sshd[31380]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 00:08:55 host sshd[31380]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.64.76.187
Jan  7 00:08:57 host sshd[31380]: Failed password for invalid user ubuntu from 34.64.76.187 port 50398 ssh2
Jan  7 00:08:58 host sshd[31380]: Received disconnect from 34.64.76.187 port 50398:11: Bye Bye [preauth]
Jan  7 00:08:58 host sshd[31380]: Disconnected from 34.64.76.187 port 50398 [preauth]
Jan  7 00:08:58 host sshd[31398]: Invalid user kuba from 139.59.101.141 port 41578
Jan  7 00:08:58 host sshd[31398]: input_userauth_request: invalid user kuba [preauth]
Jan  7 00:08:58 host sshd[31398]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 00:08:58 host sshd[31398]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.101.141
Jan  7 00:09:01 host sshd[31398]: Failed password for invalid user kuba from 139.59.101.141 port 41578 ssh2
Jan  7 00:09:01 host sshd[31398]: Received disconnect from 139.59.101.141 port 41578:11: Bye Bye [preauth]
Jan  7 00:09:01 host sshd[31398]: Disconnected from 139.59.101.141 port 41578 [preauth]
Jan  7 00:09:05 host sshd[31442]: Invalid user liyang from 157.230.9.57 port 41364
Jan  7 00:09:05 host sshd[31442]: input_userauth_request: invalid user liyang [preauth]
Jan  7 00:09:05 host sshd[31442]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 00:09:05 host sshd[31442]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.9.57
Jan  7 00:09:06 host sshd[31442]: Failed password for invalid user liyang from 157.230.9.57 port 41364 ssh2
Jan  7 00:09:07 host sshd[31442]: Received disconnect from 157.230.9.57 port 41364:11: Bye Bye [preauth]
Jan  7 00:09:07 host sshd[31442]: Disconnected from 157.230.9.57 port 41364 [preauth]
Jan  7 00:10:12 host sshd[31793]: Invalid user zhangk from 209.141.34.86 port 52380
Jan  7 00:10:12 host sshd[31793]: input_userauth_request: invalid user zhangk [preauth]
Jan  7 00:10:12 host sshd[31793]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 00:10:12 host sshd[31793]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.34.86
Jan  7 00:10:14 host sshd[31793]: Failed password for invalid user zhangk from 209.141.34.86 port 52380 ssh2
Jan  7 00:10:14 host sshd[31793]: Received disconnect from 209.141.34.86 port 52380:11: Bye Bye [preauth]
Jan  7 00:10:14 host sshd[31793]: Disconnected from 209.141.34.86 port 52380 [preauth]
Jan  7 00:10:21 host sshd[31839]: Invalid user test01 from 150.95.115.28 port 57148
Jan  7 00:10:21 host sshd[31839]: input_userauth_request: invalid user test01 [preauth]
Jan  7 00:10:21 host sshd[31839]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 00:10:21 host sshd[31839]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.95.115.28
Jan  7 00:10:24 host sshd[31839]: Failed password for invalid user test01 from 150.95.115.28 port 57148 ssh2
Jan  7 00:10:24 host sshd[31839]: Received disconnect from 150.95.115.28 port 57148:11: Bye Bye [preauth]
Jan  7 00:10:24 host sshd[31839]: Disconnected from 150.95.115.28 port 57148 [preauth]
Jan  7 00:10:27 host sshd[31899]: Invalid user ubuntu from 52.172.30.44 port 60726
Jan  7 00:10:27 host sshd[31899]: input_userauth_request: invalid user ubuntu [preauth]
Jan  7 00:10:27 host sshd[31899]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 00:10:27 host sshd[31899]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.172.30.44
Jan  7 00:10:30 host sshd[31899]: Failed password for invalid user ubuntu from 52.172.30.44 port 60726 ssh2
Jan  7 00:10:30 host sshd[31899]: Received disconnect from 52.172.30.44 port 60726:11: Bye Bye [preauth]
Jan  7 00:10:30 host sshd[31899]: Disconnected from 52.172.30.44 port 60726 [preauth]
Jan  7 00:10:40 host sshd[31962]: Invalid user test01 from 157.230.9.57 port 43716
Jan  7 00:10:40 host sshd[31962]: input_userauth_request: invalid user test01 [preauth]
Jan  7 00:10:40 host sshd[31962]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 00:10:40 host sshd[31962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.9.57
Jan  7 00:10:42 host sshd[31962]: Failed password for invalid user test01 from 157.230.9.57 port 43716 ssh2
Jan  7 00:10:43 host sshd[31962]: Received disconnect from 157.230.9.57 port 43716:11: Bye Bye [preauth]
Jan  7 00:10:43 host sshd[31962]: Disconnected from 157.230.9.57 port 43716 [preauth]
Jan  7 00:10:46 host sshd[31995]: Invalid user toor from 94.50.162.146 port 39722
Jan  7 00:10:46 host sshd[31995]: input_userauth_request: invalid user toor [preauth]
Jan  7 00:10:46 host sshd[31995]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 00:10:46 host sshd[31995]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.50.162.146
Jan  7 00:10:48 host sshd[32010]: Invalid user zhaoting from 165.232.186.196 port 51213
Jan  7 00:10:48 host sshd[32010]: input_userauth_request: invalid user zhaoting [preauth]
Jan  7 00:10:48 host sshd[32010]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 00:10:48 host sshd[32010]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.186.196
Jan  7 00:10:48 host sshd[31995]: Failed password for invalid user toor from 94.50.162.146 port 39722 ssh2
Jan  7 00:10:48 host sshd[31995]: Received disconnect from 94.50.162.146 port 39722:11: Bye Bye [preauth]
Jan  7 00:10:48 host sshd[31995]: Disconnected from 94.50.162.146 port 39722 [preauth]
Jan  7 00:10:50 host sshd[32010]: Failed password for invalid user zhaoting from 165.232.186.196 port 51213 ssh2
Jan  7 00:10:50 host sshd[32010]: Received disconnect from 165.232.186.196 port 51213:11: Bye Bye [preauth]
Jan  7 00:10:50 host sshd[32010]: Disconnected from 165.232.186.196 port 51213 [preauth]
Jan  7 00:10:53 host sshd[32027]: Invalid user worker from 98.243.72.196 port 39876
Jan  7 00:10:53 host sshd[32027]: input_userauth_request: invalid user worker [preauth]
Jan  7 00:10:53 host sshd[32027]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 00:10:53 host sshd[32027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.243.72.196
Jan  7 00:10:54 host sshd[32027]: Failed password for invalid user worker from 98.243.72.196 port 39876 ssh2
Jan  7 00:10:55 host sshd[32027]: Received disconnect from 98.243.72.196 port 39876:11: Bye Bye [preauth]
Jan  7 00:10:55 host sshd[32027]: Disconnected from 98.243.72.196 port 39876 [preauth]
Jan  7 00:11:05 host sshd[32094]: Invalid user photo from 159.223.74.73 port 51446
Jan  7 00:11:05 host sshd[32094]: input_userauth_request: invalid user photo [preauth]
Jan  7 00:11:05 host sshd[32094]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 00:11:05 host sshd[32094]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.223.74.73
Jan  7 00:11:07 host sshd[32094]: Failed password for invalid user photo from 159.223.74.73 port 51446 ssh2
Jan  7 00:11:07 host sshd[32094]: Received disconnect from 159.223.74.73 port 51446:11: Bye Bye [preauth]
Jan  7 00:11:07 host sshd[32094]: Disconnected from 159.223.74.73 port 51446 [preauth]
Jan  7 00:11:17 host sshd[32143]: Invalid user photo from 34.64.76.187 port 55956
Jan  7 00:11:17 host sshd[32143]: input_userauth_request: invalid user photo [preauth]
Jan  7 00:11:17 host sshd[32143]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 00:11:17 host sshd[32143]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.64.76.187
Jan  7 00:11:19 host sshd[32158]: Invalid user liyang from 43.156.60.74 port 34748
Jan  7 00:11:19 host sshd[32158]: input_userauth_request: invalid user liyang [preauth]
Jan  7 00:11:19 host sshd[32158]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 00:11:19 host sshd[32158]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.60.74
Jan  7 00:11:19 host sshd[32143]: Failed password for invalid user photo from 34.64.76.187 port 55956 ssh2
Jan  7 00:11:19 host sshd[32143]: Received disconnect from 34.64.76.187 port 55956:11: Bye Bye [preauth]
Jan  7 00:11:19 host sshd[32143]: Disconnected from 34.64.76.187 port 55956 [preauth]
Jan  7 00:11:21 host sshd[32158]: Failed password for invalid user liyang from 43.156.60.74 port 34748 ssh2
Jan  7 00:11:21 host sshd[32158]: Received disconnect from 43.156.60.74 port 34748:11: Bye Bye [preauth]
Jan  7 00:11:21 host sshd[32158]: Disconnected from 43.156.60.74 port 34748 [preauth]
Jan  7 00:11:21 host sshd[32165]: Invalid user subversion from 209.141.34.86 port 52494
Jan  7 00:11:21 host sshd[32165]: input_userauth_request: invalid user subversion [preauth]
Jan  7 00:11:21 host sshd[32165]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 00:11:21 host sshd[32165]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.34.86
Jan  7 00:11:24 host sshd[32165]: Failed password for invalid user subversion from 209.141.34.86 port 52494 ssh2
Jan  7 00:11:35 host sshd[32273]: Invalid user bitrix from 150.95.115.28 port 49248
Jan  7 00:11:35 host sshd[32273]: input_userauth_request: invalid user bitrix [preauth]
Jan  7 00:11:35 host sshd[32273]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 00:11:35 host sshd[32273]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.95.115.28
Jan  7 00:11:37 host sshd[32273]: Failed password for invalid user bitrix from 150.95.115.28 port 49248 ssh2
Jan  7 00:11:37 host sshd[32273]: Received disconnect from 150.95.115.28 port 49248:11: Bye Bye [preauth]
Jan  7 00:11:37 host sshd[32273]: Disconnected from 150.95.115.28 port 49248 [preauth]
Jan  7 00:11:37 host sshd[32283]: Invalid user tim from 35.200.141.182 port 58370
Jan  7 00:11:37 host sshd[32283]: input_userauth_request: invalid user tim [preauth]
Jan  7 00:11:38 host sshd[32283]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 00:11:38 host sshd[32283]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.200.141.182
Jan  7 00:11:39 host sshd[32283]: Failed password for invalid user tim from 35.200.141.182 port 58370 ssh2
Jan  7 00:11:39 host sshd[32283]: Received disconnect from 35.200.141.182 port 58370:11: Bye Bye [preauth]
Jan  7 00:11:39 host sshd[32283]: Disconnected from 35.200.141.182 port 58370 [preauth]
Jan  7 00:11:45 host sshd[32352]: Invalid user admin from 171.118.209.174 port 58240
Jan  7 00:11:45 host sshd[32352]: input_userauth_request: invalid user admin [preauth]
Jan  7 00:11:45 host sshd[32352]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 00:11:45 host sshd[32352]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.118.209.174
Jan  7 00:11:46 host sshd[32360]: Invalid user admin from 157.230.9.57 port 43462
Jan  7 00:11:46 host sshd[32360]: input_userauth_request: invalid user admin [preauth]
Jan  7 00:11:46 host sshd[32360]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 00:11:46 host sshd[32360]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.9.57
Jan  7 00:11:47 host sshd[32352]: Failed password for invalid user admin from 171.118.209.174 port 58240 ssh2
Jan  7 00:11:47 host sshd[32352]: Received disconnect from 171.118.209.174 port 58240:11: Bye Bye [preauth]
Jan  7 00:11:47 host sshd[32352]: Disconnected from 171.118.209.174 port 58240 [preauth]
Jan  7 00:11:48 host sshd[32360]: Failed password for invalid user admin from 157.230.9.57 port 43462 ssh2
Jan  7 00:11:56 host sshd[32442]: Invalid user zhangyao from 94.50.162.146 port 34752
Jan  7 00:11:56 host sshd[32442]: input_userauth_request: invalid user zhangyao [preauth]
Jan  7 00:11:56 host sshd[32442]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 00:11:56 host sshd[32442]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.50.162.146
Jan  7 00:11:57 host sshd[32449]: Invalid user josejimenes from 112.213.124.252 port 55934
Jan  7 00:11:57 host sshd[32449]: input_userauth_request: invalid user josejimenes [preauth]
Jan  7 00:11:57 host sshd[32449]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 00:11:57 host sshd[32449]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.213.124.252
Jan  7 00:11:58 host sshd[32442]: Failed password for invalid user zhangyao from 94.50.162.146 port 34752 ssh2
Jan  7 00:11:58 host sshd[32442]: Received disconnect from 94.50.162.146 port 34752:11: Bye Bye [preauth]
Jan  7 00:11:58 host sshd[32442]: Disconnected from 94.50.162.146 port 34752 [preauth]
Jan  7 00:11:59 host sshd[32449]: Failed password for invalid user josejimenes from 112.213.124.252 port 55934 ssh2
Jan  7 00:11:59 host sshd[32449]: Received disconnect from 112.213.124.252 port 55934:11: Bye Bye [preauth]
Jan  7 00:11:59 host sshd[32449]: Disconnected from 112.213.124.252 port 55934 [preauth]
Jan  7 00:12:03 host sshd[32515]: Invalid user ubuntu from 98.243.72.196 port 39990
Jan  7 00:12:03 host sshd[32515]: input_userauth_request: invalid user ubuntu [preauth]
Jan  7 00:12:03 host sshd[32515]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 00:12:03 host sshd[32515]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.243.72.196
Jan  7 00:12:05 host sshd[32515]: Failed password for invalid user ubuntu from 98.243.72.196 port 39990 ssh2
Jan  7 00:12:07 host sshd[32576]: Invalid user admin from 143.198.198.92 port 59350
Jan  7 00:12:07 host sshd[32576]: input_userauth_request: invalid user admin [preauth]
Jan  7 00:12:07 host sshd[32576]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 00:12:07 host sshd[32576]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.198.92
Jan  7 00:12:08 host sshd[32576]: Failed password for invalid user admin from 143.198.198.92 port 59350 ssh2
Jan  7 00:12:08 host sshd[32576]: Received disconnect from 143.198.198.92 port 59350:11: Bye Bye [preauth]
Jan  7 00:12:08 host sshd[32576]: Disconnected from 143.198.198.92 port 59350 [preauth]
Jan  7 00:12:11 host sshd[32600]: User centos from 139.59.101.141 not allowed because not listed in AllowUsers
Jan  7 00:12:11 host sshd[32600]: input_userauth_request: invalid user centos [preauth]
Jan  7 00:12:11 host unix_chkpwd[32602]: password check failed for user (centos)
Jan  7 00:12:11 host sshd[32600]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.101.141  user=centos
Jan  7 00:12:13 host sshd[32600]: Failed password for invalid user centos from 139.59.101.141 port 47450 ssh2
Jan  7 00:12:13 host sshd[32600]: Received disconnect from 139.59.101.141 port 47450:11: Bye Bye [preauth]
Jan  7 00:12:13 host sshd[32600]: Disconnected from 139.59.101.141 port 47450 [preauth]
Jan  7 00:12:13 host sshd[32630]: Invalid user xrdp from 165.232.186.196 port 37151
Jan  7 00:12:13 host sshd[32630]: input_userauth_request: invalid user xrdp [preauth]
Jan  7 00:12:13 host sshd[32630]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 00:12:13 host sshd[32630]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.186.196
Jan  7 00:12:13 host sshd[32604]: Invalid user jaimon from 164.92.116.59 port 33930
Jan  7 00:12:13 host sshd[32604]: input_userauth_request: invalid user jaimon [preauth]
Jan  7 00:12:13 host sshd[32604]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 00:12:13 host sshd[32604]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.116.59
Jan  7 00:12:16 host sshd[32630]: Failed password for invalid user xrdp from 165.232.186.196 port 37151 ssh2
Jan  7 00:12:16 host sshd[32630]: Received disconnect from 165.232.186.196 port 37151:11: Bye Bye [preauth]
Jan  7 00:12:16 host sshd[32630]: Disconnected from 165.232.186.196 port 37151 [preauth]
Jan  7 00:12:16 host sshd[32604]: Failed password for invalid user jaimon from 164.92.116.59 port 33930 ssh2
Jan  7 00:12:16 host sshd[32604]: Received disconnect from 164.92.116.59 port 33930:11: Bye Bye [preauth]
Jan  7 00:12:16 host sshd[32604]: Disconnected from 164.92.116.59 port 33930 [preauth]
Jan  7 00:12:17 host sshd[32650]: Invalid user fuying from 139.99.135.239 port 56234
Jan  7 00:12:17 host sshd[32650]: input_userauth_request: invalid user fuying [preauth]
Jan  7 00:12:17 host sshd[32650]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 00:12:17 host sshd[32650]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.135.239
Jan  7 00:12:18 host sshd[32650]: Failed password for invalid user fuying from 139.99.135.239 port 56234 ssh2
Jan  7 00:12:18 host sshd[32650]: Received disconnect from 139.99.135.239 port 56234:11: Bye Bye [preauth]
Jan  7 00:12:18 host sshd[32650]: Disconnected from 139.99.135.239 port 56234 [preauth]
Jan  7 00:12:26 host sshd[32723]: Invalid user liyang from 159.223.74.73 port 56256
Jan  7 00:12:26 host sshd[32723]: input_userauth_request: invalid user liyang [preauth]
Jan  7 00:12:26 host sshd[32723]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 00:12:26 host sshd[32723]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.223.74.73
Jan  7 00:12:28 host sshd[32723]: Failed password for invalid user liyang from 159.223.74.73 port 56256 ssh2
Jan  7 00:12:28 host sshd[32723]: Received disconnect from 159.223.74.73 port 56256:11: Bye Bye [preauth]
Jan  7 00:12:28 host sshd[32723]: Disconnected from 159.223.74.73 port 56256 [preauth]
Jan  7 00:12:39 host sshd[477]: Invalid user toor from 34.64.76.187 port 55418
Jan  7 00:12:39 host sshd[477]: input_userauth_request: invalid user toor [preauth]
Jan  7 00:12:39 host sshd[477]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 00:12:39 host sshd[477]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.64.76.187
Jan  7 00:12:41 host sshd[477]: Failed password for invalid user toor from 34.64.76.187 port 55418 ssh2
Jan  7 00:12:41 host sshd[477]: Received disconnect from 34.64.76.187 port 55418:11: Bye Bye [preauth]
Jan  7 00:12:41 host sshd[477]: Disconnected from 34.64.76.187 port 55418 [preauth]
Jan  7 00:12:42 host sshd[498]: Invalid user admin from 43.156.60.74 port 34070
Jan  7 00:12:42 host sshd[498]: input_userauth_request: invalid user admin [preauth]
Jan  7 00:12:42 host sshd[498]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 00:12:42 host sshd[498]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.60.74
Jan  7 00:12:43 host sshd[498]: Failed password for invalid user admin from 43.156.60.74 port 34070 ssh2
Jan  7 00:12:43 host sshd[498]: Received disconnect from 43.156.60.74 port 34070:11: Bye Bye [preauth]
Jan  7 00:12:43 host sshd[498]: Disconnected from 43.156.60.74 port 34070 [preauth]
Jan  7 00:12:49 host sshd[591]: Invalid user ubuntu from 35.200.141.182 port 53110
Jan  7 00:12:49 host sshd[591]: input_userauth_request: invalid user ubuntu [preauth]
Jan  7 00:12:49 host sshd[591]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 00:12:49 host sshd[591]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.200.141.182
Jan  7 00:12:51 host sshd[591]: Failed password for invalid user ubuntu from 35.200.141.182 port 53110 ssh2
Jan  7 00:12:51 host sshd[591]: Received disconnect from 35.200.141.182 port 53110:11: Bye Bye [preauth]
Jan  7 00:12:51 host sshd[591]: Disconnected from 35.200.141.182 port 53110 [preauth]
Jan  7 00:13:00 host sshd[681]: Invalid user bitrix from 164.92.116.59 port 51110
Jan  7 00:13:00 host sshd[681]: input_userauth_request: invalid user bitrix [preauth]
Jan  7 00:13:00 host sshd[681]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 00:13:00 host sshd[681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.116.59
Jan  7 00:13:02 host sshd[681]: Failed password for invalid user bitrix from 164.92.116.59 port 51110 ssh2
Jan  7 00:13:02 host sshd[681]: Received disconnect from 164.92.116.59 port 51110:11: Bye Bye [preauth]
Jan  7 00:13:02 host sshd[681]: Disconnected from 164.92.116.59 port 51110 [preauth]
Jan  7 00:13:06 host sshd[767]: Invalid user test01 from 52.172.30.44 port 39816
Jan  7 00:13:06 host sshd[767]: input_userauth_request: invalid user test01 [preauth]
Jan  7 00:13:06 host sshd[767]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 00:13:06 host sshd[767]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.172.30.44
Jan  7 00:13:07 host sshd[767]: Failed password for invalid user test01 from 52.172.30.44 port 39816 ssh2
Jan  7 00:13:07 host sshd[767]: Received disconnect from 52.172.30.44 port 39816:11: Bye Bye [preauth]
Jan  7 00:13:07 host sshd[767]: Disconnected from 52.172.30.44 port 39816 [preauth]
Jan  7 00:13:09 host sshd[778]: Invalid user lsy from 171.118.209.174 port 57290
Jan  7 00:13:09 host sshd[778]: input_userauth_request: invalid user lsy [preauth]
Jan  7 00:13:09 host sshd[778]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 00:13:09 host sshd[778]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.118.209.174
Jan  7 00:13:11 host sshd[778]: Failed password for invalid user lsy from 171.118.209.174 port 57290 ssh2
Jan  7 00:13:11 host sshd[778]: Received disconnect from 171.118.209.174 port 57290:11: Bye Bye [preauth]
Jan  7 00:13:11 host sshd[778]: Disconnected from 171.118.209.174 port 57290 [preauth]
Jan  7 00:13:14 host sshd[831]: Invalid user xrdp from 112.213.124.252 port 34632
Jan  7 00:13:14 host sshd[831]: input_userauth_request: invalid user xrdp [preauth]
Jan  7 00:13:15 host sshd[831]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 00:13:15 host sshd[831]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.213.124.252
Jan  7 00:13:16 host sshd[844]: Invalid user ubuntu from 143.198.198.92 port 49876
Jan  7 00:13:16 host sshd[844]: input_userauth_request: invalid user ubuntu [preauth]
Jan  7 00:13:16 host sshd[844]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 00:13:16 host sshd[844]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.198.92
Jan  7 00:13:16 host sshd[831]: Failed password for invalid user xrdp from 112.213.124.252 port 34632 ssh2
Jan  7 00:13:17 host sshd[831]: Received disconnect from 112.213.124.252 port 34632:11: Bye Bye [preauth]
Jan  7 00:13:17 host sshd[831]: Disconnected from 112.213.124.252 port 34632 [preauth]
Jan  7 00:13:19 host sshd[844]: Failed password for invalid user ubuntu from 143.198.198.92 port 49876 ssh2
Jan  7 00:13:19 host sshd[844]: Received disconnect from 143.198.198.92 port 49876:11: Bye Bye [preauth]
Jan  7 00:13:19 host sshd[844]: Disconnected from 143.198.198.92 port 49876 [preauth]
Jan  7 00:13:34 host sshd[994]: Invalid user web from 139.99.135.239 port 36016
Jan  7 00:13:34 host sshd[994]: input_userauth_request: invalid user web [preauth]
Jan  7 00:13:34 host sshd[994]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 00:13:34 host sshd[994]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.135.239
Jan  7 00:13:37 host sshd[994]: Failed password for invalid user web from 139.99.135.239 port 36016 ssh2
Jan  7 00:13:37 host sshd[994]: Received disconnect from 139.99.135.239 port 36016:11: Bye Bye [preauth]
Jan  7 00:13:37 host sshd[994]: Disconnected from 139.99.135.239 port 36016 [preauth]
Jan  7 00:14:20 host sshd[1333]: User root from 191.232.49.146 not allowed because not listed in AllowUsers
Jan  7 00:14:20 host sshd[1333]: input_userauth_request: invalid user root [preauth]
Jan  7 00:14:20 host unix_chkpwd[1346]: password check failed for user (root)
Jan  7 00:14:20 host sshd[1333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.232.49.146  user=root
Jan  7 00:14:20 host sshd[1333]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 00:14:22 host sshd[1333]: Failed password for invalid user root from 191.232.49.146 port 45006 ssh2
Jan  7 00:14:23 host sshd[1333]: Connection closed by 191.232.49.146 port 45006 [preauth]
Jan  7 00:14:26 host sshd[1371]: Connection closed by 172.104.11.46 port 54518 [preauth]
Jan  7 00:14:28 host sshd[1396]: Connection closed by 172.104.11.46 port 54534 [preauth]
Jan  7 00:14:30 host sshd[1405]: Connection closed by 172.104.11.46 port 24660 [preauth]
Jan  7 00:14:37 host sshd[1472]: User root from 191.232.49.146 not allowed because not listed in AllowUsers
Jan  7 00:14:37 host sshd[1472]: input_userauth_request: invalid user root [preauth]
Jan  7 00:14:37 host unix_chkpwd[1491]: password check failed for user (root)
Jan  7 00:14:37 host sshd[1472]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.232.49.146  user=root
Jan  7 00:14:37 host sshd[1472]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 00:14:39 host sshd[1472]: Failed password for invalid user root from 191.232.49.146 port 46696 ssh2
Jan  7 00:14:49 host sshd[1580]: Invalid user ubuntu from 52.172.30.44 port 39930
Jan  7 00:14:49 host sshd[1580]: input_userauth_request: invalid user ubuntu [preauth]
Jan  7 00:14:49 host sshd[1580]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 00:14:49 host sshd[1580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.172.30.44
Jan  7 00:14:51 host sshd[1580]: Failed password for invalid user ubuntu from 52.172.30.44 port 39930 ssh2
Jan  7 00:14:51 host sshd[1580]: Received disconnect from 52.172.30.44 port 39930:11: Bye Bye [preauth]
Jan  7 00:14:51 host sshd[1580]: Disconnected from 52.172.30.44 port 39930 [preauth]
Jan  7 00:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  7 00:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 00:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 00:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  7 00:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 00:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 00:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  7 00:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 00:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 00:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  7 00:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 00:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 00:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  7 00:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 00:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 00:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  7 00:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 00:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 00:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  7 00:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 00:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 00:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  7 00:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 00:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 00:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  7 00:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 00:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 00:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  7 00:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 00:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 00:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  7 00:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 00:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 00:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  7 00:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 00:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 00:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  7 00:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 00:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 00:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkaretakers user-2=cochintaxi user-3=laundryboniface user-4=a2zgroup user-5=dartsimp user-6=wwwpmcresource user-7=ugotscom user-8=keralaholi user-9=wwwresourcehunte user-10=wwwrmswll user-11=travelboniface user-12=woodpeck user-13=wwwkapin user-14=disposeat user-15=remysagr user-16=wwwkmaorg user-17=pmcresources user-18=shalinijames user-19=wwwtestugo user-20=vfmassets user-21=wwwletsstalkfood user-22=straightcurve user-23=wwwevmhonda user-24=bonifacegroup user-25=mrsclean user-26=wwwnexidigital user-27=kottayamcalldriv user-28=phmetals user-29=palco123 user-30=gifterman feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  7 00:21:54 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  7 00:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 00:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 00:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  7 00:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 00:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 00:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-lRkjFp4drBr3Fl9f.~
Jan  7 00:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 00:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 00:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-lRkjFp4drBr3Fl9f.~'
Jan  7 00:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 00:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 00:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-lRkjFp4drBr3Fl9f.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  7 00:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 00:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 00:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  7 00:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 00:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 00:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  7 00:21:55 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 00:21:55 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 00:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  7 00:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 00:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 00:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  7 00:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 00:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 00:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  7 00:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 00:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 00:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  7 00:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 00:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 00:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  7 00:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 00:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 00:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  7 00:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  7 00:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  7 00:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  7 00:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  7 00:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  7 00:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  7 00:22:02 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  7 00:22:04 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  7 00:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  7 00:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 00:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 00:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  7 00:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 00:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 00:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  7 00:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 00:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 00:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  7 00:22:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 00:22:10 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 00:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  7 00:22:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 00:22:17 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 00:22:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  7 00:22:17 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  7 00:22:18 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  7 00:35:54 host sshd[9217]: Invalid user admin from 110.35.173.2 port 13151
Jan  7 00:35:54 host sshd[9217]: input_userauth_request: invalid user admin [preauth]
Jan  7 00:35:54 host sshd[9217]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 00:35:54 host sshd[9217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.35.173.2
Jan  7 00:35:55 host sshd[9217]: Failed password for invalid user admin from 110.35.173.2 port 13151 ssh2
Jan  7 00:35:56 host sshd[9217]: Received disconnect from 110.35.173.2 port 13151:11: Bye Bye [preauth]
Jan  7 00:35:56 host sshd[9217]: Disconnected from 110.35.173.2 port 13151 [preauth]
Jan  7 00:39:47 host sshd[10525]: Invalid user huawei from 2.45.191.223 port 49507
Jan  7 00:39:47 host sshd[10525]: input_userauth_request: invalid user huawei [preauth]
Jan  7 00:39:47 host sshd[10525]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 00:39:47 host sshd[10525]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.45.191.223
Jan  7 00:39:48 host sshd[10525]: Failed password for invalid user huawei from 2.45.191.223 port 49507 ssh2
Jan  7 00:39:48 host sshd[10525]: Received disconnect from 2.45.191.223 port 49507:11: Bye Bye [preauth]
Jan  7 00:39:48 host sshd[10525]: Disconnected from 2.45.191.223 port 49507 [preauth]
Jan  7 00:42:44 host sshd[11454]: Invalid user hosts from 2.45.191.223 port 38188
Jan  7 00:42:44 host sshd[11454]: input_userauth_request: invalid user hosts [preauth]
Jan  7 00:42:44 host sshd[11454]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 00:42:44 host sshd[11454]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.45.191.223
Jan  7 00:42:46 host sshd[11454]: Failed password for invalid user hosts from 2.45.191.223 port 38188 ssh2
Jan  7 00:42:46 host sshd[11454]: Received disconnect from 2.45.191.223 port 38188:11: Bye Bye [preauth]
Jan  7 00:42:46 host sshd[11454]: Disconnected from 2.45.191.223 port 38188 [preauth]
Jan  7 00:43:50 host sshd[11798]: Invalid user plex from 2.45.191.223 port 49583
Jan  7 00:43:50 host sshd[11798]: input_userauth_request: invalid user plex [preauth]
Jan  7 00:43:50 host sshd[11798]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 00:43:50 host sshd[11798]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.45.191.223
Jan  7 00:43:53 host sshd[11798]: Failed password for invalid user plex from 2.45.191.223 port 49583 ssh2
Jan  7 00:43:53 host sshd[11798]: Received disconnect from 2.45.191.223 port 49583:11: Bye Bye [preauth]
Jan  7 00:43:53 host sshd[11798]: Disconnected from 2.45.191.223 port 49583 [preauth]
Jan  7 00:44:37 host sshd[12074]: Did not receive identification string from 167.71.166.243 port 45884
Jan  7 00:47:26 host sshd[12789]: Invalid user tracie from 103.104.92.142 port 12528
Jan  7 00:47:26 host sshd[12789]: input_userauth_request: invalid user tracie [preauth]
Jan  7 00:47:26 host sshd[12789]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 00:47:26 host sshd[12789]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.104.92.142
Jan  7 00:47:29 host sshd[12789]: Failed password for invalid user tracie from 103.104.92.142 port 12528 ssh2
Jan  7 00:47:29 host sshd[12789]: Received disconnect from 103.104.92.142 port 12528:11: Bye Bye [preauth]
Jan  7 00:47:29 host sshd[12789]: Disconnected from 103.104.92.142 port 12528 [preauth]
Jan  7 00:48:53 host sshd[12963]: Invalid user zhangyao from 219.117.237.123 port 49441
Jan  7 00:48:53 host sshd[12963]: input_userauth_request: invalid user zhangyao [preauth]
Jan  7 00:48:53 host sshd[12963]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 00:48:53 host sshd[12963]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.117.237.123
Jan  7 00:48:55 host sshd[12963]: Failed password for invalid user zhangyao from 219.117.237.123 port 49441 ssh2
Jan  7 00:48:55 host sshd[12963]: Received disconnect from 219.117.237.123 port 49441:11: Bye Bye [preauth]
Jan  7 00:48:55 host sshd[12963]: Disconnected from 219.117.237.123 port 49441 [preauth]
Jan  7 00:49:24 host sshd[13011]: Invalid user sys from 103.104.92.142 port 52166
Jan  7 00:49:24 host sshd[13011]: input_userauth_request: invalid user sys [preauth]
Jan  7 00:49:24 host sshd[13011]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 00:49:24 host sshd[13011]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.104.92.142
Jan  7 00:49:26 host sshd[13011]: Failed password for invalid user sys from 103.104.92.142 port 52166 ssh2
Jan  7 00:49:26 host sshd[13011]: Received disconnect from 103.104.92.142 port 52166:11: Bye Bye [preauth]
Jan  7 00:49:26 host sshd[13011]: Disconnected from 103.104.92.142 port 52166 [preauth]
Jan  7 00:50:02 host sshd[13099]: Did not receive identification string from 167.71.166.243 port 50058
Jan  7 00:50:16 host sshd[13225]: Invalid user vmail from 120.208.97.111 port 4833
Jan  7 00:50:16 host sshd[13225]: input_userauth_request: invalid user vmail [preauth]
Jan  7 00:50:16 host sshd[13225]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 00:50:16 host sshd[13225]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.208.97.111
Jan  7 00:50:18 host sshd[13225]: Failed password for invalid user vmail from 120.208.97.111 port 4833 ssh2
Jan  7 00:50:18 host sshd[13225]: Received disconnect from 120.208.97.111 port 4833:11: Bye Bye [preauth]
Jan  7 00:50:18 host sshd[13225]: Disconnected from 120.208.97.111 port 4833 [preauth]
Jan  7 00:50:34 host sshd[13277]: Invalid user inspur from 103.104.92.142 port 43315
Jan  7 00:50:34 host sshd[13277]: input_userauth_request: invalid user inspur [preauth]
Jan  7 00:50:34 host sshd[13277]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 00:50:34 host sshd[13277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.104.92.142
Jan  7 00:50:36 host sshd[13277]: Failed password for invalid user inspur from 103.104.92.142 port 43315 ssh2
Jan  7 00:51:32 host sshd[13431]: User centos from 219.117.237.123 not allowed because not listed in AllowUsers
Jan  7 00:51:32 host sshd[13431]: input_userauth_request: invalid user centos [preauth]
Jan  7 00:51:32 host unix_chkpwd[13437]: password check failed for user (centos)
Jan  7 00:51:32 host sshd[13431]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.117.237.123  user=centos
Jan  7 00:51:34 host sshd[13431]: Failed password for invalid user centos from 219.117.237.123 port 36548 ssh2
Jan  7 00:51:34 host sshd[13431]: Received disconnect from 219.117.237.123 port 36548:11: Bye Bye [preauth]
Jan  7 00:51:34 host sshd[13431]: Disconnected from 219.117.237.123 port 36548 [preauth]
Jan  7 00:54:15 host sshd[14262]: Invalid user ubuntu from 103.163.189.18 port 19886
Jan  7 00:54:15 host sshd[14262]: input_userauth_request: invalid user ubuntu [preauth]
Jan  7 00:54:15 host sshd[14262]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 00:54:15 host sshd[14262]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.163.189.18
Jan  7 00:54:18 host sshd[14262]: Failed password for invalid user ubuntu from 103.163.189.18 port 19886 ssh2
Jan  7 00:54:18 host sshd[14262]: Received disconnect from 103.163.189.18 port 19886:11: Bye Bye [preauth]
Jan  7 00:54:18 host sshd[14262]: Disconnected from 103.163.189.18 port 19886 [preauth]
Jan  7 00:56:51 host sshd[15188]: Invalid user lightdm from 103.163.189.18 port 47691
Jan  7 00:56:51 host sshd[15188]: input_userauth_request: invalid user lightdm [preauth]
Jan  7 00:56:51 host sshd[15188]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 00:56:51 host sshd[15188]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.163.189.18
Jan  7 00:56:53 host sshd[15188]: Failed password for invalid user lightdm from 103.163.189.18 port 47691 ssh2
Jan  7 00:56:53 host sshd[15188]: Received disconnect from 103.163.189.18 port 47691:11: Bye Bye [preauth]
Jan  7 00:56:53 host sshd[15188]: Disconnected from 103.163.189.18 port 47691 [preauth]
Jan  7 01:03:30 host sshd[16660]: Invalid user nagiosuser from 103.163.189.18 port 21008
Jan  7 01:03:30 host sshd[16660]: input_userauth_request: invalid user nagiosuser [preauth]
Jan  7 01:03:30 host sshd[16660]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 01:03:30 host sshd[16660]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.163.189.18
Jan  7 01:03:32 host sshd[16660]: Failed password for invalid user nagiosuser from 103.163.189.18 port 21008 ssh2
Jan  7 01:03:33 host sshd[16660]: Received disconnect from 103.163.189.18 port 21008:11: Bye Bye [preauth]
Jan  7 01:03:33 host sshd[16660]: Disconnected from 103.163.189.18 port 21008 [preauth]
Jan  7 01:13:58 host sshd[20141]: Invalid user pi from 24.70.34.220 port 44822
Jan  7 01:13:58 host sshd[20141]: input_userauth_request: invalid user pi [preauth]
Jan  7 01:13:58 host sshd[20142]: Invalid user pi from 24.70.34.220 port 44820
Jan  7 01:13:58 host sshd[20142]: input_userauth_request: invalid user pi [preauth]
Jan  7 01:13:59 host sshd[20141]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 01:13:59 host sshd[20141]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.70.34.220
Jan  7 01:13:59 host sshd[20142]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 01:13:59 host sshd[20142]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.70.34.220
Jan  7 01:14:00 host sshd[20141]: Failed password for invalid user pi from 24.70.34.220 port 44822 ssh2
Jan  7 01:14:00 host sshd[20142]: Failed password for invalid user pi from 24.70.34.220 port 44820 ssh2
Jan  7 01:14:01 host sshd[20141]: Connection closed by 24.70.34.220 port 44822 [preauth]
Jan  7 01:14:01 host sshd[20142]: Connection closed by 24.70.34.220 port 44820 [preauth]
Jan  7 01:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  7 01:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 01:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 01:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  7 01:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 01:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 01:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  7 01:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 01:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 01:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  7 01:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 01:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 01:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  7 01:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 01:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 01:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  7 01:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 01:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 01:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  7 01:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 01:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 01:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  7 01:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 01:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 01:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  7 01:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 01:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 01:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  7 01:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 01:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 01:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  7 01:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 01:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 01:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  7 01:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 01:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 01:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  7 01:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 01:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 01:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=travelboniface user-3=ugotscom user-4=wwwresourcehunte user-5=keralaholi user-6=wwwrmswll user-7=wwwkaretakers user-8=cochintaxi user-9=a2zgroup user-10=dartsimp user-11=laundryboniface user-12=wwwevmhonda user-13=bonifacegroup user-14=wwwletsstalkfood user-15=straightcurve user-16=phmetals user-17=kottayamcalldriv user-18=palco123 user-19=gifterman user-20=mrsclean user-21=wwwnexidigital user-22=wwwkmaorg user-23=remysagr user-24=disposeat user-25=wwwkapin user-26=woodpeck user-27=shalinijames user-28=wwwtestugo user-29=vfmassets user-30=pmcresources feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  7 01:21:54 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  7 01:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 01:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 01:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  7 01:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 01:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 01:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-QE0SBizHmeALZ5A5.~
Jan  7 01:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 01:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 01:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-QE0SBizHmeALZ5A5.~'
Jan  7 01:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 01:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 01:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-QE0SBizHmeALZ5A5.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  7 01:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 01:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 01:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  7 01:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 01:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 01:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  7 01:21:54 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 01:21:54 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 01:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  7 01:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 01:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 01:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  7 01:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 01:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 01:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  7 01:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 01:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 01:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  7 01:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 01:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 01:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  7 01:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 01:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 01:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  7 01:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  7 01:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  7 01:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  7 01:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  7 01:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  7 01:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  7 01:21:59 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  7 01:22:01 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  7 01:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  7 01:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 01:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 01:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  7 01:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 01:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 01:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  7 01:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 01:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 01:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  7 01:22:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 01:22:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 01:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  7 01:22:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 01:22:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 01:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  7 01:22:09 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  7 01:22:10 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  7 02:07:31 host sshd[4168]: Connection closed by 192.241.217.15 port 56530 [preauth]
Jan  7 02:10:46 host sshd[5324]: Invalid user scott from 209.141.56.48 port 48494
Jan  7 02:10:46 host sshd[5324]: input_userauth_request: invalid user scott [preauth]
Jan  7 02:10:46 host sshd[5324]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 02:10:46 host sshd[5324]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48
Jan  7 02:10:48 host sshd[5324]: Failed password for invalid user scott from 209.141.56.48 port 48494 ssh2
Jan  7 02:10:48 host sshd[5324]: Connection closed by 209.141.56.48 port 48494 [preauth]
Jan  7 02:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  7 02:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  7 02:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  7 02:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  7 02:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  7 02:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  7 02:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  7 02:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  7 02:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  7 02:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  7 02:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  7 02:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  7 02:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  7 02:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=palco123 user-2=gifterman user-3=kottayamcalldriv user-4=phmetals user-5=mrsclean user-6=wwwnexidigital user-7=bonifacegroup user-8=wwwevmhonda user-9=wwwletsstalkfood user-10=straightcurve user-11=vfmassets user-12=shalinijames user-13=wwwtestugo user-14=pmcresources user-15=remysagr user-16=wwwkmaorg user-17=disposeat user-18=wwwkapin user-19=woodpeck user-20=travelboniface user-21=keralaholi user-22=wwwresourcehunte user-23=wwwrmswll user-24=ugotscom user-25=wwwpmcresource user-26=a2zgroup user-27=dartsimp user-28=laundryboniface user-29=wwwkaretakers user-30=cochintaxi feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  7 02:21:55 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  7 02:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  7 02:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-w1pkkwVQNrYvnRKK.~
Jan  7 02:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-w1pkkwVQNrYvnRKK.~'
Jan  7 02:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-w1pkkwVQNrYvnRKK.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  7 02:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  7 02:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  7 02:21:56 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 02:21:56 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 02:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  7 02:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  7 02:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  7 02:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  7 02:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  7 02:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  7 02:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  7 02:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  7 02:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  7 02:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  7 02:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  7 02:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  7 02:22:01 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  7 02:22:03 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  7 02:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  7 02:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  7 02:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  7 02:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  7 02:22:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 02:22:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 02:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  7 02:22:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 02:22:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 02:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  7 02:22:11 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  7 02:22:12 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  7 02:27:46 host sshd[11120]: Invalid user ap from 194.110.203.109 port 36030
Jan  7 02:27:46 host sshd[11120]: input_userauth_request: invalid user ap [preauth]
Jan  7 02:27:46 host sshd[11120]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 02:27:46 host sshd[11120]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109
Jan  7 02:27:47 host sshd[11120]: Failed password for invalid user ap from 194.110.203.109 port 36030 ssh2
Jan  7 02:27:51 host sshd[11120]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 02:27:52 host sshd[11120]: Failed password for invalid user ap from 194.110.203.109 port 36030 ssh2
Jan  7 02:27:55 host sshd[11120]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 02:27:57 host sshd[11120]: Failed password for invalid user ap from 194.110.203.109 port 36030 ssh2
Jan  7 02:28:01 host sshd[11120]: Connection closed by 194.110.203.109 port 36030 [preauth]
Jan  7 02:28:01 host sshd[11120]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109
Jan  7 02:29:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  7 02:29:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:29:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:29:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  7 02:29:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:29:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:29:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  7 02:29:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:29:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:29:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  7 02:29:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:29:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:29:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  7 02:29:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:29:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:29:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkaretakers user-2=cochintaxi user-3=dartsimp user-4=a2zgroup user-5=laundryboniface user-6=wwwpmcresource user-7=travelboniface user-8=ugotscom user-9=wwwrmswll user-10=wwwresourcehunte user-11=keralaholi user-12=disposeat user-13=wwwkmaorg user-14=remysagr user-15=wwwkapin user-16=woodpeck user-17=wwwtestugo user-18=shalinijames user-19=vfmassets user-20=pmcresources user-21=wwwevmhonda user-22=bonifacegroup user-23=straightcurve user-24=wwwletsstalkfood user-25=kottayamcalldriv user-26=phmetals user-27=gifterman user-28=palco123 user-29=wwwnexidigital user-30=mrsclean feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  7 02:29:52 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  7 02:29:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:29:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:29:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwevmhonda --output=json
Jan  7 02:29:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:29:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:29:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color instance info --format=json --check-updates=true
Jan  7 02:29:52 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  7 02:29:56 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  7 02:29:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false
Jan  7 02:29:57 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  7 02:29:57 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  7 02:29:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false
Jan  7 02:29:58 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  7 02:30:00 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  7 02:30:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  7 02:30:00 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  7 02:30:00 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  7 02:30:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwevmhonda LangPHP php_get_vhost_versions --output=json
Jan  7 02:30:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:30:00 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:30:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 package_manager_get_package_info package-0=ea-php72 --output=json
Jan  7 02:30:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:30:01 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:30:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color instance login-url --skip-plugins=false --format=json
Jan  7 02:30:01 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  7 02:30:02 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  7 02:30:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwletsstalkfood --output=json
Jan  7 02:30:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:30:02 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:30:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color instance info --format=json --check-updates=true
Jan  7 02:30:02 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  7 02:30:09 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  7 02:30:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false
Jan  7 02:30:09 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  7 02:30:10 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  7 02:30:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false
Jan  7 02:30:10 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  7 02:30:16 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  7 02:30:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  7 02:30:16 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  7 02:30:16 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  7 02:30:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood LangPHP php_get_vhost_versions --output=json
Jan  7 02:30:16 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:30:16 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:30:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color instance login-url --skip-plugins=false --format=json
Jan  7 02:30:16 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  7 02:30:16 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  7 02:30:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood DomainInfo single_domain_data domain=letsstalkfood.com return_https_redirect_status=1 --output=json
Jan  7 02:30:16 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:30:16 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:30:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 fetch_vhost_ssl_components --output=json
Jan  7 02:30:17 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:30:17 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:30:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 fetch_ssl_vhosts --output=json
Jan  7 02:30:17 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:30:17 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:30:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood Mime list_redirects --output=json
Jan  7 02:30:17 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:30:17 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:30:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  7 02:30:17 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  7 02:30:19 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  7 02:30:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false
Jan  7 02:30:19 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  7 02:30:20 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  7 02:30:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  7 02:30:20 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  7 02:30:25 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  7 02:30:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false
Jan  7 02:30:25 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  7 02:30:31 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  7 02:30:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/public_html/wp-config.php
Jan  7 02:30:31 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  7 02:30:31 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  7 02:30:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  7 02:30:31 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  7 02:30:31 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  7 02:30:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/public_html/.maintenance
Jan  7 02:30:31 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  7 02:30:31 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  7 02:30:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color db-prefix get
Jan  7 02:30:31 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  7 02:30:32 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  7 02:30:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood DirectoryPrivacy is_directory_protected dir=/home/wwwletsstalkfood/public_html --output=json
Jan  7 02:30:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:30:32 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:30:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  7 02:30:32 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  7 02:30:32 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  7 02:30:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color wpt-cron event reschedule wp_version_check '+2 day'
Jan  7 02:30:32 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  7 02:30:33 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  7 02:30:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day'
Jan  7 02:30:33 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  7 02:30:33 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  7 02:30:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  7 02:30:33 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  7 02:30:34 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  7 02:30:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  7 02:30:34 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  7 02:30:34 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  7 02:30:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color admin-username is-secure
Jan  7 02:30:34 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  7 02:30:35 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  7 02:30:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  7 02:30:35 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  7 02:30:35 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  7 02:30:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/public_html/wp-config.php
Jan  7 02:30:35 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  7 02:30:35 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  7 02:30:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/stat -c %a /home/wwwletsstalkfood/public_html/wp-config.php
Jan  7 02:30:35 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  7 02:30:35 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  7 02:30:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color pingbacks is_disabled
Jan  7 02:30:35 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  7 02:30:36 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  7 02:30:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  7 02:30:36 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  7 02:30:36 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  7 02:30:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color security-keys are_keys_correct
Jan  7 02:30:36 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  7 02:30:37 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  7 02:30:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=mrsclean --output=json
Jan  7 02:30:37 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:30:37 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:30:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/backup && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/mrsclean/public_html/backup --no-color instance info --format=json --check-updates=true
Jan  7 02:30:37 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  7 02:30:37 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  7 02:30:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean DomainInfo single_domain_data domain=mrsclean.co.in return_https_redirect_status=1 --output=json
Jan  7 02:30:37 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:30:37 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:30:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean Mime list_redirects --output=json
Jan  7 02:30:37 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:30:37 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:30:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/public_html/backup/wp-includes/version.php
Jan  7 02:30:37 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  7 02:30:37 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  7 02:30:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/cat /home/mrsclean/public_html/backup/wp-includes/version.php
Jan  7 02:30:37 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  7 02:30:38 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  7 02:30:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  7 02:30:38 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  7 02:30:38 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  7 02:30:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean LangPHP php_get_vhost_versions --output=json
Jan  7 02:30:38 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:30:38 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:30:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  7 02:30:38 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 02:30:38 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 02:30:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/blog && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/mrsclean/public_html/blog --no-color instance info --format=json --check-updates=true
Jan  7 02:30:38 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  7 02:30:38 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  7 02:30:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/public_html/blog/wp-includes/version.php
Jan  7 02:30:38 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  7 02:30:38 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  7 02:30:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/cat /home/mrsclean/public_html/blog/wp-includes/version.php
Jan  7 02:30:38 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  7 02:30:38 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  7 02:30:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  7 02:30:38 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  7 02:30:38 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  7 02:30:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=shalinijames --output=json
Jan  7 02:30:38 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:30:39 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:30:39 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color instance info --format=json --check-updates=true
Jan  7 02:30:39 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  7 02:30:46 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  7 02:30:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option get auto_update_plugins --format=json
Jan  7 02:30:46 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  7 02:30:46 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  7 02:30:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option get auto_update_themes --format=json
Jan  7 02:30:46 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  7 02:30:47 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  7 02:30:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  7 02:30:47 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  7 02:30:47 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  7 02:30:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames LangPHP php_get_vhost_versions --output=json
Jan  7 02:30:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:30:47 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:30:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color instance login-url --skip-plugins=false --format=json
Jan  7 02:30:47 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  7 02:30:47 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  7 02:30:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames DomainInfo single_domain_data domain=shalinijames.com return_https_redirect_status=1 --output=json
Jan  7 02:30:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:30:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:30:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames Mime list_redirects --output=json
Jan  7 02:30:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:30:48 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:30:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  7 02:30:48 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  7 02:30:50 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  7 02:30:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option get auto_update_plugins --format=json
Jan  7 02:30:50 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  7 02:30:50 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  7 02:30:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  7 02:30:50 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  7 02:30:54 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  7 02:30:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option get auto_update_themes --format=json
Jan  7 02:30:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  7 02:30:55 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  7 02:30:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/public_html/wp-config.php
Jan  7 02:30:55 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  7 02:30:55 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  7 02:30:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  7 02:30:55 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  7 02:30:55 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  7 02:30:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/public_html/.maintenance
Jan  7 02:30:55 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  7 02:30:55 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  7 02:30:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color db-prefix get
Jan  7 02:30:55 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  7 02:30:56 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  7 02:30:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames DirectoryPrivacy is_directory_protected dir=/home/shalinijames/public_html --output=json
Jan  7 02:30:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:30:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:30:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  7 02:30:56 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  7 02:30:56 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  7 02:30:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color wpt-cron event reschedule wp_version_check '+2 day'
Jan  7 02:30:56 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  7 02:30:57 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  7 02:30:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day'
Jan  7 02:30:57 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  7 02:30:57 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  7 02:30:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  7 02:30:57 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  7 02:30:58 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  7 02:30:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  7 02:30:58 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  7 02:30:58 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  7 02:30:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color admin-username is-secure
Jan  7 02:30:58 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  7 02:30:59 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  7 02:30:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  7 02:30:59 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  7 02:30:59 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  7 02:30:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/public_html/wp-config.php
Jan  7 02:30:59 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  7 02:30:59 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  7 02:30:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/stat -c %a /home/shalinijames/public_html/wp-config.php
Jan  7 02:30:59 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  7 02:30:59 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  7 02:30:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color pingbacks is_disabled
Jan  7 02:30:59 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  7 02:30:59 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  7 02:31:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  7 02:31:00 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  7 02:31:00 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  7 02:31:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color security-keys are_keys_correct
Jan  7 02:31:00 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  7 02:31:00 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  7 02:31:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwtestugo --output=json
Jan  7 02:31:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:31:01 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:31:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color instance info --format=json --check-updates=true
Jan  7 02:31:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:31:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:31:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option get auto_update_plugins --format=json
Jan  7 02:31:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:31:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:31:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option get auto_update_themes --format=json
Jan  7 02:31:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:31:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:31:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  7 02:31:08 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:31:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:31:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo LangPHP php_get_vhost_versions --output=json
Jan  7 02:31:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:31:08 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:31:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color instance login-url --skip-plugins=false --format=json
Jan  7 02:31:08 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:31:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:31:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DomainInfo single_domain_data domain=testugo.in return_https_redirect_status=1 --output=json
Jan  7 02:31:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:31:09 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:31:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo Mime list_redirects --output=json
Jan  7 02:31:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:31:09 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:31:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  7 02:31:09 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:31:10 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:31:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option get auto_update_plugins --format=json
Jan  7 02:31:10 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:31:10 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:31:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  7 02:31:10 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:31:14 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:31:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option get auto_update_themes --format=json
Jan  7 02:31:14 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:31:14 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:31:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt1/wp-config.php
Jan  7 02:31:14 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:31:14 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:31:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  7 02:31:14 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:31:15 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:31:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt1/.maintenance
Jan  7 02:31:15 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:31:15 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:31:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color db-prefix get
Jan  7 02:31:15 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:31:15 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:31:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/tt1 --output=json
Jan  7 02:31:15 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:31:15 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:31:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  7 02:31:15 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:31:16 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:31:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color wpt-cron event reschedule wp_version_check '+2 day'
Jan  7 02:31:16 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:31:17 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:31:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day'
Jan  7 02:31:17 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:31:17 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:31:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  7 02:31:17 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:31:17 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:31:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  7 02:31:17 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:31:18 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:31:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color admin-username is-secure
Jan  7 02:31:18 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:31:18 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:31:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  7 02:31:18 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:31:19 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:31:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt1/wp-config.php
Jan  7 02:31:19 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:31:19 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:31:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/stat -c %a /home/wwwtestugo/public_html/tt1/wp-config.php
Jan  7 02:31:19 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:31:19 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:31:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color pingbacks is_disabled
Jan  7 02:31:19 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:31:19 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:31:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  7 02:31:19 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:31:19 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:31:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color security-keys are_keys_correct
Jan  7 02:31:20 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:31:20 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:31:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color instance info --format=json --check-updates=true
Jan  7 02:31:20 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:31:25 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:31:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option get auto_update_plugins --format=json
Jan  7 02:31:25 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:31:25 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:31:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option get auto_update_themes --format=json
Jan  7 02:31:25 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:31:26 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:31:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  7 02:31:26 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:31:26 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:31:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color instance login-url --skip-plugins=false --format=json
Jan  7 02:31:26 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:31:26 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:31:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  7 02:31:26 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:31:27 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:31:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option get auto_update_plugins --format=json
Jan  7 02:31:27 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:31:27 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:31:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  7 02:31:27 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:31:41 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:31:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option get auto_update_themes --format=json
Jan  7 02:31:41 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:31:41 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:31:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt/wp-config.php
Jan  7 02:31:41 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:31:41 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:31:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  7 02:31:41 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:31:42 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:31:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt/.maintenance
Jan  7 02:31:42 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:31:42 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:31:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color db-prefix get
Jan  7 02:31:42 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:31:42 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:31:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/tt --output=json
Jan  7 02:31:42 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:31:42 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:31:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  7 02:31:42 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:31:43 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:31:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color wpt-cron event reschedule wp_version_check '+2 day'
Jan  7 02:31:43 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:31:43 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:31:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day'
Jan  7 02:31:43 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:31:43 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:31:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  7 02:31:44 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:31:44 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:31:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  7 02:31:44 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:31:44 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:31:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color admin-username is-secure
Jan  7 02:31:44 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:31:45 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:31:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  7 02:31:45 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:31:45 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:31:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt/wp-config.php
Jan  7 02:31:45 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:31:45 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:31:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/stat -c %a /home/wwwtestugo/public_html/tt/wp-config.php
Jan  7 02:31:45 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:31:45 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:31:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color pingbacks is_disabled
Jan  7 02:31:45 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:31:46 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:31:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  7 02:31:46 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:31:46 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:31:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color security-keys are_keys_correct
Jan  7 02:31:46 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:31:46 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:31:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color instance info --format=json --check-updates=true
Jan  7 02:31:47 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:32:21 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:32:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option get auto_update_plugins --format=json
Jan  7 02:32:21 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:32:22 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:32:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option get auto_update_themes --format=json
Jan  7 02:32:22 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:32:22 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:32:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  7 02:32:22 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:32:22 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:32:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color instance login-url --skip-plugins=false --format=json
Jan  7 02:32:22 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:32:24 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:32:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  7 02:32:24 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:32:29 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:32:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option get auto_update_plugins --format=json
Jan  7 02:32:29 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:32:29 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:32:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  7 02:32:29 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:32:53 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:32:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option get auto_update_themes --format=json
Jan  7 02:32:53 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:32:53 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:32:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/HYPE/wp-config.php
Jan  7 02:32:53 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:32:53 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:32:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  7 02:32:53 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:32:53 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:32:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/HYPE/.maintenance
Jan  7 02:32:53 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:32:53 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:32:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color db-prefix get
Jan  7 02:32:53 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:32:54 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:32:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/HYPE --output=json
Jan  7 02:32:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:32:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:32:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  7 02:32:54 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:32:54 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:32:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color wpt-cron event reschedule wp_version_check '+2 day'
Jan  7 02:32:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:32:55 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:32:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day'
Jan  7 02:32:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:32:55 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:32:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  7 02:32:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:33:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:33:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  7 02:33:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:33:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:33:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color admin-username is-secure
Jan  7 02:33:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:33:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:33:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  7 02:33:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:33:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:33:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/HYPE/wp-config.php
Jan  7 02:33:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:33:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:33:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/stat -c %a /home/wwwtestugo/public_html/HYPE/wp-config.php
Jan  7 02:33:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:33:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:33:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color pingbacks is_disabled
Jan  7 02:33:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:33:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:33:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  7 02:33:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:33:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:33:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color security-keys are_keys_correct
Jan  7 02:33:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:33:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:33:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=ugotscom --output=json
Jan  7 02:33:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:33:05 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:33:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/boniface/blog && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/boniface/blog --no-color instance info --format=json --check-updates=true
Jan  7 02:33:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 02:33:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 02:33:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DomainInfo single_domain_data domain=ugotechnologies.com return_https_redirect_status=1 --output=json
Jan  7 02:33:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:33:05 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:33:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom Mime list_redirects --output=json
Jan  7 02:33:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:33:05 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:33:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/boniface/blog/wp-includes/version.php
Jan  7 02:33:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 02:33:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 02:33:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/public_html/boniface/blog/wp-includes/version.php
Jan  7 02:33:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 02:33:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 02:33:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  7 02:33:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 02:33:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 02:33:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom LangPHP php_get_vhost_versions --output=json
Jan  7 02:33:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:33:06 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:33:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color instance info --format=json --check-updates=true
Jan  7 02:33:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 02:33:38 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 02:33:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option get auto_update_plugins --format=json
Jan  7 02:33:38 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 02:33:38 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 02:33:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option get auto_update_themes --format=json
Jan  7 02:33:38 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 02:33:39 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 02:33:39 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  7 02:33:39 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 02:33:39 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 02:33:39 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color instance login-url --skip-plugins=false --format=json
Jan  7 02:33:39 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 02:33:39 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 02:33:39 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  7 02:33:39 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 02:33:40 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 02:33:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option get auto_update_plugins --format=json
Jan  7 02:33:40 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 02:33:41 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 02:33:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  7 02:33:41 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 02:33:46 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 02:33:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option get auto_update_themes --format=json
Jan  7 02:33:46 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 02:33:46 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 02:33:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/UGOCRM/ugo_blg/wp-config.php
Jan  7 02:33:46 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 02:33:46 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 02:33:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  7 02:33:46 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 02:33:46 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 02:33:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/UGOCRM/ugo_blg/.maintenance
Jan  7 02:33:46 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 02:33:46 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 02:33:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color db-prefix get
Jan  7 02:33:47 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 02:33:47 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 02:33:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DirectoryPrivacy is_directory_protected dir=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --output=json
Jan  7 02:33:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:33:47 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:33:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  7 02:33:47 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 02:33:47 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 02:33:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color wpt-cron event reschedule wp_version_check '+2 day'
Jan  7 02:33:48 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 02:33:48 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 02:33:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day'
Jan  7 02:33:48 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 02:33:48 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 02:33:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  7 02:33:48 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 02:33:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 02:33:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  7 02:33:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 02:33:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 02:33:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color admin-username is-secure
Jan  7 02:33:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 02:33:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 02:33:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  7 02:33:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 02:33:50 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 02:33:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/UGOCRM/ugo_blg/wp-config.php
Jan  7 02:33:50 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 02:33:50 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 02:33:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/stat -c %a /home/ugotscom/public_html/old/UGOCRM/ugo_blg/wp-config.php
Jan  7 02:33:50 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 02:33:50 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 02:33:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color pingbacks is_disabled
Jan  7 02:33:50 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 02:33:50 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 02:33:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  7 02:33:50 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 02:33:51 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 02:33:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color security-keys are_keys_correct
Jan  7 02:33:51 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 02:33:51 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 02:33:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color instance info --format=json --check-updates=true
Jan  7 02:33:51 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 02:33:55 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 02:33:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option get auto_update_plugins --format=json
Jan  7 02:33:55 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 02:33:55 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 02:33:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option get auto_update_themes --format=json
Jan  7 02:33:55 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 02:33:56 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 02:33:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  7 02:33:56 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 02:33:56 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 02:33:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color instance login-url --skip-plugins=false --format=json
Jan  7 02:33:56 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 02:33:56 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 02:33:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  7 02:33:56 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 02:34:00 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 02:34:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option get auto_update_plugins --format=json
Jan  7 02:34:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 02:34:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 02:34:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  7 02:34:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 02:34:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 02:34:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option get auto_update_themes --format=json
Jan  7 02:34:12 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 02:34:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 02:34:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/site/wp-config.php
Jan  7 02:34:12 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 02:34:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 02:34:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  7 02:34:12 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 02:34:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 02:34:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/site/.maintenance
Jan  7 02:34:13 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 02:34:13 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 02:34:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color db-prefix get
Jan  7 02:34:13 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 02:34:13 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 02:34:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DirectoryPrivacy is_directory_protected dir=/home/ugotscom/public_html/old/site --output=json
Jan  7 02:34:13 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:34:13 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:34:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  7 02:34:13 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 02:34:13 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 02:34:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color wpt-cron event reschedule wp_version_check '+2 day'
Jan  7 02:34:14 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 02:34:14 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 02:34:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day'
Jan  7 02:34:14 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 02:34:14 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 02:34:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  7 02:34:14 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 02:34:15 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 02:34:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  7 02:34:15 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 02:34:15 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 02:34:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color admin-username is-secure
Jan  7 02:34:15 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 02:34:15 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 02:34:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  7 02:34:16 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 02:34:16 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 02:34:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/site/wp-config.php
Jan  7 02:34:16 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 02:34:16 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 02:34:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/stat -c %a /home/ugotscom/public_html/old/site/wp-config.php
Jan  7 02:34:16 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 02:34:16 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 02:34:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color pingbacks is_disabled
Jan  7 02:34:16 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 02:34:16 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 02:34:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  7 02:34:16 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 02:34:17 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 02:34:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color security-keys are_keys_correct
Jan  7 02:34:17 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 02:34:17 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 02:34:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=woodpeck --output=json
Jan  7 02:34:17 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:34:17 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:34:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html/wp && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/woodpeck/public_html/wp --no-color instance info --format=json --check-updates=true
Jan  7 02:34:17 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0)
Jan  7 02:34:17 host sudo: pam_unix(sudo:session): session closed for user woodpeck
Jan  7 02:34:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck DomainInfo single_domain_data domain=woodpeckerindia.com return_https_redirect_status=1 --output=json
Jan  7 02:34:17 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:34:17 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:34:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck Mime list_redirects --output=json
Jan  7 02:34:17 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:34:17 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:34:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/test -e /home/woodpeck/public_html/wp/wp-includes/version.php
Jan  7 02:34:18 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0)
Jan  7 02:34:18 host sudo: pam_unix(sudo:session): session closed for user woodpeck
Jan  7 02:34:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  7 02:34:18 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0)
Jan  7 02:34:18 host sudo: pam_unix(sudo:session): session closed for user woodpeck
Jan  7 02:34:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck LangPHP php_get_vhost_versions --output=json
Jan  7 02:34:18 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:34:18 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:34:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=palco123 --output=json
Jan  7 02:34:18 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:34:18 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:34:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color instance info --format=json --check-updates=true
Jan  7 02:34:18 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  7 02:35:05 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  7 02:35:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false
Jan  7 02:35:05 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  7 02:35:06 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  7 02:35:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false
Jan  7 02:35:06 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  7 02:35:25 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  7 02:35:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  7 02:35:25 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  7 02:35:26 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  7 02:35:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 LangPHP php_get_vhost_versions --output=json
Jan  7 02:35:26 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:35:26 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:35:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color instance login-url --skip-plugins=false --format=json
Jan  7 02:35:26 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  7 02:35:26 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  7 02:35:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 DomainInfo single_domain_data domain=panlys.com return_https_redirect_status=1 --output=json
Jan  7 02:35:26 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:35:27 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:35:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 Mime list_redirects --output=json
Jan  7 02:35:27 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:35:27 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:35:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  7 02:35:27 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  7 02:35:27 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  7 02:35:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false
Jan  7 02:35:28 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  7 02:35:28 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  7 02:35:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  7 02:35:28 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  7 02:36:03 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  7 02:36:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false
Jan  7 02:36:03 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  7 02:36:28 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  7 02:36:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/public_html/wp-config.php
Jan  7 02:36:28 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  7 02:36:28 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  7 02:36:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  7 02:36:28 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  7 02:36:28 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  7 02:36:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/public_html/.maintenance
Jan  7 02:36:28 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  7 02:36:28 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  7 02:36:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color db-prefix get
Jan  7 02:36:28 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  7 02:36:29 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  7 02:36:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 DirectoryPrivacy is_directory_protected dir=/home/palco123/public_html --output=json
Jan  7 02:36:29 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:36:29 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:36:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  7 02:36:29 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  7 02:36:29 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  7 02:36:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color option get auto_update_core_major
Jan  7 02:36:29 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  7 02:36:30 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  7 02:36:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color wpt-cron event reschedule wp_version_check '+2 day'
Jan  7 02:36:30 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  7 02:36:31 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  7 02:36:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day'
Jan  7 02:36:31 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  7 02:36:31 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  7 02:36:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color admin-username is-secure
Jan  7 02:36:31 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  7 02:36:32 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  7 02:36:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  7 02:36:32 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  7 02:36:32 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  7 02:36:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/public_html/wp-config.php
Jan  7 02:36:32 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  7 02:36:32 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  7 02:36:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/stat -c %a /home/palco123/public_html/wp-config.php
Jan  7 02:36:32 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  7 02:36:32 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  7 02:36:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color pingbacks is_disabled
Jan  7 02:36:32 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  7 02:36:33 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  7 02:36:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  7 02:36:33 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  7 02:36:33 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  7 02:36:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color security-keys are_keys_correct
Jan  7 02:36:33 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  7 02:36:34 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  7 02:36:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwresourcehunte --output=json
Jan  7 02:36:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:36:34 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:36:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color instance info --format=json --check-updates=true
Jan  7 02:36:34 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  7 02:37:34 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  7 02:37:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwkaretakers WpToolkitNotification send_admin_suspicious_instance_notification 'suspicious_instance_text=The following WordPress installations are quarantined:<br/>' 'suspicious_instance_details_info=Website "Resource Hunters" (http://resourcehunters.com): WP Toolkit was not able to finish running an operation on this site in 60 seconds, so the operation was terminated. This could mean that your WordPress installation might be infected with malware. Check the wp-config.php file of the installation for potential malware code or run an anti-virus scan. If you cannot find any traces of malware, try running the operation again later.' --output=json
Jan  7 02:37:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:37:34 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:37:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte DomainInfo single_domain_data domain=resourcehunters.com return_https_redirect_status=1 --output=json
Jan  7 02:37:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:37:34 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:37:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte Mime list_redirects --output=json
Jan  7 02:37:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:37:34 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:37:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/test -e /home/wwwresourcehunte/public_html/wp-includes/version.php
Jan  7 02:37:34 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  7 02:37:34 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  7 02:37:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/cat /home/wwwresourcehunte/public_html/wp-includes/version.php
Jan  7 02:37:34 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  7 02:37:34 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  7 02:37:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  7 02:37:34 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  7 02:37:34 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  7 02:37:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte LangPHP php_get_vhost_versions --output=json
Jan  7 02:37:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:37:35 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:37:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwkaretakers WpToolkitNotification send_admin_auto_updates_notification available_updates_text= available_updates_list= installed_updates_text= installed_updates_list= 'failure_updates_text=Updates were not installed for the following items:<br/><br/>' 'failure_updates_list=1. Website "EVM Honda Cochin" (http://www.evmhonda.com): Failed to reset cache for the instance #1: Fatal error: Uncaught Error: Call to undefined function cardealer_is_wpml_active() in /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-options.php:1041#012Stack trace:#012#0 /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-init.php(22): require_once()#012#1 /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/cardealer-helper-library.php(183):
Jan  7 02:37:35 host sudo: wp-toolkit : (command continued) require_once('"'"'/home/wwwevmhon...'"'"')#012#2 /home/wwwevmhonda/public_html/wp-includes/class-wp-hook.php(287): cdhl_include_admin_files('"'"''"'"')#012#3 /home/wwwevmhonda/public_html/wp-includes/class-wp-hook.php(311): WP_Hook->apply_filters(NULL, Array)#012#4 /home/wwwevmhonda/public_html/wp-includes/plugin.php(478): WP_Hook->do_action(Array)#012#5 /home/wwwevmhonda/public_html/wp-settings.php(546): do_action('"'"'init'"'"')#012#6 /usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/vendor/wp-cli/wp-cli/php/WP_CLI/Runner.php(1356): require('"'"'/home/wwwevmhon...'"'"')#012#7 /usr/local/cpanel/3rdparty/wp-toolkit/plib/ve in /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-options.php on line 1041#012Error: There has been a critical error on your website.Learn more about debugging in WordPress. There has been a critical error on your website.#012<br/><br/>2. Website
Jan  7 02:37:35 host sudo: wp-toolkit : (command continued) "/home/mrsclean/public_html/backup" (http://mrsclean.co.in/backup): Failed to reset cache for the instance #5: Error: Error establishing a database connection. This either means that the username and password information in your `wp-config.php` file is incorrect or we can’t contact the database server at `localhost`. This could mean your host’s database server is down.#012<br/><br/>3. Website "/home/mrsclean/public_html/blog" (http://mrsclean.co.in/blog): Failed to reset cache for the instance #6: Error: Error establishing a database connection. This either means that the username and password information in your `wp-config.php` file is incorrect or we can’t contact the database server at `localhost`. This could mean your host’s database server is down.#012<br/><br/>4. Website "/home/ugotscom/public_html/boniface/blog" (http://ugotechnologies.com/boniface/blog): Failed to reset cache for the instance #13:
Jan  7 02:37:35 host sudo: wp-toolkit : (command continued) Error: Error establishing a database connection.#012<br/><br/>5. Website "/home/woodpeck/public_html/wp" (http://woodpeckerindia.com/wp): Failed to reset cache for the instance #16: /bin/sh: line 0: cd: /home/woodpeck/public_html/wp: No such file or directory#012<br/><br/>6. Website "/home/wwwresourcehunte/public_html" (http://resourcehunters.com): Failed to reset cache for the instance #18: WP Toolkit was not able to finish running an operation on this site in 60 seconds, so the operation was terminated. This could mean that your WordPress installation might be infected with malware. Check the wp-config.php file of the installation for potential malware code or run an anti-virus scan. If you cannot find any traces of malware, try running the operation again later.<br/><br/>' --output=json
Jan  7 02:37:35 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:37:35 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:37:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color cli cache clear
Jan  7 02:37:35 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  7 02:37:35 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  7 02:37:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color cli cache clear
Jan  7 02:37:35 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  7 02:37:35 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  7 02:37:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/backup && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/mrsclean/public_html/backup --no-color cli cache clear
Jan  7 02:37:35 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  7 02:37:35 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  7 02:37:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/blog && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/mrsclean/public_html/blog --no-color cli cache clear
Jan  7 02:37:35 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  7 02:37:36 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  7 02:37:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color cli cache clear
Jan  7 02:37:36 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  7 02:37:36 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  7 02:37:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color cli cache clear
Jan  7 02:37:36 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:37:36 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:37:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color cli cache clear
Jan  7 02:37:36 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:37:36 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:37:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color cli cache clear
Jan  7 02:37:36 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:37:36 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:37:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/boniface/blog && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/boniface/blog --no-color cli cache clear
Jan  7 02:37:36 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 02:37:37 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 02:37:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color cli cache clear
Jan  7 02:37:37 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 02:37:37 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 02:37:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color cli cache clear
Jan  7 02:37:37 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 02:37:37 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 02:37:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html/wp && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/woodpeck/public_html/wp --no-color cli cache clear
Jan  7 02:37:37 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0)
Jan  7 02:37:37 host sudo: pam_unix(sudo:session): session closed for user woodpeck
Jan  7 02:37:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color cli cache clear
Jan  7 02:37:37 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  7 02:37:37 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  7 02:37:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color cli cache clear
Jan  7 02:37:37 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  7 02:37:37 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  7 02:37:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet
Jan  7 02:37:37 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  7 02:37:38 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  7 02:37:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet
Jan  7 02:37:38 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  7 02:37:38 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  7 02:37:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet
Jan  7 02:37:38 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  7 02:37:39 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  7 02:37:39 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet
Jan  7 02:37:39 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:37:40 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:37:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet
Jan  7 02:37:40 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:37:40 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:37:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet
Jan  7 02:37:40 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 02:37:41 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 02:37:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet
Jan  7 02:37:41 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 02:37:41 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 02:37:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet
Jan  7 02:37:41 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 02:37:41 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 02:37:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet
Jan  7 02:37:41 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  7 02:37:42 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  7 02:37:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet
Jan  7 02:37:42 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  7 02:37:42 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  7 02:37:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c httpd -v
Jan  7 02:37:42 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:37:42 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:37:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwevmhonda/evmhonda.com/wp-toolkit.conf
Jan  7 02:37:42 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:37:42 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:37:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwevmhonda/evmhonda.com/wp-toolkit.conf
Jan  7 02:37:42 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:37:42 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:37:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwevmhonda/evmhonda.com/wp-toolkit.conf
Jan  7 02:37:42 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:37:42 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:37:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwevmhonda/evmhonda.com/wp-toolkit.conf
Jan  7 02:37:42 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:37:42 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:37:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf
Jan  7 02:37:42 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:37:42 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:37:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf
Jan  7 02:37:42 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:37:42 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:37:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf
Jan  7 02:37:42 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:37:42 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:37:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf
Jan  7 02:37:42 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:37:42 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:37:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/shalinijames/shalinijames.com/wp-toolkit.conf
Jan  7 02:37:42 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:37:42 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:37:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/shalinijames/shalinijames.com/wp-toolkit.conf
Jan  7 02:37:42 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:37:42 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:37:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/shalinijames/shalinijames.com/wp-toolkit.conf
Jan  7 02:37:43 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:37:43 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:37:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/shalinijames/shalinijames.com/wp-toolkit.conf
Jan  7 02:37:43 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:37:43 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:37:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  7 02:37:43 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:37:43 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:37:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  7 02:37:43 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:37:43 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:37:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  7 02:37:43 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:37:43 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:37:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  7 02:37:43 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:37:43 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:37:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  7 02:37:43 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:37:43 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:37:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  7 02:37:43 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:37:43 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:37:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  7 02:37:43 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:37:43 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:37:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  7 02:37:43 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:37:43 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:37:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  7 02:37:43 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:37:43 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:37:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  7 02:37:43 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:37:43 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:37:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  7 02:37:43 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:37:43 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:37:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  7 02:37:43 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:37:43 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:37:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf
Jan  7 02:37:43 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:37:43 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:37:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf
Jan  7 02:37:43 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:37:43 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:37:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf
Jan  7 02:37:43 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:37:43 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:37:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf
Jan  7 02:37:43 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:37:43 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:37:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf
Jan  7 02:37:43 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:37:43 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:37:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf
Jan  7 02:37:43 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:37:43 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:37:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf
Jan  7 02:37:43 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:37:43 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:37:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf
Jan  7 02:37:43 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:37:43 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:37:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/palco123/panlys.com/wp-toolkit.conf
Jan  7 02:37:43 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:37:43 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:37:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/palco123/panlys.com/wp-toolkit.conf
Jan  7 02:37:43 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:37:43 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:37:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/palco123/panlys.com/wp-toolkit.conf
Jan  7 02:37:43 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:37:43 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:37:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/palco123/panlys.com/wp-toolkit.conf
Jan  7 02:37:43 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:37:43 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:37:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf
Jan  7 02:37:43 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:37:43 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:37:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf
Jan  7 02:37:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:37:44 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:37:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf
Jan  7 02:37:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:37:44 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:37:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf
Jan  7 02:37:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 02:37:44 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 02:53:18 host sshd[20285]: Did not receive identification string from 149.129.220.222 port 61000
Jan  7 03:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  7 03:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 03:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 03:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  7 03:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 03:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 03:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  7 03:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 03:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 03:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  7 03:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 03:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 03:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  7 03:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 03:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 03:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  7 03:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 03:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 03:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  7 03:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 03:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 03:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  7 03:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 03:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 03:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  7 03:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 03:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 03:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  7 03:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 03:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 03:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  7 03:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 03:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 03:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  7 03:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 03:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 03:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  7 03:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 03:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 03:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=shalinijames user-2=wwwtestugo user-3=vfmassets user-4=pmcresources user-5=wwwkmaorg user-6=remysagr user-7=disposeat user-8=woodpeck user-9=wwwkapin user-10=kottayamcalldriv user-11=phmetals user-12=palco123 user-13=gifterman user-14=mrsclean user-15=wwwnexidigital user-16=wwwevmhonda user-17=bonifacegroup user-18=straightcurve user-19=wwwletsstalkfood user-20=a2zgroup user-21=dartsimp user-22=laundryboniface user-23=cochintaxi user-24=wwwkaretakers user-25=travelboniface user-26=ugotscom user-27=keralaholi user-28=wwwresourcehunte user-29=wwwrmswll user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  7 03:21:54 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  7 03:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 03:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 03:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  7 03:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 03:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 03:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-G50dmfbYFKhiXSdd.~
Jan  7 03:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 03:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 03:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-G50dmfbYFKhiXSdd.~'
Jan  7 03:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 03:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 03:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-G50dmfbYFKhiXSdd.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  7 03:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 03:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 03:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  7 03:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 03:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 03:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  7 03:21:55 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 03:21:55 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 03:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  7 03:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 03:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 03:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  7 03:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 03:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 03:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  7 03:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 03:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 03:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  7 03:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 03:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 03:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  7 03:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 03:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 03:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  7 03:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  7 03:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  7 03:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  7 03:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  7 03:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  7 03:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  7 03:21:59 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  7 03:22:01 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  7 03:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  7 03:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 03:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 03:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  7 03:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 03:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 03:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  7 03:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 03:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 03:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  7 03:22:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 03:22:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 03:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  7 03:22:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 03:22:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 03:45:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  7 03:45:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 03:45:01 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 03:45:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  7 03:45:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 03:45:01 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 03:45:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  7 03:45:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 03:45:01 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 03:45:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  7 03:45:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 03:45:02 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 03:45:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  7 03:45:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 03:45:02 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 03:45:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  7 03:45:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 03:45:02 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 03:45:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  7 03:45:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 03:45:02 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 04:16:15 host sshd[14504]: Invalid user oracle from 91.239.206.219 port 46752
Jan  7 04:16:15 host sshd[14504]: input_userauth_request: invalid user oracle [preauth]
Jan  7 04:16:15 host sshd[14504]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 04:16:15 host sshd[14504]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.239.206.219
Jan  7 04:16:17 host sshd[14504]: Failed password for invalid user oracle from 91.239.206.219 port 46752 ssh2
Jan  7 04:16:17 host sshd[14504]: Received disconnect from 91.239.206.219 port 46752:11: Bye Bye [preauth]
Jan  7 04:16:17 host sshd[14504]: Disconnected from 91.239.206.219 port 46752 [preauth]
Jan  7 04:20:05 host sshd[15131]: Invalid user matt from 91.239.206.219 port 38536
Jan  7 04:20:05 host sshd[15131]: input_userauth_request: invalid user matt [preauth]
Jan  7 04:20:05 host sshd[15131]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 04:20:05 host sshd[15131]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.239.206.219
Jan  7 04:20:08 host sshd[15131]: Failed password for invalid user matt from 91.239.206.219 port 38536 ssh2
Jan  7 04:20:08 host sshd[15131]: Received disconnect from 91.239.206.219 port 38536:11: Bye Bye [preauth]
Jan  7 04:20:08 host sshd[15131]: Disconnected from 91.239.206.219 port 38536 [preauth]
Jan  7 04:21:26 host sshd[15398]: Invalid user smrtanalysis from 91.239.206.219 port 36002
Jan  7 04:21:26 host sshd[15398]: input_userauth_request: invalid user smrtanalysis [preauth]
Jan  7 04:21:26 host sshd[15398]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 04:21:26 host sshd[15398]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.239.206.219
Jan  7 04:21:28 host sshd[15398]: Failed password for invalid user smrtanalysis from 91.239.206.219 port 36002 ssh2
Jan  7 04:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  7 04:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 04:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 04:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  7 04:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 04:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 04:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  7 04:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 04:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 04:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  7 04:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 04:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 04:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  7 04:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 04:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 04:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  7 04:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 04:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 04:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  7 04:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 04:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 04:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  7 04:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 04:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 04:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  7 04:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 04:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 04:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  7 04:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 04:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 04:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  7 04:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 04:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 04:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  7 04:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 04:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 04:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  7 04:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 04:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 04:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=travelboniface user-3=ugotscom user-4=wwwresourcehunte user-5=keralaholi user-6=wwwrmswll user-7=cochintaxi user-8=wwwkaretakers user-9=a2zgroup user-10=dartsimp user-11=laundryboniface user-12=wwwevmhonda user-13=bonifacegroup user-14=straightcurve user-15=wwwletsstalkfood user-16=kottayamcalldriv user-17=phmetals user-18=palco123 user-19=gifterman user-20=mrsclean user-21=wwwnexidigital user-22=wwwkmaorg user-23=remysagr user-24=disposeat user-25=woodpeck user-26=wwwkapin user-27=shalinijames user-28=wwwtestugo user-29=vfmassets user-30=pmcresources feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  7 04:21:54 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  7 04:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 04:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 04:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  7 04:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 04:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 04:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-GHoH4oFPb5dL3j9l.~
Jan  7 04:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 04:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 04:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-GHoH4oFPb5dL3j9l.~'
Jan  7 04:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 04:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 04:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-GHoH4oFPb5dL3j9l.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  7 04:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 04:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 04:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  7 04:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 04:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 04:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  7 04:21:55 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 04:21:55 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 04:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  7 04:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 04:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 04:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  7 04:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 04:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 04:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  7 04:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 04:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 04:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  7 04:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 04:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 04:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  7 04:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 04:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 04:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  7 04:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  7 04:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  7 04:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  7 04:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  7 04:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  7 04:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  7 04:22:02 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  7 04:22:09 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  7 04:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  7 04:22:09 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 04:22:11 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 04:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  7 04:22:11 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 04:22:11 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 04:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  7 04:22:11 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 04:22:16 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 04:22:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  7 04:22:17 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 04:22:18 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 04:22:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  7 04:22:18 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 04:22:19 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 04:43:46 host sshd[19180]: Did not receive identification string from 167.71.166.243 port 43994
Jan  7 04:48:45 host sshd[20015]: Invalid user aq from 194.110.203.109 port 59634
Jan  7 04:48:45 host sshd[20015]: input_userauth_request: invalid user aq [preauth]
Jan  7 04:48:45 host sshd[20015]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 04:48:45 host sshd[20015]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109
Jan  7 04:48:47 host sshd[20015]: Failed password for invalid user aq from 194.110.203.109 port 59634 ssh2
Jan  7 04:48:50 host sshd[20015]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 04:48:52 host sshd[20015]: Failed password for invalid user aq from 194.110.203.109 port 59634 ssh2
Jan  7 04:48:55 host sshd[20015]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 04:48:57 host sshd[20015]: Failed password for invalid user aq from 194.110.203.109 port 59634 ssh2
Jan  7 04:49:01 host sshd[20015]: Connection closed by 194.110.203.109 port 59634 [preauth]
Jan  7 04:49:01 host sshd[20015]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109
Jan  7 04:49:38 host sshd[20190]: Invalid user ralph from 107.189.30.59 port 59654
Jan  7 04:49:38 host sshd[20190]: input_userauth_request: invalid user ralph [preauth]
Jan  7 04:49:38 host sshd[20190]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 04:49:38 host sshd[20190]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59
Jan  7 04:49:40 host sshd[20190]: Failed password for invalid user ralph from 107.189.30.59 port 59654 ssh2
Jan  7 04:49:41 host sshd[20190]: Connection closed by 107.189.30.59 port 59654 [preauth]
Jan  7 04:51:12 host sshd[20614]: Invalid user admin from 109.167.200.10 port 50364
Jan  7 04:51:12 host sshd[20614]: input_userauth_request: invalid user admin [preauth]
Jan  7 04:51:12 host sshd[20614]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 04:51:12 host sshd[20614]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.167.200.10
Jan  7 04:51:13 host sshd[20614]: Failed password for invalid user admin from 109.167.200.10 port 50364 ssh2
Jan  7 04:51:14 host sshd[20614]: Received disconnect from 109.167.200.10 port 50364:11: Bye Bye [preauth]
Jan  7 04:51:14 host sshd[20614]: Disconnected from 109.167.200.10 port 50364 [preauth]
Jan  7 04:52:59 host sshd[20989]: Invalid user francis from 202.83.17.160 port 36640
Jan  7 04:52:59 host sshd[20989]: input_userauth_request: invalid user francis [preauth]
Jan  7 04:52:59 host sshd[20989]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 04:52:59 host sshd[20989]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.83.17.160
Jan  7 04:53:01 host sshd[20989]: Failed password for invalid user francis from 202.83.17.160 port 36640 ssh2
Jan  7 04:53:01 host sshd[20989]: Received disconnect from 202.83.17.160 port 36640:11: Bye Bye [preauth]
Jan  7 04:53:01 host sshd[20989]: Disconnected from 202.83.17.160 port 36640 [preauth]
Jan  7 04:55:25 host sshd[21438]: Connection closed by 167.71.166.243 port 47494 [preauth]
Jan  7 04:57:01 host sshd[21981]: Invalid user zhangh from 202.83.17.160 port 57924
Jan  7 04:57:01 host sshd[21981]: input_userauth_request: invalid user zhangh [preauth]
Jan  7 04:57:01 host sshd[21981]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 04:57:01 host sshd[21981]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.83.17.160
Jan  7 04:57:03 host sshd[21981]: Failed password for invalid user zhangh from 202.83.17.160 port 57924 ssh2
Jan  7 04:57:03 host sshd[21981]: Received disconnect from 202.83.17.160 port 57924:11: Bye Bye [preauth]
Jan  7 04:57:03 host sshd[21981]: Disconnected from 202.83.17.160 port 57924 [preauth]
Jan  7 04:57:33 host sshd[22112]: Invalid user media from 109.167.200.10 port 50582
Jan  7 04:57:33 host sshd[22112]: input_userauth_request: invalid user media [preauth]
Jan  7 04:57:33 host sshd[22112]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 04:57:33 host sshd[22112]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.167.200.10
Jan  7 04:57:35 host sshd[22112]: Failed password for invalid user media from 109.167.200.10 port 50582 ssh2
Jan  7 04:57:35 host sshd[22112]: Received disconnect from 109.167.200.10 port 50582:11: Bye Bye [preauth]
Jan  7 04:57:35 host sshd[22112]: Disconnected from 109.167.200.10 port 50582 [preauth]
Jan  7 04:58:32 host sshd[22311]: Invalid user ubuntu from 202.83.17.160 port 43369
Jan  7 04:58:32 host sshd[22311]: input_userauth_request: invalid user ubuntu [preauth]
Jan  7 04:58:32 host sshd[22311]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 04:58:32 host sshd[22311]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.83.17.160
Jan  7 04:58:34 host sshd[22311]: Failed password for invalid user ubuntu from 202.83.17.160 port 43369 ssh2
Jan  7 04:58:34 host sshd[22311]: Received disconnect from 202.83.17.160 port 43369:11: Bye Bye [preauth]
Jan  7 04:58:34 host sshd[22311]: Disconnected from 202.83.17.160 port 43369 [preauth]
Jan  7 04:58:37 host sshd[22375]: Invalid user fujii from 109.167.200.10 port 44520
Jan  7 04:58:37 host sshd[22375]: input_userauth_request: invalid user fujii [preauth]
Jan  7 04:58:37 host sshd[22375]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 04:58:37 host sshd[22375]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.167.200.10
Jan  7 04:58:38 host sshd[22375]: Failed password for invalid user fujii from 109.167.200.10 port 44520 ssh2
Jan  7 04:58:38 host sshd[22375]: Received disconnect from 109.167.200.10 port 44520:11: Bye Bye [preauth]
Jan  7 04:58:38 host sshd[22375]: Disconnected from 109.167.200.10 port 44520 [preauth]
Jan  7 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  7 05:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 05:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  7 05:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 05:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  7 05:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 05:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  7 05:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 05:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  7 05:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 05:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  7 05:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 05:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  7 05:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 05:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  7 05:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 05:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  7 05:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 05:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  7 05:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 05:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  7 05:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 05:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  7 05:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 05:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  7 05:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 05:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=pmcresources user-2=vfmassets user-3=wwwtestugo user-4=shalinijames user-5=wwwkapin user-6=woodpeck user-7=disposeat user-8=wwwkmaorg user-9=remysagr user-10=wwwnexidigital user-11=mrsclean user-12=gifterman user-13=palco123 user-14=phmetals user-15=kottayamcalldriv user-16=wwwletsstalkfood user-17=straightcurve user-18=bonifacegroup user-19=wwwevmhonda user-20=laundryboniface user-21=dartsimp user-22=a2zgroup user-23=wwwkaretakers user-24=cochintaxi user-25=wwwrmswll user-26=wwwresourcehunte user-27=keralaholi user-28=ugotscom user-29=travelboniface user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  7 05:21:54 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  7 05:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 05:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  7 05:21:54 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 05:21:54 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=evmhonda.com --output=json
Jan  7 05:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 05:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/test -e /home/wwwevmhonda/wordpress-backups
Jan  7 05:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  7 05:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  7 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && find -H /home/wwwevmhonda/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  7 05:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  7 05:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  7 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=letsstalkfood.com --output=json
Jan  7 05:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 05:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/wordpress-backups
Jan  7 05:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  7 05:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  7 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && find -H /home/wwwletsstalkfood/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  7 05:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  7 05:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  7 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=mrsclean.co.in --output=json
Jan  7 05:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 05:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/wordpress-backups
Jan  7 05:21:55 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  7 05:21:55 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  7 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/backup && find -H /home/mrsclean/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  7 05:21:55 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  7 05:21:55 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  7 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/wordpress-backups
Jan  7 05:21:55 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  7 05:21:55 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  7 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/blog && find -H /home/mrsclean/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  7 05:21:55 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  7 05:21:55 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  7 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=shalinijames.com --output=json
Jan  7 05:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 05:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/wordpress-backups
Jan  7 05:21:55 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  7 05:21:55 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  7 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && find -H /home/shalinijames/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  7 05:21:55 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  7 05:21:55 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  7 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=testugo.in --output=json
Jan  7 05:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 05:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups
Jan  7 05:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 05:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && find -H /home/wwwtestugo/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  7 05:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 05:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups
Jan  7 05:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 05:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && find -H /home/wwwtestugo/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  7 05:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 05:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups
Jan  7 05:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 05:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && find -H /home/wwwtestugo/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  7 05:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 05:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=ugotechnologies.com --output=json
Jan  7 05:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 05:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups
Jan  7 05:21:56 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 05:21:56 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/boniface/blog && find -H /home/ugotscom/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  7 05:21:56 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 05:21:56 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups
Jan  7 05:21:56 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 05:21:56 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && find -H /home/ugotscom/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  7 05:21:56 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 05:21:56 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups
Jan  7 05:21:56 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 05:21:56 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && find -H /home/ugotscom/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  7 05:21:56 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 05:21:56 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=woodpeckerindia.com --output=json
Jan  7 05:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 05:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/test -e /home/woodpeck/wordpress-backups
Jan  7 05:21:56 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0)
Jan  7 05:21:56 host sudo: pam_unix(sudo:session): session closed for user woodpeck
Jan  7 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html/wp && find -H /home/woodpeck/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  7 05:21:56 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0)
Jan  7 05:21:56 host sudo: pam_unix(sudo:session): session closed for user woodpeck
Jan  7 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=panlys.com --output=json
Jan  7 05:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 05:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/wordpress-backups
Jan  7 05:21:56 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  7 05:21:56 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  7 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && find -H /home/palco123/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  7 05:21:56 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  7 05:21:56 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  7 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=resourcehunters.com --output=json
Jan  7 05:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 05:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/test -e /home/wwwresourcehunte/wordpress-backups
Jan  7 05:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  7 05:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  7 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && find -H /home/wwwresourcehunte/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0'
Jan  7 05:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  7 05:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  7 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /var/cpanel/licenseid_credentials.json
Jan  7 05:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 05:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  7 05:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 05:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=pmcresources ; COMMAND=/bin/cat /home/pmcresources/.wp-toolkit-identifier
Jan  7 05:21:56 host sudo: pam_unix(sudo:session): session opened for user pmcresources by (uid=0)
Jan  7 05:21:56 host sudo: pam_unix(sudo:session): session closed for user pmcresources
Jan  7 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=vfmassets ; COMMAND=/bin/cat /home/vfmassets/.wp-toolkit-identifier
Jan  7 05:21:57 host sudo: pam_unix(sudo:session): session opened for user vfmassets by (uid=0)
Jan  7 05:21:57 host sudo: pam_unix(sudo:session): session closed for user vfmassets
Jan  7 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/cat /home/wwwtestugo/.wp-toolkit-identifier
Jan  7 05:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 05:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/cat /home/shalinijames/.wp-toolkit-identifier
Jan  7 05:21:57 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  7 05:21:57 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  7 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkapin ; COMMAND=/bin/cat /home/wwwkapin/.wp-toolkit-identifier
Jan  7 05:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwkapin by (uid=0)
Jan  7 05:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwkapin
Jan  7 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/cat /home/woodpeck/.wp-toolkit-identifier
Jan  7 05:21:57 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0)
Jan  7 05:21:57 host sudo: pam_unix(sudo:session): session closed for user woodpeck
Jan  7 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=disposeat ; COMMAND=/bin/cat /home/disposeat/.wp-toolkit-identifier
Jan  7 05:21:57 host sudo: pam_unix(sudo:session): session opened for user disposeat by (uid=0)
Jan  7 05:21:57 host sudo: pam_unix(sudo:session): session closed for user disposeat
Jan  7 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkmaorg ; COMMAND=/bin/cat /home/wwwkmaorg/.wp-toolkit-identifier
Jan  7 05:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwkmaorg by (uid=0)
Jan  7 05:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwkmaorg
Jan  7 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=remysagr ; COMMAND=/bin/cat /home/remysagr/.wp-toolkit-identifier
Jan  7 05:21:57 host sudo: pam_unix(sudo:session): session opened for user remysagr by (uid=0)
Jan  7 05:21:57 host sudo: pam_unix(sudo:session): session closed for user remysagr
Jan  7 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwnexidigital ; COMMAND=/bin/cat /home/wwwnexidigital/.wp-toolkit-identifier
Jan  7 05:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwnexidigital by (uid=0)
Jan  7 05:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwnexidigital
Jan  7 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/cat /home/mrsclean/.wp-toolkit-identifier
Jan  7 05:21:57 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  7 05:21:57 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  7 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=gifterman ; COMMAND=/bin/cat /home/gifterman/.wp-toolkit-identifier
Jan  7 05:21:57 host sudo: pam_unix(sudo:session): session opened for user gifterman by (uid=0)
Jan  7 05:21:57 host sudo: pam_unix(sudo:session): session closed for user gifterman
Jan  7 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/cat /home/palco123/.wp-toolkit-identifier
Jan  7 05:21:57 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  7 05:21:57 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  7 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=phmetals ; COMMAND=/bin/cat /home/phmetals/.wp-toolkit-identifier
Jan  7 05:21:57 host sudo: pam_unix(sudo:session): session opened for user phmetals by (uid=0)
Jan  7 05:21:57 host sudo: pam_unix(sudo:session): session closed for user phmetals
Jan  7 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=kottayamcalldriv ; COMMAND=/bin/cat /home/kottayamcalldriv/.wp-toolkit-identifier
Jan  7 05:21:57 host sudo: pam_unix(sudo:session): session opened for user kottayamcalldriv by (uid=0)
Jan  7 05:21:57 host sudo: pam_unix(sudo:session): session closed for user kottayamcalldriv
Jan  7 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/cat /home/wwwletsstalkfood/.wp-toolkit-identifier
Jan  7 05:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  7 05:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  7 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=straightcurve ; COMMAND=/bin/cat /home/straightcurve/.wp-toolkit-identifier
Jan  7 05:21:57 host sudo: pam_unix(sudo:session): session opened for user straightcurve by (uid=0)
Jan  7 05:21:57 host sudo: pam_unix(sudo:session): session closed for user straightcurve
Jan  7 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=bonifacegroup ; COMMAND=/bin/cat /home/bonifacegroup/.wp-toolkit-identifier
Jan  7 05:21:57 host sudo: pam_unix(sudo:session): session opened for user bonifacegroup by (uid=0)
Jan  7 05:21:57 host sudo: pam_unix(sudo:session): session closed for user bonifacegroup
Jan  7 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/cat /home/wwwevmhonda/.wp-toolkit-identifier
Jan  7 05:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  7 05:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  7 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=laundryboniface ; COMMAND=/bin/cat /home/laundryboniface/.wp-toolkit-identifier
Jan  7 05:21:57 host sudo: pam_unix(sudo:session): session opened for user laundryboniface by (uid=0)
Jan  7 05:21:57 host sudo: pam_unix(sudo:session): session closed for user laundryboniface
Jan  7 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=dartsimp ; COMMAND=/bin/cat /home/dartsimp/.wp-toolkit-identifier
Jan  7 05:21:57 host sudo: pam_unix(sudo:session): session opened for user dartsimp by (uid=0)
Jan  7 05:21:57 host sudo: pam_unix(sudo:session): session closed for user dartsimp
Jan  7 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=a2zgroup ; COMMAND=/bin/cat /home/a2zgroup/.wp-toolkit-identifier
Jan  7 05:21:57 host sudo: pam_unix(sudo:session): session opened for user a2zgroup by (uid=0)
Jan  7 05:21:57 host sudo: pam_unix(sudo:session): session closed for user a2zgroup
Jan  7 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkaretakers ; COMMAND=/bin/cat /home/wwwkaretakers/.wp-toolkit-identifier
Jan  7 05:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwkaretakers by (uid=0)
Jan  7 05:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwkaretakers
Jan  7 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=cochintaxi ; COMMAND=/bin/cat /home/cochintaxi/.wp-toolkit-identifier
Jan  7 05:21:57 host sudo: pam_unix(sudo:session): session opened for user cochintaxi by (uid=0)
Jan  7 05:21:57 host sudo: pam_unix(sudo:session): session closed for user cochintaxi
Jan  7 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwrmswll ; COMMAND=/bin/cat /home/wwwrmswll/.wp-toolkit-identifier
Jan  7 05:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwrmswll by (uid=0)
Jan  7 05:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwrmswll
Jan  7 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/cat /home/wwwresourcehunte/.wp-toolkit-identifier
Jan  7 05:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  7 05:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  7 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/cat /home/keralaholi/.wp-toolkit-identifier
Jan  7 05:21:58 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0)
Jan  7 05:21:58 host sudo: pam_unix(sudo:session): session closed for user keralaholi
Jan  7 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -f /home/keralaholi/.wp-toolkit-identifier
Jan  7 05:21:58 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0)
Jan  7 05:21:58 host sudo: pam_unix(sudo:session): session closed for user keralaholi
Jan  7 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -e /home/keralaholi/-wpt-tmp-pSWn9sBkdC97GxAj.wp-toolkit-identifier
Jan  7 05:21:58 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0)
Jan  7 05:21:58 host sudo: pam_unix(sudo:session): session closed for user keralaholi
Jan  7 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/sh -c cat > /home/keralaholi/-wpt-tmp-pSWn9sBkdC97GxAj.wp-toolkit-identifier
Jan  7 05:21:58 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0)
Jan  7 05:21:58 host sudo: pam_unix(sudo:session): session closed for user keralaholi
Jan  7 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=travelboniface ; COMMAND=/bin/cat /home/travelboniface/.wp-toolkit-identifier
Jan  7 05:21:58 host sudo: pam_unix(sudo:session): session opened for user travelboniface by (uid=0)
Jan  7 05:21:58 host sudo: pam_unix(sudo:session): session closed for user travelboniface
Jan  7 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwpmcresource ; COMMAND=/bin/cat /home/wwwpmcresource/.wp-toolkit-identifier
Jan  7 05:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwpmcresource by (uid=0)
Jan  7 05:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwpmcresource
Jan  7 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/cat /home/keralaholi/.wp-toolkit-identifier
Jan  7 05:21:58 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0)
Jan  7 05:21:58 host sudo: pam_unix(sudo:session): session closed for user keralaholi
Jan  7 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -f /home/keralaholi/.wp-toolkit-identifier
Jan  7 05:21:58 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0)
Jan  7 05:21:58 host sudo: pam_unix(sudo:session): session closed for user keralaholi
Jan  7 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -e /home/keralaholi/-wpt-tmp-saPx3eI46L9yqT2u.wp-toolkit-identifier
Jan  7 05:21:58 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0)
Jan  7 05:21:58 host sudo: pam_unix(sudo:session): session closed for user keralaholi
Jan  7 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/sh -c cat > /home/keralaholi/-wpt-tmp-saPx3eI46L9yqT2u.wp-toolkit-identifier
Jan  7 05:21:58 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0)
Jan  7 05:21:58 host sudo: pam_unix(sudo:session): session closed for user keralaholi
Jan  7 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_shared_ip --output=json
Jan  7 05:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 05:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_public_ip ip=167.71.234.10 --output=json
Jan  7 05:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 05:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  7 05:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 05:22:01 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-j08EfkzgBsnozOZg.~
Jan  7 05:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 05:22:01 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-j08EfkzgBsnozOZg.~'
Jan  7 05:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 05:22:01 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-j08EfkzgBsnozOZg.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  7 05:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 05:22:01 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  7 05:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 05:22:01 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  7 05:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 05:22:02 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  7 05:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 05:22:02 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  7 05:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 05:22:02 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  7 05:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 05:22:02 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  7 05:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 05:22:03 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  7 05:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  7 05:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  7 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  7 05:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  7 05:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  7 05:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  7 05:22:06 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  7 05:22:07 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  7 05:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  7 05:22:08 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 05:22:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 05:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  7 05:22:09 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 05:22:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 05:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  7 05:22:10 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 05:22:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 05:22:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  7 05:22:12 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 05:22:13 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 05:22:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  7 05:22:13 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 05:22:14 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 06:08:02 host sshd[6264]: Did not receive identification string from 172.245.82.68 port 61000
Jan  7 06:14:24 host sshd[7322]: Connection closed by 45.79.172.21 port 59952 [preauth]
Jan  7 06:14:26 host sshd[7335]: Connection closed by 45.79.172.21 port 59964 [preauth]
Jan  7 06:14:29 host sshd[7363]: Connection closed by 45.79.172.21 port 62400 [preauth]
Jan  7 06:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  7 06:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 06:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 06:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  7 06:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 06:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 06:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  7 06:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 06:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 06:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  7 06:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 06:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 06:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  7 06:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 06:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 06:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  7 06:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 06:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 06:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  7 06:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 06:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 06:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  7 06:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 06:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 06:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  7 06:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 06:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 06:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  7 06:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 06:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 06:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  7 06:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 06:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 06:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  7 06:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 06:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 06:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  7 06:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 06:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 06:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=remysagr user-2=wwwkmaorg user-3=disposeat user-4=wwwkapin user-5=woodpeck user-6=shalinijames user-7=wwwtestugo user-8=vfmassets user-9=pmcresources user-10=wwwevmhonda user-11=bonifacegroup user-12=wwwletsstalkfood user-13=straightcurve user-14=kottayamcalldriv user-15=phmetals user-16=palco123 user-17=gifterman user-18=mrsclean user-19=wwwnexidigital user-20=cochintaxi user-21=wwwkaretakers user-22=a2zgroup user-23=dartsimp user-24=laundryboniface user-25=wwwpmcresource user-26=travelboniface user-27=ugotscom user-28=wwwresourcehunte user-29=keralaholi user-30=wwwrmswll feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  7 06:21:55 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  7 06:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 06:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 06:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  7 06:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 06:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 06:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-WFiDAO8oNZLY964K.~
Jan  7 06:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 06:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 06:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-WFiDAO8oNZLY964K.~'
Jan  7 06:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 06:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 06:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-WFiDAO8oNZLY964K.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  7 06:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 06:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 06:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  7 06:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 06:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 06:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  7 06:21:56 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 06:21:56 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 06:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  7 06:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 06:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 06:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  7 06:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 06:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 06:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  7 06:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 06:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 06:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  7 06:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 06:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 06:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  7 06:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 06:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 06:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  7 06:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  7 06:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  7 06:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  7 06:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  7 06:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  7 06:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  7 06:22:00 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  7 06:22:02 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  7 06:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  7 06:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 06:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 06:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  7 06:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 06:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 06:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  7 06:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 06:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 06:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  7 06:22:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 06:22:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 06:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  7 06:22:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 06:22:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 06:32:17 host sshd[11046]: Invalid user fake from 37.44.238.144 port 56794
Jan  7 06:32:17 host sshd[11046]: input_userauth_request: invalid user fake [preauth]
Jan  7 06:32:17 host sshd[11046]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 06:32:17 host sshd[11046]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.44.238.144
Jan  7 06:32:19 host sshd[11046]: Failed password for invalid user fake from 37.44.238.144 port 56794 ssh2
Jan  7 06:32:20 host sshd[11046]: Received disconnect from 37.44.238.144 port 56794:11: Bye Bye [preauth]
Jan  7 06:32:20 host sshd[11046]: Disconnected from 37.44.238.144 port 56794 [preauth]
Jan  7 06:32:21 host sshd[11139]: Invalid user ubnt from 37.44.238.144 port 44604
Jan  7 06:32:21 host sshd[11139]: input_userauth_request: invalid user ubnt [preauth]
Jan  7 06:32:21 host sshd[11139]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 06:32:21 host sshd[11139]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.44.238.144
Jan  7 06:32:23 host sshd[11139]: Failed password for invalid user ubnt from 37.44.238.144 port 44604 ssh2
Jan  7 06:32:23 host sshd[11139]: Received disconnect from 37.44.238.144 port 44604:11: Bye Bye [preauth]
Jan  7 06:32:23 host sshd[11139]: Disconnected from 37.44.238.144 port 44604 [preauth]
Jan  7 06:32:24 host sshd[11173]: User root from 37.44.238.144 not allowed because not listed in AllowUsers
Jan  7 06:32:24 host sshd[11173]: input_userauth_request: invalid user root [preauth]
Jan  7 06:32:24 host unix_chkpwd[11176]: password check failed for user (root)
Jan  7 06:32:24 host sshd[11173]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.44.238.144  user=root
Jan  7 06:32:24 host sshd[11173]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 06:32:26 host sshd[11173]: Failed password for invalid user root from 37.44.238.144 port 59304 ssh2
Jan  7 06:32:26 host sshd[11173]: Received disconnect from 37.44.238.144 port 59304:11: Bye Bye [preauth]
Jan  7 06:32:26 host sshd[11173]: Disconnected from 37.44.238.144 port 59304 [preauth]
Jan  7 06:34:59 host sshd[11659]: Invalid user service from 194.169.175.102 port 55125
Jan  7 06:34:59 host sshd[11659]: input_userauth_request: invalid user service [preauth]
Jan  7 06:35:00 host sshd[11659]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 06:35:00 host sshd[11659]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.169.175.102
Jan  7 06:35:02 host sshd[11659]: Failed password for invalid user service from 194.169.175.102 port 55125 ssh2
Jan  7 06:35:02 host sshd[11659]: Received disconnect from 194.169.175.102 port 55125:11: Client disconnecting normally [preauth]
Jan  7 06:35:02 host sshd[11659]: Disconnected from 194.169.175.102 port 55125 [preauth]
Jan  7 07:10:57 host sshd[18142]: Invalid user ar from 194.110.203.109 port 50998
Jan  7 07:10:57 host sshd[18142]: input_userauth_request: invalid user ar [preauth]
Jan  7 07:10:57 host sshd[18142]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 07:10:57 host sshd[18142]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109
Jan  7 07:10:59 host sshd[18142]: Failed password for invalid user ar from 194.110.203.109 port 50998 ssh2
Jan  7 07:11:02 host sshd[18142]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 07:11:04 host sshd[18142]: Failed password for invalid user ar from 194.110.203.109 port 50998 ssh2
Jan  7 07:11:07 host sshd[18142]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 07:11:09 host sshd[18142]: Failed password for invalid user ar from 194.110.203.109 port 50998 ssh2
Jan  7 07:11:12 host sshd[18142]: Connection closed by 194.110.203.109 port 50998 [preauth]
Jan  7 07:11:12 host sshd[18142]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109
Jan  7 07:13:41 host sshd[18529]: Invalid user eric from 209.141.56.48 port 56318
Jan  7 07:13:41 host sshd[18529]: input_userauth_request: invalid user eric [preauth]
Jan  7 07:13:41 host sshd[18529]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 07:13:41 host sshd[18529]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48
Jan  7 07:13:44 host sshd[18529]: Failed password for invalid user eric from 209.141.56.48 port 56318 ssh2
Jan  7 07:13:44 host sshd[18529]: Connection closed by 209.141.56.48 port 56318 [preauth]
Jan  7 07:17:44 host sshd[19203]: Invalid user eric from 209.141.56.48 port 41652
Jan  7 07:17:44 host sshd[19203]: input_userauth_request: invalid user eric [preauth]
Jan  7 07:17:44 host sshd[19203]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 07:17:44 host sshd[19203]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48
Jan  7 07:17:46 host sshd[19203]: Failed password for invalid user eric from 209.141.56.48 port 41652 ssh2
Jan  7 07:17:46 host sshd[19203]: Connection closed by 209.141.56.48 port 41652 [preauth]
Jan  7 07:18:52 host sshd[19382]: Invalid user postgres from 179.189.19.64 port 47582
Jan  7 07:18:52 host sshd[19382]: input_userauth_request: invalid user postgres [preauth]
Jan  7 07:18:52 host sshd[19382]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 07:18:52 host sshd[19382]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.189.19.64
Jan  7 07:18:53 host sshd[19382]: Failed password for invalid user postgres from 179.189.19.64 port 47582 ssh2
Jan  7 07:18:53 host sshd[19382]: Received disconnect from 179.189.19.64 port 47582:11: Bye Bye [preauth]
Jan  7 07:18:53 host sshd[19382]: Disconnected from 179.189.19.64 port 47582 [preauth]
Jan  7 07:19:10 host sshd[19420]: Invalid user sean from 94.180.57.15 port 55910
Jan  7 07:19:10 host sshd[19420]: input_userauth_request: invalid user sean [preauth]
Jan  7 07:19:10 host sshd[19420]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 07:19:10 host sshd[19420]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.180.57.15
Jan  7 07:19:12 host sshd[19420]: Failed password for invalid user sean from 94.180.57.15 port 55910 ssh2
Jan  7 07:19:12 host sshd[19420]: Received disconnect from 94.180.57.15 port 55910:11: Bye Bye [preauth]
Jan  7 07:19:12 host sshd[19420]: Disconnected from 94.180.57.15 port 55910 [preauth]
Jan  7 07:19:33 host sshd[19497]: Invalid user mexico from 20.198.226.97 port 44038
Jan  7 07:19:33 host sshd[19497]: input_userauth_request: invalid user mexico [preauth]
Jan  7 07:19:33 host sshd[19497]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 07:19:33 host sshd[19497]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.198.226.97
Jan  7 07:19:35 host sshd[19497]: Failed password for invalid user mexico from 20.198.226.97 port 44038 ssh2
Jan  7 07:19:35 host sshd[19497]: Received disconnect from 20.198.226.97 port 44038:11: Bye Bye [preauth]
Jan  7 07:19:35 host sshd[19497]: Disconnected from 20.198.226.97 port 44038 [preauth]
Jan  7 07:20:33 host sshd[19749]: Invalid user admin from 104.131.39.193 port 41220
Jan  7 07:20:33 host sshd[19749]: input_userauth_request: invalid user admin [preauth]
Jan  7 07:20:33 host sshd[19749]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 07:20:33 host sshd[19749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.39.193
Jan  7 07:20:35 host sshd[19749]: Failed password for invalid user admin from 104.131.39.193 port 41220 ssh2
Jan  7 07:20:36 host sshd[19749]: Received disconnect from 104.131.39.193 port 41220:11: Bye Bye [preauth]
Jan  7 07:20:36 host sshd[19749]: Disconnected from 104.131.39.193 port 41220 [preauth]
Jan  7 07:20:38 host sshd[19789]: Invalid user supervisor from 167.99.126.41 port 47288
Jan  7 07:20:38 host sshd[19789]: input_userauth_request: invalid user supervisor [preauth]
Jan  7 07:20:38 host sshd[19789]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 07:20:38 host sshd[19789]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.126.41
Jan  7 07:20:40 host sshd[19789]: Failed password for invalid user supervisor from 167.99.126.41 port 47288 ssh2
Jan  7 07:20:40 host sshd[19789]: Received disconnect from 167.99.126.41 port 47288:11: Bye Bye [preauth]
Jan  7 07:20:40 host sshd[19789]: Disconnected from 167.99.126.41 port 47288 [preauth]
Jan  7 07:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  7 07:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 07:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 07:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  7 07:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 07:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 07:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  7 07:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 07:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 07:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  7 07:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 07:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 07:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  7 07:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 07:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 07:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  7 07:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 07:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 07:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  7 07:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 07:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 07:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  7 07:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 07:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 07:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  7 07:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 07:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 07:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  7 07:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 07:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 07:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  7 07:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 07:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 07:21:53 host sshd[19980]: Invalid user virtual from 20.198.226.97 port 39254
Jan  7 07:21:53 host sshd[19980]: input_userauth_request: invalid user virtual [preauth]
Jan  7 07:21:53 host sshd[19980]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 07:21:53 host sshd[19980]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.198.226.97
Jan  7 07:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  7 07:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 07:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 07:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  7 07:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 07:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 07:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=travelboniface user-2=ugotscom user-3=keralaholi user-4=wwwresourcehunte user-5=wwwrmswll user-6=wwwpmcresource user-7=a2zgroup user-8=dartsimp user-9=laundryboniface user-10=wwwkaretakers user-11=cochintaxi user-12=phmetals user-13=kottayamcalldriv user-14=palco123 user-15=gifterman user-16=wwwnexidigital user-17=mrsclean user-18=wwwevmhonda user-19=bonifacegroup user-20=straightcurve user-21=wwwletsstalkfood user-22=shalinijames user-23=wwwtestugo user-24=vfmassets user-25=pmcresources user-26=disposeat user-27=wwwkmaorg user-28=remysagr user-29=woodpeck user-30=wwwkapin feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  7 07:21:54 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  7 07:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 07:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 07:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  7 07:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 07:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 07:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-QQlprtyOcDytwhPk.~
Jan  7 07:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 07:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 07:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-QQlprtyOcDytwhPk.~'
Jan  7 07:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 07:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 07:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-QQlprtyOcDytwhPk.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  7 07:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 07:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 07:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  7 07:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 07:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 07:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  7 07:21:55 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 07:21:55 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 07:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  7 07:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 07:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 07:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  7 07:21:55 host sshd[19980]: Failed password for invalid user virtual from 20.198.226.97 port 39254 ssh2
Jan  7 07:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 07:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 07:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  7 07:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 07:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 07:21:55 host sshd[19980]: Received disconnect from 20.198.226.97 port 39254:11: Bye Bye [preauth]
Jan  7 07:21:55 host sshd[19980]: Disconnected from 20.198.226.97 port 39254 [preauth]
Jan  7 07:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  7 07:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 07:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 07:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  7 07:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 07:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 07:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  7 07:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  7 07:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  7 07:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  7 07:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  7 07:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  7 07:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  7 07:21:59 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  7 07:22:01 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  7 07:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  7 07:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 07:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 07:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  7 07:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 07:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 07:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  7 07:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 07:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 07:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  7 07:22:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 07:22:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 07:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  7 07:22:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 07:22:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 07:22:29 host sshd[20229]: Invalid user durgesh from 31.41.92.251 port 39668
Jan  7 07:22:29 host sshd[20229]: input_userauth_request: invalid user durgesh [preauth]
Jan  7 07:22:29 host sshd[20229]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 07:22:29 host sshd[20229]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.41.92.251
Jan  7 07:22:31 host sshd[20229]: Failed password for invalid user durgesh from 31.41.92.251 port 39668 ssh2
Jan  7 07:22:31 host sshd[20229]: Received disconnect from 31.41.92.251 port 39668:11: Bye Bye [preauth]
Jan  7 07:22:31 host sshd[20229]: Disconnected from 31.41.92.251 port 39668 [preauth]
Jan  7 07:22:35 host sshd[20255]: Invalid user appluat from 20.198.226.97 port 47772
Jan  7 07:22:35 host sshd[20255]: input_userauth_request: invalid user appluat [preauth]
Jan  7 07:22:35 host sshd[20255]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 07:22:35 host sshd[20255]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.198.226.97
Jan  7 07:22:37 host sshd[20255]: Failed password for invalid user appluat from 20.198.226.97 port 47772 ssh2
Jan  7 07:22:37 host sshd[20255]: Received disconnect from 20.198.226.97 port 47772:11: Bye Bye [preauth]
Jan  7 07:22:37 host sshd[20255]: Disconnected from 20.198.226.97 port 47772 [preauth]
Jan  7 07:23:14 host sshd[20344]: Invalid user equistat from 167.99.126.41 port 56592
Jan  7 07:23:14 host sshd[20344]: input_userauth_request: invalid user equistat [preauth]
Jan  7 07:23:14 host sshd[20344]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 07:23:14 host sshd[20344]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.126.41
Jan  7 07:23:16 host sshd[20344]: Failed password for invalid user equistat from 167.99.126.41 port 56592 ssh2
Jan  7 07:23:16 host sshd[20344]: Received disconnect from 167.99.126.41 port 56592:11: Bye Bye [preauth]
Jan  7 07:23:16 host sshd[20344]: Disconnected from 167.99.126.41 port 56592 [preauth]
Jan  7 07:23:38 host sshd[20409]: Invalid user admin from 94.180.57.15 port 45078
Jan  7 07:23:38 host sshd[20409]: input_userauth_request: invalid user admin [preauth]
Jan  7 07:23:38 host sshd[20409]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 07:23:38 host sshd[20409]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.180.57.15
Jan  7 07:23:40 host sshd[20409]: Failed password for invalid user admin from 94.180.57.15 port 45078 ssh2
Jan  7 07:23:40 host sshd[20409]: Received disconnect from 94.180.57.15 port 45078:11: Bye Bye [preauth]
Jan  7 07:23:40 host sshd[20409]: Disconnected from 94.180.57.15 port 45078 [preauth]
Jan  7 07:23:53 host sshd[20437]: Invalid user ubnt from 179.189.19.64 port 42896
Jan  7 07:23:53 host sshd[20437]: input_userauth_request: invalid user ubnt [preauth]
Jan  7 07:23:53 host sshd[20437]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 07:23:53 host sshd[20437]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.189.19.64
Jan  7 07:23:55 host sshd[20437]: Failed password for invalid user ubnt from 179.189.19.64 port 42896 ssh2
Jan  7 07:23:56 host sshd[20437]: Received disconnect from 179.189.19.64 port 42896:11: Bye Bye [preauth]
Jan  7 07:23:56 host sshd[20437]: Disconnected from 179.189.19.64 port 42896 [preauth]
Jan  7 07:24:23 host sshd[20486]: Invalid user office from 167.99.126.41 port 56206
Jan  7 07:24:23 host sshd[20486]: input_userauth_request: invalid user office [preauth]
Jan  7 07:24:23 host sshd[20486]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 07:24:23 host sshd[20486]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.126.41
Jan  7 07:24:25 host sshd[20486]: Failed password for invalid user office from 167.99.126.41 port 56206 ssh2
Jan  7 07:25:04 host sshd[20637]: Invalid user kthrp from 104.131.39.193 port 35908
Jan  7 07:25:04 host sshd[20637]: input_userauth_request: invalid user kthrp [preauth]
Jan  7 07:25:04 host sshd[20637]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 07:25:04 host sshd[20637]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.39.193
Jan  7 07:25:04 host sshd[20640]: Invalid user reese from 94.180.57.15 port 44260
Jan  7 07:25:04 host sshd[20640]: input_userauth_request: invalid user reese [preauth]
Jan  7 07:25:04 host sshd[20640]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 07:25:04 host sshd[20640]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.180.57.15
Jan  7 07:25:05 host sshd[20637]: Failed password for invalid user kthrp from 104.131.39.193 port 35908 ssh2
Jan  7 07:25:06 host sshd[20637]: Received disconnect from 104.131.39.193 port 35908:11: Bye Bye [preauth]
Jan  7 07:25:06 host sshd[20637]: Disconnected from 104.131.39.193 port 35908 [preauth]
Jan  7 07:25:06 host sshd[20640]: Failed password for invalid user reese from 94.180.57.15 port 44260 ssh2
Jan  7 07:25:06 host sshd[20640]: Received disconnect from 94.180.57.15 port 44260:11: Bye Bye [preauth]
Jan  7 07:25:06 host sshd[20640]: Disconnected from 94.180.57.15 port 44260 [preauth]
Jan  7 07:25:15 host sshd[20687]: Invalid user ubuntu from 179.189.19.64 port 54502
Jan  7 07:25:15 host sshd[20687]: input_userauth_request: invalid user ubuntu [preauth]
Jan  7 07:25:15 host sshd[20687]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 07:25:15 host sshd[20687]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.189.19.64
Jan  7 07:25:17 host sshd[20687]: Failed password for invalid user ubuntu from 179.189.19.64 port 54502 ssh2
Jan  7 07:25:18 host sshd[20687]: Received disconnect from 179.189.19.64 port 54502:11: Bye Bye [preauth]
Jan  7 07:25:18 host sshd[20687]: Disconnected from 179.189.19.64 port 54502 [preauth]
Jan  7 07:25:38 host sshd[20792]: Invalid user nikola from 31.41.92.251 port 38938
Jan  7 07:25:38 host sshd[20792]: input_userauth_request: invalid user nikola [preauth]
Jan  7 07:25:38 host sshd[20792]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 07:25:38 host sshd[20792]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.41.92.251
Jan  7 07:25:40 host sshd[20792]: Failed password for invalid user nikola from 31.41.92.251 port 38938 ssh2
Jan  7 07:25:40 host sshd[20792]: Received disconnect from 31.41.92.251 port 38938:11: Bye Bye [preauth]
Jan  7 07:25:40 host sshd[20792]: Disconnected from 31.41.92.251 port 38938 [preauth]
Jan  7 07:26:12 host sshd[20848]: Invalid user macona from 104.131.39.193 port 35538
Jan  7 07:26:12 host sshd[20848]: input_userauth_request: invalid user macona [preauth]
Jan  7 07:26:12 host sshd[20848]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 07:26:12 host sshd[20848]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.39.193
Jan  7 07:26:14 host sshd[20848]: Failed password for invalid user macona from 104.131.39.193 port 35538 ssh2
Jan  7 07:26:14 host sshd[20848]: Received disconnect from 104.131.39.193 port 35538:11: Bye Bye [preauth]
Jan  7 07:26:14 host sshd[20848]: Disconnected from 104.131.39.193 port 35538 [preauth]
Jan  7 07:28:25 host sshd[21266]: Invalid user admin from 31.41.92.251 port 38054
Jan  7 07:28:25 host sshd[21266]: input_userauth_request: invalid user admin [preauth]
Jan  7 07:28:25 host sshd[21266]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 07:28:25 host sshd[21266]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.41.92.251
Jan  7 07:28:27 host sshd[21266]: Failed password for invalid user admin from 31.41.92.251 port 38054 ssh2
Jan  7 07:28:27 host sshd[21266]: Received disconnect from 31.41.92.251 port 38054:11: Bye Bye [preauth]
Jan  7 07:28:27 host sshd[21266]: Disconnected from 31.41.92.251 port 38054 [preauth]
Jan  7 07:59:21 host sshd[28215]: Did not receive identification string from 205.210.31.57 port 56084
Jan  7 08:14:34 host sshd[460]: Invalid user clinton from 217.94.218.149 port 22936
Jan  7 08:14:34 host sshd[460]: input_userauth_request: invalid user clinton [preauth]
Jan  7 08:14:34 host sshd[460]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 08:14:34 host sshd[460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.94.218.149
Jan  7 08:14:36 host sshd[460]: Failed password for invalid user clinton from 217.94.218.149 port 22936 ssh2
Jan  7 08:14:36 host sshd[460]: Received disconnect from 217.94.218.149 port 22936:11: Bye Bye [preauth]
Jan  7 08:14:36 host sshd[460]: Disconnected from 217.94.218.149 port 22936 [preauth]
Jan  7 08:16:25 host sshd[987]: Invalid user asano from 190.121.236.165 port 54320
Jan  7 08:16:25 host sshd[987]: input_userauth_request: invalid user asano [preauth]
Jan  7 08:16:25 host sshd[987]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 08:16:25 host sshd[987]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.121.236.165
Jan  7 08:16:27 host sshd[987]: Failed password for invalid user asano from 190.121.236.165 port 54320 ssh2
Jan  7 08:16:28 host sshd[987]: Received disconnect from 190.121.236.165 port 54320:11: Bye Bye [preauth]
Jan  7 08:16:28 host sshd[987]: Disconnected from 190.121.236.165 port 54320 [preauth]
Jan  7 08:18:40 host sshd[1772]: Invalid user admin from 37.182.160.215 port 59598
Jan  7 08:18:40 host sshd[1772]: input_userauth_request: invalid user admin [preauth]
Jan  7 08:18:40 host sshd[1772]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 08:18:40 host sshd[1772]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.182.160.215
Jan  7 08:18:43 host sshd[1772]: Failed password for invalid user admin from 37.182.160.215 port 59598 ssh2
Jan  7 08:18:43 host sshd[1772]: Received disconnect from 37.182.160.215 port 59598:11: Bye Bye [preauth]
Jan  7 08:18:43 host sshd[1772]: Disconnected from 37.182.160.215 port 59598 [preauth]
Jan  7 08:19:58 host sshd[2200]: Invalid user hgb from 217.94.218.149 port 55460
Jan  7 08:19:58 host sshd[2200]: input_userauth_request: invalid user hgb [preauth]
Jan  7 08:19:58 host sshd[2200]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 08:19:58 host sshd[2200]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.94.218.149
Jan  7 08:20:00 host sshd[2200]: Failed password for invalid user hgb from 217.94.218.149 port 55460 ssh2
Jan  7 08:20:00 host sshd[2200]: Received disconnect from 217.94.218.149 port 55460:11: Bye Bye [preauth]
Jan  7 08:20:00 host sshd[2200]: Disconnected from 217.94.218.149 port 55460 [preauth]
Jan  7 08:20:03 host sshd[2241]: Invalid user morgan from 190.121.236.165 port 36634
Jan  7 08:20:03 host sshd[2241]: input_userauth_request: invalid user morgan [preauth]
Jan  7 08:20:03 host sshd[2241]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 08:20:03 host sshd[2241]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.121.236.165
Jan  7 08:20:06 host sshd[2241]: Failed password for invalid user morgan from 190.121.236.165 port 36634 ssh2
Jan  7 08:20:06 host sshd[2241]: Received disconnect from 190.121.236.165 port 36634:11: Bye Bye [preauth]
Jan  7 08:20:06 host sshd[2241]: Disconnected from 190.121.236.165 port 36634 [preauth]
Jan  7 08:21:16 host sshd[2463]: Invalid user orademan from 217.94.218.149 port 37574
Jan  7 08:21:16 host sshd[2463]: input_userauth_request: invalid user orademan [preauth]
Jan  7 08:21:16 host sshd[2463]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 08:21:16 host sshd[2463]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.94.218.149
Jan  7 08:21:18 host sshd[2463]: Failed password for invalid user orademan from 217.94.218.149 port 37574 ssh2
Jan  7 08:21:33 host sshd[2547]: Invalid user kyle from 190.121.236.165 port 52382
Jan  7 08:21:33 host sshd[2547]: input_userauth_request: invalid user kyle [preauth]
Jan  7 08:21:33 host sshd[2547]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 08:21:33 host sshd[2547]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.121.236.165
Jan  7 08:21:36 host sshd[2547]: Failed password for invalid user kyle from 190.121.236.165 port 52382 ssh2
Jan  7 08:21:36 host sshd[2547]: Received disconnect from 190.121.236.165 port 52382:11: Bye Bye [preauth]
Jan  7 08:21:36 host sshd[2547]: Disconnected from 190.121.236.165 port 52382 [preauth]
Jan  7 08:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  7 08:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 08:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 08:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  7 08:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 08:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 08:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  7 08:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 08:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 08:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  7 08:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 08:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 08:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  7 08:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 08:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 08:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  7 08:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 08:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 08:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  7 08:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 08:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 08:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  7 08:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 08:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 08:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  7 08:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 08:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 08:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  7 08:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 08:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 08:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  7 08:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 08:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 08:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  7 08:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 08:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 08:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  7 08:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 08:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 08:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=dartsimp user-2=a2zgroup user-3=laundryboniface user-4=cochintaxi user-5=wwwkaretakers user-6=travelboniface user-7=ugotscom user-8=wwwrmswll user-9=keralaholi user-10=wwwresourcehunte user-11=wwwpmcresource user-12=wwwtestugo user-13=shalinijames user-14=vfmassets user-15=pmcresources user-16=wwwkmaorg user-17=disposeat user-18=remysagr user-19=wwwkapin user-20=woodpeck user-21=phmetals user-22=kottayamcalldriv user-23=gifterman user-24=palco123 user-25=wwwnexidigital user-26=mrsclean user-27=wwwevmhonda user-28=bonifacegroup user-29=straightcurve user-30=wwwletsstalkfood feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  7 08:21:55 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  7 08:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 08:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 08:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  7 08:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 08:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 08:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-q0dPWkJo5jxkTgL5.~
Jan  7 08:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 08:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 08:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-q0dPWkJo5jxkTgL5.~'
Jan  7 08:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 08:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 08:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-q0dPWkJo5jxkTgL5.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  7 08:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 08:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 08:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  7 08:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 08:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 08:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  7 08:21:55 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 08:21:55 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 08:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  7 08:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 08:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 08:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  7 08:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 08:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 08:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  7 08:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 08:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 08:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  7 08:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 08:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 08:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  7 08:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 08:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 08:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  7 08:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  7 08:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  7 08:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  7 08:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  7 08:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  7 08:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  7 08:22:00 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  7 08:22:01 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  7 08:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  7 08:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 08:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 08:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  7 08:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 08:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 08:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  7 08:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 08:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 08:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  7 08:22:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 08:22:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 08:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  7 08:22:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 08:22:10 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 08:27:37 host sshd[4568]: Invalid user applprod from 37.182.160.215 port 40338
Jan  7 08:27:37 host sshd[4568]: input_userauth_request: invalid user applprod [preauth]
Jan  7 08:27:37 host sshd[4568]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 08:27:37 host sshd[4568]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.182.160.215
Jan  7 08:27:39 host sshd[4568]: Failed password for invalid user applprod from 37.182.160.215 port 40338 ssh2
Jan  7 08:27:40 host sshd[4568]: Received disconnect from 37.182.160.215 port 40338:11: Bye Bye [preauth]
Jan  7 08:27:40 host sshd[4568]: Disconnected from 37.182.160.215 port 40338 [preauth]
Jan  7 08:28:22 host sshd[4764]: Invalid user eric from 209.141.56.48 port 45364
Jan  7 08:28:22 host sshd[4764]: input_userauth_request: invalid user eric [preauth]
Jan  7 08:28:22 host sshd[4764]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 08:28:22 host sshd[4764]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48
Jan  7 08:28:24 host sshd[4764]: Failed password for invalid user eric from 209.141.56.48 port 45364 ssh2
Jan  7 08:28:24 host sshd[4764]: Connection closed by 209.141.56.48 port 45364 [preauth]
Jan  7 08:29:41 host sshd[5159]: Invalid user test_01 from 37.182.160.215 port 59522
Jan  7 08:29:41 host sshd[5159]: input_userauth_request: invalid user test_01 [preauth]
Jan  7 08:29:41 host sshd[5159]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 08:29:41 host sshd[5159]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.182.160.215
Jan  7 08:29:43 host sshd[5159]: Failed password for invalid user test_01 from 37.182.160.215 port 59522 ssh2
Jan  7 08:30:44 host sshd[5498]: Invalid user pi from 98.235.49.158 port 58116
Jan  7 08:30:44 host sshd[5498]: input_userauth_request: invalid user pi [preauth]
Jan  7 08:30:44 host sshd[5496]: Invalid user pi from 98.235.49.158 port 58114
Jan  7 08:30:44 host sshd[5496]: input_userauth_request: invalid user pi [preauth]
Jan  7 08:30:44 host sshd[5498]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 08:30:44 host sshd[5498]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.235.49.158
Jan  7 08:30:44 host sshd[5496]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 08:30:44 host sshd[5496]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.235.49.158
Jan  7 08:30:46 host sshd[5498]: Failed password for invalid user pi from 98.235.49.158 port 58116 ssh2
Jan  7 08:30:46 host sshd[5496]: Failed password for invalid user pi from 98.235.49.158 port 58114 ssh2
Jan  7 08:30:46 host sshd[5498]: Connection closed by 98.235.49.158 port 58116 [preauth]
Jan  7 08:30:46 host sshd[5496]: Connection closed by 98.235.49.158 port 58114 [preauth]
Jan  7 08:54:19 host sshd[13617]: Invalid user eric from 209.141.56.48 port 36046
Jan  7 08:54:19 host sshd[13617]: input_userauth_request: invalid user eric [preauth]
Jan  7 08:54:19 host sshd[13617]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 08:54:19 host sshd[13617]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48
Jan  7 08:54:21 host sshd[13617]: Failed password for invalid user eric from 209.141.56.48 port 36046 ssh2
Jan  7 08:54:21 host sshd[13617]: Connection closed by 209.141.56.48 port 36046 [preauth]
Jan  7 08:56:35 host sshd[14273]: Invalid user eric from 209.141.56.48 port 39676
Jan  7 08:56:35 host sshd[14273]: input_userauth_request: invalid user eric [preauth]
Jan  7 08:56:35 host sshd[14273]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 08:56:35 host sshd[14273]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48
Jan  7 08:56:38 host sshd[14273]: Failed password for invalid user eric from 209.141.56.48 port 39676 ssh2
Jan  7 08:56:38 host sshd[14273]: Connection closed by 209.141.56.48 port 39676 [preauth]
Jan  7 09:07:54 host sshd[17491]: User root from 176.111.173.164 not allowed because not listed in AllowUsers
Jan  7 09:07:54 host sshd[17491]: input_userauth_request: invalid user root [preauth]
Jan  7 09:07:54 host unix_chkpwd[17495]: password check failed for user (root)
Jan  7 09:07:54 host sshd[17491]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.111.173.164  user=root
Jan  7 09:07:54 host sshd[17491]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 09:07:56 host sshd[17491]: Failed password for invalid user root from 176.111.173.164 port 46248 ssh2
Jan  7 09:08:00 host sshd[17491]: Failed password for invalid user root from 176.111.173.164 port 46248 ssh2
Jan  7 09:08:03 host unix_chkpwd[17541]: password check failed for user (root)
Jan  7 09:08:03 host sshd[17491]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 09:08:04 host sshd[17491]: Failed password for invalid user root from 176.111.173.164 port 46248 ssh2
Jan  7 09:08:08 host unix_chkpwd[17561]: password check failed for user (root)
Jan  7 09:08:08 host sshd[17491]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 09:08:09 host sshd[17491]: Failed password for invalid user root from 176.111.173.164 port 46248 ssh2
Jan  7 09:13:30 host sshd[19338]: Invalid user ubuntu from 111.19.156.12 port 37386
Jan  7 09:13:30 host sshd[19338]: input_userauth_request: invalid user ubuntu [preauth]
Jan  7 09:13:30 host sshd[19338]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 09:13:30 host sshd[19338]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.19.156.12
Jan  7 09:13:32 host sshd[19338]: Failed password for invalid user ubuntu from 111.19.156.12 port 37386 ssh2
Jan  7 09:13:32 host sshd[19338]: Received disconnect from 111.19.156.12 port 37386:11: Bye Bye [preauth]
Jan  7 09:13:32 host sshd[19338]: Disconnected from 111.19.156.12 port 37386 [preauth]
Jan  7 09:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  7 09:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 09:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 09:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  7 09:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 09:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 09:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  7 09:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 09:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 09:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  7 09:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 09:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 09:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  7 09:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 09:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 09:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  7 09:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 09:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 09:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  7 09:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 09:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 09:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  7 09:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 09:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 09:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  7 09:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 09:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 09:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  7 09:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 09:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 09:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  7 09:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 09:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 09:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  7 09:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 09:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 09:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  7 09:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 09:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 09:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=pmcresources user-2=shalinijames user-3=wwwtestugo user-4=vfmassets user-5=woodpeck user-6=wwwkapin user-7=remysagr user-8=wwwkmaorg user-9=disposeat user-10=mrsclean user-11=wwwnexidigital user-12=phmetals user-13=kottayamcalldriv user-14=palco123 user-15=gifterman user-16=wwwletsstalkfood user-17=straightcurve user-18=wwwevmhonda user-19=bonifacegroup user-20=laundryboniface user-21=a2zgroup user-22=dartsimp user-23=cochintaxi user-24=wwwkaretakers user-25=ugotscom user-26=keralaholi user-27=wwwresourcehunte user-28=wwwrmswll user-29=travelboniface user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  7 09:21:54 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  7 09:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 09:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 09:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  7 09:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 09:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 09:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-OhGQT4Sgmb0bea3h.~
Jan  7 09:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 09:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 09:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-OhGQT4Sgmb0bea3h.~'
Jan  7 09:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 09:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 09:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-OhGQT4Sgmb0bea3h.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  7 09:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 09:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 09:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  7 09:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 09:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 09:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  7 09:21:55 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 09:21:55 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 09:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  7 09:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 09:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 09:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  7 09:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 09:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 09:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  7 09:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 09:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 09:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  7 09:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 09:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 09:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  7 09:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 09:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 09:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  7 09:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  7 09:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  7 09:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  7 09:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  7 09:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  7 09:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  7 09:22:00 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  7 09:22:02 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  7 09:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  7 09:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 09:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 09:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  7 09:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 09:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 09:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  7 09:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 09:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 09:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  7 09:22:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 09:22:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 09:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  7 09:22:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 09:22:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 09:23:03 host sshd[22519]: Invalid user novita from 111.19.156.12 port 43262
Jan  7 09:23:03 host sshd[22519]: input_userauth_request: invalid user novita [preauth]
Jan  7 09:23:03 host sshd[22519]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 09:23:03 host sshd[22519]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.19.156.12
Jan  7 09:23:05 host sshd[22519]: Failed password for invalid user novita from 111.19.156.12 port 43262 ssh2
Jan  7 09:23:06 host sshd[22519]: Received disconnect from 111.19.156.12 port 43262:11: Bye Bye [preauth]
Jan  7 09:23:06 host sshd[22519]: Disconnected from 111.19.156.12 port 43262 [preauth]
Jan  7 09:23:33 host sshd[22580]: Invalid user clinton from 111.19.156.12 port 49362
Jan  7 09:23:33 host sshd[22580]: input_userauth_request: invalid user clinton [preauth]
Jan  7 09:23:33 host sshd[22580]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 09:23:33 host sshd[22580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.19.156.12
Jan  7 09:23:35 host sshd[22580]: Failed password for invalid user clinton from 111.19.156.12 port 49362 ssh2
Jan  7 09:32:33 host sshd[25426]: Invalid user as from 194.110.203.109 port 46406
Jan  7 09:32:33 host sshd[25426]: input_userauth_request: invalid user as [preauth]
Jan  7 09:32:33 host sshd[25426]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 09:32:33 host sshd[25426]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109
Jan  7 09:32:35 host sshd[25426]: Failed password for invalid user as from 194.110.203.109 port 46406 ssh2
Jan  7 09:32:38 host sshd[25426]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 09:32:40 host sshd[25426]: Failed password for invalid user as from 194.110.203.109 port 46406 ssh2
Jan  7 09:32:44 host sshd[25426]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 09:32:46 host sshd[25426]: Failed password for invalid user as from 194.110.203.109 port 46406 ssh2
Jan  7 09:32:49 host sshd[25426]: Connection closed by 194.110.203.109 port 46406 [preauth]
Jan  7 09:32:49 host sshd[25426]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109
Jan  7 09:48:46 host sshd[30940]: Invalid user lawrence from 107.189.30.59 port 46116
Jan  7 09:48:46 host sshd[30940]: input_userauth_request: invalid user lawrence [preauth]
Jan  7 09:48:46 host sshd[30940]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 09:48:46 host sshd[30940]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59
Jan  7 09:48:48 host sshd[30940]: Failed password for invalid user lawrence from 107.189.30.59 port 46116 ssh2
Jan  7 09:48:49 host sshd[30940]: Connection closed by 107.189.30.59 port 46116 [preauth]
Jan  7 09:49:42 host sshd[31237]: Did not receive identification string from 167.71.166.243 port 47102
Jan  7 09:57:44 host sshd[1215]: Did not receive identification string from 111.67.202.249 port 42400
Jan  7 09:57:44 host sshd[1216]: Did not receive identification string from 111.67.202.249 port 42402
Jan  7 09:57:47 host sshd[1238]: Invalid user user-1 from 111.67.202.249 port 48996
Jan  7 09:57:47 host sshd[1221]: Invalid user bitrix from 111.67.202.249 port 49016
Jan  7 09:57:47 host sshd[1221]: input_userauth_request: invalid user bitrix [preauth]
Jan  7 09:57:47 host sshd[1238]: input_userauth_request: invalid user user-1 [preauth]
Jan  7 09:57:47 host sshd[1231]: Invalid user lanou from 111.67.202.249 port 49062
Jan  7 09:57:47 host sshd[1231]: input_userauth_request: invalid user lanou [preauth]
Jan  7 09:57:47 host sshd[1243]: Invalid user ec2-user from 111.67.202.249 port 49048
Jan  7 09:57:47 host sshd[1243]: input_userauth_request: invalid user ec2-user [preauth]
Jan  7 09:57:47 host sshd[1244]: Invalid user splunk from 111.67.202.249 port 49044
Jan  7 09:57:47 host sshd[1226]: Invalid user testuser from 111.67.202.249 port 48976
Jan  7 09:57:47 host sshd[1226]: input_userauth_request: invalid user testuser [preauth]
Jan  7 09:57:47 host sshd[1244]: input_userauth_request: invalid user splunk [preauth]
Jan  7 09:57:47 host sshd[1220]: Invalid user LKepler from 111.67.202.249 port 49046
Jan  7 09:57:47 host sshd[1220]: input_userauth_request: invalid user LKepler [preauth]
Jan  7 09:57:47 host sshd[1228]: Invalid user alex from 111.67.202.249 port 48958
Jan  7 09:57:47 host sshd[1224]: Invalid user ansadmin from 111.67.202.249 port 48998
Jan  7 09:57:47 host sshd[1228]: input_userauth_request: invalid user alex [preauth]
Jan  7 09:57:47 host sshd[1223]: Invalid user natasha from 111.67.202.249 port 48986
Jan  7 09:57:47 host sshd[1247]: Invalid user natasha from 111.67.202.249 port 49064
Jan  7 09:57:47 host sshd[1222]: Invalid user gitlab-runner from 111.67.202.249 port 49018
Jan  7 09:57:47 host sshd[1247]: input_userauth_request: invalid user natasha [preauth]
Jan  7 09:57:47 host sshd[1223]: input_userauth_request: invalid user natasha [preauth]
Jan  7 09:57:47 host sshd[1224]: input_userauth_request: invalid user ansadmin [preauth]
Jan  7 09:57:47 host sshd[1230]: Invalid user daenon from 111.67.202.249 port 48954
Jan  7 09:57:47 host sshd[1230]: input_userauth_request: invalid user daenon [preauth]
Jan  7 09:57:47 host sshd[1222]: input_userauth_request: invalid user gitlab-runner [preauth]
Jan  7 09:57:47 host sshd[1237]: Invalid user elk from 111.67.202.249 port 49108
Jan  7 09:57:47 host sshd[1234]: Invalid user builder from 111.67.202.249 port 49024
Jan  7 09:57:47 host sshd[1237]: input_userauth_request: invalid user elk [preauth]
Jan  7 09:57:47 host sshd[1234]: input_userauth_request: invalid user builder [preauth]
Jan  7 09:57:47 host sshd[1239]: Invalid user ansible from 111.67.202.249 port 49072
Jan  7 09:57:47 host sshd[1239]: input_userauth_request: invalid user ansible [preauth]
Jan  7 09:57:47 host sshd[1241]: Invalid user splunk from 111.67.202.249 port 48966
Jan  7 09:57:47 host sshd[1241]: input_userauth_request: invalid user splunk [preauth]
Jan  7 09:57:47 host sshd[1250]: Invalid user LKepler from 111.67.202.249 port 48968
Jan  7 09:57:47 host sshd[1250]: input_userauth_request: invalid user LKepler [preauth]
Jan  7 09:57:47 host sshd[1242]: Invalid user vm from 111.67.202.249 port 49026
Jan  7 09:57:47 host sshd[1242]: input_userauth_request: invalid user vm [preauth]
Jan  7 09:57:47 host sshd[1225]: Invalid user steam from 111.67.202.249 port 49002
Jan  7 09:57:47 host sshd[1225]: input_userauth_request: invalid user steam [preauth]
Jan  7 09:57:47 host sshd[1235]: User root from 111.67.202.249 not allowed because not listed in AllowUsers
Jan  7 09:57:47 host sshd[1235]: input_userauth_request: invalid user root [preauth]
Jan  7 09:57:47 host sshd[1245]: User mail from 111.67.202.249 not allowed because not listed in AllowUsers
Jan  7 09:57:47 host sshd[1245]: input_userauth_request: invalid user mail [preauth]
Jan  7 09:57:47 host sshd[1232]: User root from 111.67.202.249 not allowed because not listed in AllowUsers
Jan  7 09:57:47 host sshd[1232]: input_userauth_request: invalid user root [preauth]
Jan  7 09:57:47 host sshd[1248]: Invalid user account1 from 111.67.202.249 port 49086
Jan  7 09:57:47 host sshd[1248]: input_userauth_request: invalid user account1 [preauth]
Jan  7 09:57:47 host sshd[1229]: Invalid user vagrant from 111.67.202.249 port 49050
Jan  7 09:57:47 host sshd[1227]: Invalid user bluecat from 111.67.202.249 port 49034
Jan  7 09:57:47 host sshd[1229]: input_userauth_request: invalid user vagrant [preauth]
Jan  7 09:57:47 host sshd[1227]: input_userauth_request: invalid user bluecat [preauth]
Jan  7 09:57:47 host sshd[1236]: Invalid user ansadmin from 111.67.202.249 port 49084
Jan  7 09:57:47 host sshd[1236]: input_userauth_request: invalid user ansadmin [preauth]
Jan  7 09:57:47 host sshd[1246]: User root from 111.67.202.249 not allowed because not listed in AllowUsers
Jan  7 09:57:47 host sshd[1246]: input_userauth_request: invalid user root [preauth]
Jan  7 09:57:47 host sshd[1249]: Invalid user ansadmin from 111.67.202.249 port 49076
Jan  7 09:57:47 host sshd[1249]: input_userauth_request: invalid user ansadmin [preauth]
Jan  7 09:57:47 host sshd[1240]: Invalid user guest from 111.67.202.249 port 49012
Jan  7 09:57:47 host sshd[1240]: input_userauth_request: invalid user guest [preauth]
Jan  7 09:57:47 host sshd[1233]: Invalid user elk from 111.67.202.249 port 49030
Jan  7 09:57:47 host sshd[1233]: input_userauth_request: invalid user elk [preauth]
Jan  7 09:57:48 host sshd[1221]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 09:57:48 host sshd[1221]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.202.249
Jan  7 09:57:48 host sshd[1222]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 09:57:48 host sshd[1231]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 09:57:48 host sshd[1222]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.202.249
Jan  7 09:57:48 host sshd[1231]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.202.249
Jan  7 09:57:48 host sshd[1220]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 09:57:48 host sshd[1220]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.202.249
Jan  7 09:57:48 host sshd[1223]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 09:57:48 host sshd[1238]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 09:57:48 host sshd[1238]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.202.249
Jan  7 09:57:48 host sshd[1223]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.202.249
Jan  7 09:57:48 host sshd[1226]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 09:57:48 host sshd[1226]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.202.249
Jan  7 09:57:48 host sshd[1237]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 09:57:48 host sshd[1237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.202.249
Jan  7 09:57:48 host sshd[1224]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 09:57:48 host sshd[1224]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.202.249
Jan  7 09:57:48 host sshd[1230]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 09:57:48 host sshd[1230]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.202.249
Jan  7 09:57:48 host sshd[1228]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 09:57:48 host sshd[1228]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.202.249
Jan  7 09:57:48 host sshd[1244]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 09:57:48 host sshd[1244]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.202.249
Jan  7 09:57:48 host sshd[1225]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 09:57:48 host sshd[1225]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.202.249
Jan  7 09:57:48 host sshd[1234]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 09:57:48 host sshd[1243]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 09:57:48 host sshd[1234]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.202.249
Jan  7 09:57:48 host sshd[1243]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.202.249
Jan  7 09:57:48 host sshd[1239]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 09:57:48 host sshd[1239]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.202.249
Jan  7 09:57:48 host sshd[1241]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 09:57:48 host sshd[1241]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.202.249
Jan  7 09:57:48 host sshd[1247]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 09:57:48 host sshd[1247]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.202.249
Jan  7 09:57:48 host sshd[1242]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 09:57:48 host sshd[1242]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.202.249
Jan  7 09:57:48 host unix_chkpwd[1311]: password check failed for user (root)
Jan  7 09:57:48 host sshd[1235]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.202.249  user=root
Jan  7 09:57:48 host sshd[1235]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 09:57:48 host sshd[1250]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 09:57:48 host sshd[1250]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.202.249
Jan  7 09:57:48 host unix_chkpwd[1312]: password check failed for user (mail)
Jan  7 09:57:48 host sshd[1245]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.202.249  user=mail
Jan  7 09:57:48 host sshd[1245]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "mail"
Jan  7 09:57:48 host unix_chkpwd[1313]: password check failed for user (root)
Jan  7 09:57:48 host sshd[1232]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.202.249  user=root
Jan  7 09:57:48 host sshd[1232]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 09:57:48 host sshd[1229]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 09:57:48 host sshd[1229]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.202.249
Jan  7 09:57:48 host sshd[1227]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 09:57:48 host sshd[1227]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.202.249
Jan  7 09:57:48 host sshd[1248]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 09:57:48 host sshd[1248]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.202.249
Jan  7 09:57:48 host sshd[1236]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 09:57:48 host sshd[1236]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.202.249
Jan  7 09:57:48 host sshd[1240]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 09:57:48 host sshd[1240]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.202.249
Jan  7 09:57:48 host sshd[1249]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 09:57:48 host sshd[1249]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.202.249
Jan  7 09:57:48 host sshd[1233]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 09:57:48 host sshd[1233]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.202.249
Jan  7 09:57:48 host unix_chkpwd[1315]: password check failed for user (root)
Jan  7 09:57:48 host sshd[1246]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.202.249  user=root
Jan  7 09:57:48 host sshd[1246]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 09:57:48 host sshd[1286]: Invalid user ansible from 111.67.202.249 port 48994
Jan  7 09:57:48 host sshd[1286]: input_userauth_request: invalid user ansible [preauth]
Jan  7 09:57:48 host sshd[1294]: Invalid user casadiagnosis from 111.67.202.249 port 48990
Jan  7 09:57:48 host sshd[1294]: input_userauth_request: invalid user casadiagnosis [preauth]
Jan  7 09:57:48 host sshd[1288]: Invalid user esuser from 111.67.202.249 port 48992
Jan  7 09:57:48 host sshd[1288]: input_userauth_request: invalid user esuser [preauth]
Jan  7 09:57:48 host sshd[1289]: Invalid user account1 from 111.67.202.249 port 49008
Jan  7 09:57:48 host sshd[1289]: input_userauth_request: invalid user account1 [preauth]
Jan  7 09:57:48 host sshd[1287]: User root from 111.67.202.249 not allowed because not listed in AllowUsers
Jan  7 09:57:48 host sshd[1287]: input_userauth_request: invalid user root [preauth]
Jan  7 09:57:48 host sshd[1297]: Invalid user admin from 111.67.202.249 port 49004
Jan  7 09:57:48 host sshd[1297]: input_userauth_request: invalid user admin [preauth]
Jan  7 09:57:48 host sshd[1286]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 09:57:48 host sshd[1286]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.202.249
Jan  7 09:57:48 host sshd[1288]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 09:57:48 host sshd[1288]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.202.249
Jan  7 09:57:48 host sshd[1294]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 09:57:48 host sshd[1294]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.202.249
Jan  7 09:57:48 host sshd[1289]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 09:57:48 host sshd[1289]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.202.249
Jan  7 09:57:48 host unix_chkpwd[1321]: password check failed for user (root)
Jan  7 09:57:48 host sshd[1287]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.202.249  user=root
Jan  7 09:57:48 host sshd[1287]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 09:57:49 host sshd[1297]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 09:57:49 host sshd[1297]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.202.249
Jan  7 09:57:50 host sshd[1221]: Failed password for invalid user bitrix from 111.67.202.249 port 49016 ssh2
Jan  7 09:57:50 host sshd[1220]: Failed password for invalid user LKepler from 111.67.202.249 port 49046 ssh2
Jan  7 09:57:50 host sshd[1222]: Failed password for invalid user gitlab-runner from 111.67.202.249 port 49018 ssh2
Jan  7 09:57:50 host sshd[1231]: Failed password for invalid user lanou from 111.67.202.249 port 49062 ssh2
Jan  7 09:57:50 host sshd[1223]: Failed password for invalid user natasha from 111.67.202.249 port 48986 ssh2
Jan  7 09:57:50 host sshd[1238]: Failed password for invalid user user-1 from 111.67.202.249 port 48996 ssh2
Jan  7 09:57:50 host sshd[1226]: Failed password for invalid user testuser from 111.67.202.249 port 48976 ssh2
Jan  7 09:57:50 host sshd[1237]: Failed password for invalid user elk from 111.67.202.249 port 49108 ssh2
Jan  7 09:57:50 host sshd[1230]: Failed password for invalid user daenon from 111.67.202.249 port 48954 ssh2
Jan  7 09:57:50 host sshd[1224]: Failed password for invalid user ansadmin from 111.67.202.249 port 48998 ssh2
Jan  7 09:57:50 host sshd[1228]: Failed password for invalid user alex from 111.67.202.249 port 48958 ssh2
Jan  7 09:57:50 host sshd[1244]: Failed password for invalid user splunk from 111.67.202.249 port 49044 ssh2
Jan  7 09:57:50 host sshd[1225]: Failed password for invalid user steam from 111.67.202.249 port 49002 ssh2
Jan  7 09:57:50 host sshd[1243]: Failed password for invalid user ec2-user from 111.67.202.249 port 49048 ssh2
Jan  7 09:57:50 host sshd[1239]: Failed password for invalid user ansible from 111.67.202.249 port 49072 ssh2
Jan  7 09:57:50 host sshd[1234]: Failed password for invalid user builder from 111.67.202.249 port 49024 ssh2
Jan  7 09:57:50 host sshd[1241]: Failed password for invalid user splunk from 111.67.202.249 port 48966 ssh2
Jan  7 09:57:50 host sshd[1247]: Failed password for invalid user natasha from 111.67.202.249 port 49064 ssh2
Jan  7 09:57:50 host sshd[1242]: Failed password for invalid user vm from 111.67.202.249 port 49026 ssh2
Jan  7 09:57:50 host sshd[1235]: Failed password for invalid user root from 111.67.202.249 port 49088 ssh2
Jan  7 09:57:50 host sshd[1250]: Failed password for invalid user LKepler from 111.67.202.249 port 48968 ssh2
Jan  7 09:57:50 host sshd[1245]: Failed password for invalid user mail from 111.67.202.249 port 49100 ssh2
Jan  7 09:57:50 host sshd[1232]: Failed password for invalid user root from 111.67.202.249 port 49014 ssh2
Jan  7 09:57:50 host sshd[1229]: Failed password for invalid user vagrant from 111.67.202.249 port 49050 ssh2
Jan  7 09:57:50 host sshd[1227]: Failed password for invalid user bluecat from 111.67.202.249 port 49034 ssh2
Jan  7 09:57:50 host sshd[1248]: Failed password for invalid user account1 from 111.67.202.249 port 49086 ssh2
Jan  7 09:57:50 host sshd[1316]: User root from 111.67.202.249 not allowed because not listed in AllowUsers
Jan  7 09:57:50 host sshd[1316]: input_userauth_request: invalid user root [preauth]
Jan  7 09:57:50 host sshd[1236]: Failed password for invalid user ansadmin from 111.67.202.249 port 49084 ssh2
Jan  7 09:57:50 host sshd[1240]: Failed password for invalid user guest from 111.67.202.249 port 49012 ssh2
Jan  7 09:57:50 host sshd[1249]: Failed password for invalid user ansadmin from 111.67.202.249 port 49076 ssh2
Jan  7 09:57:50 host sshd[1233]: Failed password for invalid user elk from 111.67.202.249 port 49030 ssh2
Jan  7 09:57:50 host sshd[1246]: Failed password for invalid user root from 111.67.202.249 port 49092 ssh2
Jan  7 09:57:50 host sshd[1221]: Connection closed by 111.67.202.249 port 49016 [preauth]
Jan  7 09:57:50 host sshd[1220]: Connection closed by 111.67.202.249 port 49046 [preauth]
Jan  7 09:57:50 host sshd[1222]: Connection closed by 111.67.202.249 port 49018 [preauth]
Jan  7 09:57:50 host sshd[1231]: Connection closed by 111.67.202.249 port 49062 [preauth]
Jan  7 09:57:50 host sshd[1223]: Connection closed by 111.67.202.249 port 48986 [preauth]
Jan  7 09:57:50 host sshd[1237]: Connection closed by 111.67.202.249 port 49108 [preauth]
Jan  7 09:57:50 host sshd[1224]: Connection closed by 111.67.202.249 port 48998 [preauth]
Jan  7 09:57:50 host sshd[1230]: Connection closed by 111.67.202.249 port 48954 [preauth]
Jan  7 09:57:50 host sshd[1238]: Connection closed by 111.67.202.249 port 48996 [preauth]
Jan  7 09:57:50 host sshd[1226]: Connection closed by 111.67.202.249 port 48976 [preauth]
Jan  7 09:57:50 host sshd[1228]: Connection closed by 111.67.202.249 port 48958 [preauth]
Jan  7 09:57:50 host sshd[1244]: Connection closed by 111.67.202.249 port 49044 [preauth]
Jan  7 09:57:50 host sshd[1225]: Connection closed by 111.67.202.249 port 49002 [preauth]
Jan  7 09:57:50 host sshd[1234]: Connection closed by 111.67.202.249 port 49024 [preauth]
Jan  7 09:57:50 host sshd[1239]: Connection closed by 111.67.202.249 port 49072 [preauth]
Jan  7 09:57:50 host sshd[1242]: Connection closed by 111.67.202.249 port 49026 [preauth]
Jan  7 09:57:50 host sshd[1243]: Connection closed by 111.67.202.249 port 49048 [preauth]
Jan  7 09:57:50 host sshd[1241]: Connection closed by 111.67.202.249 port 48966 [preauth]
Jan  7 09:57:50 host sshd[1235]: Connection closed by 111.67.202.249 port 49088 [preauth]
Jan  7 09:57:50 host sshd[1247]: Connection closed by 111.67.202.249 port 49064 [preauth]
Jan  7 09:57:50 host sshd[1245]: Connection closed by 111.67.202.249 port 49100 [preauth]
Jan  7 09:57:50 host sshd[1250]: Connection closed by 111.67.202.249 port 48968 [preauth]
Jan  7 09:57:50 host sshd[1227]: Connection closed by 111.67.202.249 port 49034 [preauth]
Jan  7 09:57:50 host sshd[1232]: Connection closed by 111.67.202.249 port 49014 [preauth]
Jan  7 09:57:50 host sshd[1229]: Connection closed by 111.67.202.249 port 49050 [preauth]
Jan  7 09:57:50 host sshd[1248]: Connection closed by 111.67.202.249 port 49086 [preauth]
Jan  7 09:57:50 host sshd[1236]: Connection closed by 111.67.202.249 port 49084 [preauth]
Jan  7 09:57:50 host unix_chkpwd[1339]: password check failed for user (root)
Jan  7 09:57:50 host sshd[1316]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.202.249  user=root
Jan  7 09:57:50 host sshd[1316]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 09:57:50 host sshd[1249]: Connection closed by 111.67.202.249 port 49076 [preauth]
Jan  7 09:57:50 host sshd[1240]: Connection closed by 111.67.202.249 port 49012 [preauth]
Jan  7 09:57:50 host sshd[1246]: Connection closed by 111.67.202.249 port 49092 [preauth]
Jan  7 09:57:50 host sshd[1233]: Connection closed by 111.67.202.249 port 49030 [preauth]
Jan  7 09:57:51 host sshd[1286]: Failed password for invalid user ansible from 111.67.202.249 port 48994 ssh2
Jan  7 09:57:51 host sshd[1288]: Failed password for invalid user esuser from 111.67.202.249 port 48992 ssh2
Jan  7 09:57:51 host sshd[1294]: Failed password for invalid user casadiagnosis from 111.67.202.249 port 48990 ssh2
Jan  7 09:57:51 host sshd[1289]: Failed password for invalid user account1 from 111.67.202.249 port 49008 ssh2
Jan  7 09:57:51 host sshd[1287]: Failed password for invalid user root from 111.67.202.249 port 49010 ssh2
Jan  7 09:57:51 host sshd[1288]: Connection closed by 111.67.202.249 port 48992 [preauth]
Jan  7 09:57:51 host sshd[1286]: Connection closed by 111.67.202.249 port 48994 [preauth]
Jan  7 09:57:51 host sshd[1287]: Connection closed by 111.67.202.249 port 49010 [preauth]
Jan  7 09:57:51 host sshd[1289]: Connection closed by 111.67.202.249 port 49008 [preauth]
Jan  7 09:57:51 host sshd[1294]: Connection closed by 111.67.202.249 port 48990 [preauth]
Jan  7 09:57:51 host sshd[1297]: Failed password for invalid user admin from 111.67.202.249 port 49004 ssh2
Jan  7 09:57:51 host sshd[1297]: Connection closed by 111.67.202.249 port 49004 [preauth]
Jan  7 09:57:52 host sshd[1316]: Failed password for invalid user root from 111.67.202.249 port 48960 ssh2
Jan  7 09:58:14 host sshd[1488]: Connection reset by 167.71.166.243 port 50694 [preauth]
Jan  7 10:06:19 host sshd[3808]: Invalid user tonic from 175.138.187.14 port 30970
Jan  7 10:06:19 host sshd[3808]: input_userauth_request: invalid user tonic [preauth]
Jan  7 10:06:19 host sshd[3808]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 10:06:19 host sshd[3808]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.138.187.14
Jan  7 10:06:22 host sshd[3808]: Failed password for invalid user tonic from 175.138.187.14 port 30970 ssh2
Jan  7 10:06:22 host sshd[3808]: Received disconnect from 175.138.187.14 port 30970:11: Bye Bye [preauth]
Jan  7 10:06:22 host sshd[3808]: Disconnected from 175.138.187.14 port 30970 [preauth]
Jan  7 10:06:38 host sshd[3916]: Invalid user zeppelin from 124.158.157.253 port 52748
Jan  7 10:06:38 host sshd[3916]: input_userauth_request: invalid user zeppelin [preauth]
Jan  7 10:06:38 host sshd[3916]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 10:06:38 host sshd[3916]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.158.157.253
Jan  7 10:06:39 host sshd[3916]: Failed password for invalid user zeppelin from 124.158.157.253 port 52748 ssh2
Jan  7 10:06:39 host sshd[3916]: Received disconnect from 124.158.157.253 port 52748:11: Bye Bye [preauth]
Jan  7 10:06:39 host sshd[3916]: Disconnected from 124.158.157.253 port 52748 [preauth]
Jan  7 10:07:35 host sshd[4330]: Invalid user hadoop from 122.165.191.124 port 46244
Jan  7 10:07:35 host sshd[4330]: input_userauth_request: invalid user hadoop [preauth]
Jan  7 10:07:35 host sshd[4330]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 10:07:35 host sshd[4330]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.165.191.124
Jan  7 10:07:35 host sshd[4321]: Invalid user lancer from 192.3.139.42 port 42172
Jan  7 10:07:35 host sshd[4321]: input_userauth_request: invalid user lancer [preauth]
Jan  7 10:07:35 host sshd[4321]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 10:07:35 host sshd[4321]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.3.139.42
Jan  7 10:07:37 host sshd[4330]: Failed password for invalid user hadoop from 122.165.191.124 port 46244 ssh2
Jan  7 10:07:37 host sshd[4330]: Received disconnect from 122.165.191.124 port 46244:11: Bye Bye [preauth]
Jan  7 10:07:37 host sshd[4330]: Disconnected from 122.165.191.124 port 46244 [preauth]
Jan  7 10:07:37 host sshd[4321]: Failed password for invalid user lancer from 192.3.139.42 port 42172 ssh2
Jan  7 10:07:37 host sshd[4321]: Received disconnect from 192.3.139.42 port 42172:11: Bye Bye [preauth]
Jan  7 10:07:37 host sshd[4321]: Disconnected from 192.3.139.42 port 42172 [preauth]
Jan  7 10:08:05 host sshd[4487]: Invalid user lyric from 43.132.187.94 port 54844
Jan  7 10:08:05 host sshd[4487]: input_userauth_request: invalid user lyric [preauth]
Jan  7 10:08:05 host sshd[4487]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 10:08:05 host sshd[4487]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.132.187.94
Jan  7 10:08:07 host sshd[4487]: Failed password for invalid user lyric from 43.132.187.94 port 54844 ssh2
Jan  7 10:08:07 host sshd[4487]: Received disconnect from 43.132.187.94 port 54844:11: Bye Bye [preauth]
Jan  7 10:08:07 host sshd[4487]: Disconnected from 43.132.187.94 port 54844 [preauth]
Jan  7 10:08:38 host sshd[4667]: Invalid user apagar from 175.197.233.197 port 50758
Jan  7 10:08:38 host sshd[4667]: input_userauth_request: invalid user apagar [preauth]
Jan  7 10:08:38 host sshd[4667]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 10:08:38 host sshd[4667]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.197.233.197
Jan  7 10:08:40 host sshd[4667]: Failed password for invalid user apagar from 175.197.233.197 port 50758 ssh2
Jan  7 10:08:41 host sshd[4667]: Received disconnect from 175.197.233.197 port 50758:11: Bye Bye [preauth]
Jan  7 10:08:41 host sshd[4667]: Disconnected from 175.197.233.197 port 50758 [preauth]
Jan  7 10:10:12 host sshd[5224]: Invalid user wangsb from 167.71.239.134 port 34890
Jan  7 10:10:12 host sshd[5224]: input_userauth_request: invalid user wangsb [preauth]
Jan  7 10:10:12 host sshd[5224]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 10:10:12 host sshd[5224]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.239.134
Jan  7 10:10:14 host sshd[5224]: Failed password for invalid user wangsb from 167.71.239.134 port 34890 ssh2
Jan  7 10:10:14 host sshd[5224]: Received disconnect from 167.71.239.134 port 34890:11: Bye Bye [preauth]
Jan  7 10:10:14 host sshd[5224]: Disconnected from 167.71.239.134 port 34890 [preauth]
Jan  7 10:11:47 host sshd[5805]: Invalid user ybchae from 192.3.139.42 port 34692
Jan  7 10:11:47 host sshd[5805]: input_userauth_request: invalid user ybchae [preauth]
Jan  7 10:11:47 host sshd[5805]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 10:11:47 host sshd[5805]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.3.139.42
Jan  7 10:11:49 host sshd[5805]: Failed password for invalid user ybchae from 192.3.139.42 port 34692 ssh2
Jan  7 10:11:49 host sshd[5805]: Received disconnect from 192.3.139.42 port 34692:11: Bye Bye [preauth]
Jan  7 10:11:49 host sshd[5805]: Disconnected from 192.3.139.42 port 34692 [preauth]
Jan  7 10:12:25 host sshd[6058]: Invalid user ybchae from 175.138.187.14 port 26542
Jan  7 10:12:25 host sshd[6058]: input_userauth_request: invalid user ybchae [preauth]
Jan  7 10:12:25 host sshd[6058]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 10:12:25 host sshd[6058]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.138.187.14
Jan  7 10:12:27 host sshd[6058]: Failed password for invalid user ybchae from 175.138.187.14 port 26542 ssh2
Jan  7 10:12:27 host sshd[6058]: Received disconnect from 175.138.187.14 port 26542:11: Bye Bye [preauth]
Jan  7 10:12:27 host sshd[6058]: Disconnected from 175.138.187.14 port 26542 [preauth]
Jan  7 10:12:28 host sshd[6099]: Invalid user zhujing from 175.197.233.197 port 60422
Jan  7 10:12:28 host sshd[6099]: input_userauth_request: invalid user zhujing [preauth]
Jan  7 10:12:28 host sshd[6099]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 10:12:28 host sshd[6099]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.197.233.197
Jan  7 10:12:30 host sshd[6099]: Failed password for invalid user zhujing from 175.197.233.197 port 60422 ssh2
Jan  7 10:12:30 host sshd[6099]: Received disconnect from 175.197.233.197 port 60422:11: Bye Bye [preauth]
Jan  7 10:12:30 host sshd[6099]: Disconnected from 175.197.233.197 port 60422 [preauth]
Jan  7 10:12:55 host sshd[6240]: Invalid user jacinda from 192.3.139.42 port 34336
Jan  7 10:12:55 host sshd[6240]: input_userauth_request: invalid user jacinda [preauth]
Jan  7 10:12:55 host sshd[6240]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 10:12:55 host sshd[6240]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.3.139.42
Jan  7 10:12:57 host sshd[6240]: Failed password for invalid user jacinda from 192.3.139.42 port 34336 ssh2
Jan  7 10:13:06 host sshd[6351]: Invalid user ulf from 122.165.191.124 port 24552
Jan  7 10:13:06 host sshd[6351]: input_userauth_request: invalid user ulf [preauth]
Jan  7 10:13:06 host sshd[6351]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 10:13:06 host sshd[6351]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.165.191.124
Jan  7 10:13:08 host sshd[6351]: Failed password for invalid user ulf from 122.165.191.124 port 24552 ssh2
Jan  7 10:13:08 host sshd[6351]: Received disconnect from 122.165.191.124 port 24552:11: Bye Bye [preauth]
Jan  7 10:13:08 host sshd[6351]: Disconnected from 122.165.191.124 port 24552 [preauth]
Jan  7 10:13:34 host sshd[6519]: Invalid user snap from 167.71.239.134 port 42816
Jan  7 10:13:34 host sshd[6519]: input_userauth_request: invalid user snap [preauth]
Jan  7 10:13:34 host sshd[6519]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 10:13:34 host sshd[6519]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.239.134
Jan  7 10:13:35 host sshd[6519]: Failed password for invalid user snap from 167.71.239.134 port 42816 ssh2
Jan  7 10:13:35 host sshd[6519]: Received disconnect from 167.71.239.134 port 42816:11: Bye Bye [preauth]
Jan  7 10:13:35 host sshd[6519]: Disconnected from 167.71.239.134 port 42816 [preauth]
Jan  7 10:13:48 host sshd[6602]: Invalid user kvm from 175.197.233.197 port 37696
Jan  7 10:13:48 host sshd[6602]: input_userauth_request: invalid user kvm [preauth]
Jan  7 10:13:48 host sshd[6602]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 10:13:48 host sshd[6602]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.197.233.197
Jan  7 10:13:49 host sshd[6615]: Invalid user dle from 43.132.187.94 port 47524
Jan  7 10:13:49 host sshd[6615]: input_userauth_request: invalid user dle [preauth]
Jan  7 10:13:49 host sshd[6615]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 10:13:49 host sshd[6615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.132.187.94
Jan  7 10:13:50 host sshd[6602]: Failed password for invalid user kvm from 175.197.233.197 port 37696 ssh2
Jan  7 10:13:50 host sshd[6602]: Received disconnect from 175.197.233.197 port 37696:11: Bye Bye [preauth]
Jan  7 10:13:50 host sshd[6602]: Disconnected from 175.197.233.197 port 37696 [preauth]
Jan  7 10:13:51 host sshd[6615]: Failed password for invalid user dle from 43.132.187.94 port 47524 ssh2
Jan  7 10:13:52 host sshd[6615]: Received disconnect from 43.132.187.94 port 47524:11: Bye Bye [preauth]
Jan  7 10:13:52 host sshd[6615]: Disconnected from 43.132.187.94 port 47524 [preauth]
Jan  7 10:14:04 host sshd[6736]: Invalid user zhangguang from 175.138.187.14 port 54510
Jan  7 10:14:04 host sshd[6736]: input_userauth_request: invalid user zhangguang [preauth]
Jan  7 10:14:04 host sshd[6736]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 10:14:04 host sshd[6736]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.138.187.14
Jan  7 10:14:06 host sshd[6736]: Failed password for invalid user zhangguang from 175.138.187.14 port 54510 ssh2
Jan  7 10:14:06 host sshd[6736]: Received disconnect from 175.138.187.14 port 54510:11: Bye Bye [preauth]
Jan  7 10:14:06 host sshd[6736]: Disconnected from 175.138.187.14 port 54510 [preauth]
Jan  7 10:14:27 host sshd[6895]: Invalid user jira from 124.158.157.253 port 51740
Jan  7 10:14:27 host sshd[6895]: input_userauth_request: invalid user jira [preauth]
Jan  7 10:14:27 host sshd[6895]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 10:14:27 host sshd[6895]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.158.157.253
Jan  7 10:14:29 host sshd[6895]: Failed password for invalid user jira from 124.158.157.253 port 51740 ssh2
Jan  7 10:14:29 host sshd[6895]: Received disconnect from 124.158.157.253 port 51740:11: Bye Bye [preauth]
Jan  7 10:14:29 host sshd[6895]: Disconnected from 124.158.157.253 port 51740 [preauth]
Jan  7 10:14:42 host sshd[6964]: Invalid user jira from 122.165.191.124 port 24588
Jan  7 10:14:42 host sshd[6964]: input_userauth_request: invalid user jira [preauth]
Jan  7 10:14:42 host sshd[6964]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 10:14:42 host sshd[6964]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.165.191.124
Jan  7 10:14:44 host sshd[6964]: Failed password for invalid user jira from 122.165.191.124 port 24588 ssh2
Jan  7 10:14:44 host sshd[6964]: Received disconnect from 122.165.191.124 port 24588:11: Bye Bye [preauth]
Jan  7 10:14:44 host sshd[6964]: Disconnected from 122.165.191.124 port 24588 [preauth]
Jan  7 10:14:52 host sshd[7037]: Invalid user mardi from 167.71.239.134 port 37304
Jan  7 10:14:52 host sshd[7037]: input_userauth_request: invalid user mardi [preauth]
Jan  7 10:14:52 host sshd[7037]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 10:14:52 host sshd[7037]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.239.134
Jan  7 10:14:54 host sshd[7037]: Failed password for invalid user mardi from 167.71.239.134 port 37304 ssh2
Jan  7 10:14:54 host sshd[7037]: Received disconnect from 167.71.239.134 port 37304:11: Bye Bye [preauth]
Jan  7 10:14:54 host sshd[7037]: Disconnected from 167.71.239.134 port 37304 [preauth]
Jan  7 10:15:11 host sshd[7179]: Invalid user zhangfeng from 43.132.187.94 port 42550
Jan  7 10:15:11 host sshd[7179]: input_userauth_request: invalid user zhangfeng [preauth]
Jan  7 10:15:11 host sshd[7179]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 10:15:11 host sshd[7179]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.132.187.94
Jan  7 10:15:14 host sshd[7179]: Failed password for invalid user zhangfeng from 43.132.187.94 port 42550 ssh2
Jan  7 10:15:14 host sshd[7179]: Received disconnect from 43.132.187.94 port 42550:11: Bye Bye [preauth]
Jan  7 10:15:14 host sshd[7179]: Disconnected from 43.132.187.94 port 42550 [preauth]
Jan  7 10:15:51 host sshd[7421]: Invalid user user from 124.158.157.253 port 41006
Jan  7 10:15:51 host sshd[7421]: input_userauth_request: invalid user user [preauth]
Jan  7 10:15:51 host sshd[7421]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 10:15:51 host sshd[7421]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.158.157.253
Jan  7 10:15:52 host sshd[7421]: Failed password for invalid user user from 124.158.157.253 port 41006 ssh2
Jan  7 10:18:05 host sshd[8206]: User root from 206.189.219.241 not allowed because not listed in AllowUsers
Jan  7 10:18:05 host sshd[8206]: input_userauth_request: invalid user root [preauth]
Jan  7 10:18:05 host unix_chkpwd[8215]: password check failed for user (root)
Jan  7 10:18:05 host sshd[8206]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.219.241  user=root
Jan  7 10:18:05 host sshd[8206]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 10:18:07 host sshd[8206]: Failed password for invalid user root from 206.189.219.241 port 41266 ssh2
Jan  7 10:18:07 host sshd[8206]: Received disconnect from 206.189.219.241 port 41266:11: Bye Bye [preauth]
Jan  7 10:18:07 host sshd[8206]: Disconnected from 206.189.219.241 port 41266 [preauth]
Jan  7 10:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  7 10:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 10:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 10:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  7 10:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 10:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 10:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  7 10:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 10:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 10:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  7 10:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 10:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 10:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  7 10:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 10:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 10:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  7 10:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 10:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 10:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  7 10:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 10:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 10:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  7 10:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 10:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 10:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  7 10:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 10:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 10:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  7 10:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 10:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 10:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  7 10:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 10:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 10:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  7 10:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 10:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 10:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  7 10:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 10:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 10:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=ugotscom user-3=keralaholi user-4=wwwresourcehunte user-5=wwwrmswll user-6=travelboniface user-7=cochintaxi user-8=wwwkaretakers user-9=laundryboniface user-10=a2zgroup user-11=dartsimp user-12=wwwletsstalkfood user-13=straightcurve user-14=wwwevmhonda user-15=bonifacegroup user-16=mrsclean user-17=wwwnexidigital user-18=phmetals user-19=kottayamcalldriv user-20=palco123 user-21=gifterman user-22=woodpeck user-23=wwwkapin user-24=wwwkmaorg user-25=disposeat user-26=remysagr user-27=pmcresources user-28=shalinijames user-29=wwwtestugo user-30=vfmassets feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  7 10:21:54 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  7 10:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 10:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 10:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  7 10:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 10:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 10:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-PFKptudriSCxYfof.~
Jan  7 10:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 10:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 10:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-PFKptudriSCxYfof.~'
Jan  7 10:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 10:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 10:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-PFKptudriSCxYfof.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  7 10:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 10:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 10:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  7 10:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 10:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 10:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  7 10:21:55 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 10:21:55 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 10:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  7 10:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 10:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 10:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  7 10:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 10:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 10:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  7 10:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 10:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 10:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  7 10:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 10:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 10:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  7 10:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 10:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 10:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  7 10:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  7 10:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  7 10:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  7 10:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  7 10:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  7 10:22:01 host sshd[9648]: Invalid user vl from 124.123.66.20 port 53868
Jan  7 10:22:01 host sshd[9648]: input_userauth_request: invalid user vl [preauth]
Jan  7 10:22:01 host sshd[9648]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 10:22:01 host sshd[9648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.123.66.20
Jan  7 10:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  7 10:22:01 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  7 10:22:03 host sshd[9648]: Failed password for invalid user vl from 124.123.66.20 port 53868 ssh2
Jan  7 10:22:03 host sshd[9648]: Received disconnect from 124.123.66.20 port 53868:11: Bye Bye [preauth]
Jan  7 10:22:03 host sshd[9648]: Disconnected from 124.123.66.20 port 53868 [preauth]
Jan  7 10:22:03 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  7 10:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  7 10:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 10:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 10:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  7 10:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 10:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 10:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  7 10:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 10:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 10:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  7 10:22:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 10:22:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 10:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  7 10:22:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 10:22:10 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 10:22:10 host sshd[9748]: Invalid user xi from 43.135.162.180 port 32846
Jan  7 10:22:10 host sshd[9748]: input_userauth_request: invalid user xi [preauth]
Jan  7 10:22:10 host sshd[9748]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 10:22:10 host sshd[9748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.135.162.180
Jan  7 10:22:12 host sshd[9748]: Failed password for invalid user xi from 43.135.162.180 port 32846 ssh2
Jan  7 10:22:13 host sshd[9748]: Received disconnect from 43.135.162.180 port 32846:11: Bye Bye [preauth]
Jan  7 10:22:13 host sshd[9748]: Disconnected from 43.135.162.180 port 32846 [preauth]
Jan  7 10:22:30 host sshd[9869]: User root from 190.64.136.124 not allowed because not listed in AllowUsers
Jan  7 10:22:30 host sshd[9869]: input_userauth_request: invalid user root [preauth]
Jan  7 10:22:30 host unix_chkpwd[9878]: password check failed for user (root)
Jan  7 10:22:30 host sshd[9869]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.64.136.124  user=root
Jan  7 10:22:30 host sshd[9869]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 10:22:33 host sshd[9869]: Failed password for invalid user root from 190.64.136.124 port 47512 ssh2
Jan  7 10:22:33 host sshd[9869]: Received disconnect from 190.64.136.124 port 47512:11: Bye Bye [preauth]
Jan  7 10:22:33 host sshd[9869]: Disconnected from 190.64.136.124 port 47512 [preauth]
Jan  7 10:22:51 host sshd[9963]: Invalid user fz from 68.178.167.153 port 55630
Jan  7 10:22:51 host sshd[9963]: input_userauth_request: invalid user fz [preauth]
Jan  7 10:22:51 host sshd[9963]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 10:22:51 host sshd[9963]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.178.167.153
Jan  7 10:22:53 host sshd[9963]: Failed password for invalid user fz from 68.178.167.153 port 55630 ssh2
Jan  7 10:22:53 host sshd[9963]: Received disconnect from 68.178.167.153 port 55630:11: Bye Bye [preauth]
Jan  7 10:22:53 host sshd[9963]: Disconnected from 68.178.167.153 port 55630 [preauth]
Jan  7 10:23:22 host sshd[10102]: User root from 174.61.227.28 not allowed because not listed in AllowUsers
Jan  7 10:23:22 host sshd[10102]: input_userauth_request: invalid user root [preauth]
Jan  7 10:23:22 host unix_chkpwd[10110]: password check failed for user (root)
Jan  7 10:23:22 host sshd[10102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.61.227.28  user=root
Jan  7 10:23:22 host sshd[10102]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 10:23:24 host sshd[10102]: Failed password for invalid user root from 174.61.227.28 port 41876 ssh2
Jan  7 10:23:24 host sshd[10102]: Received disconnect from 174.61.227.28 port 41876:11: Bye Bye [preauth]
Jan  7 10:23:24 host sshd[10102]: Disconnected from 174.61.227.28 port 41876 [preauth]
Jan  7 10:24:46 host sshd[10534]: User root from 206.189.219.241 not allowed because not listed in AllowUsers
Jan  7 10:24:46 host sshd[10534]: input_userauth_request: invalid user root [preauth]
Jan  7 10:24:46 host unix_chkpwd[10545]: password check failed for user (root)
Jan  7 10:24:46 host sshd[10534]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.219.241  user=root
Jan  7 10:24:46 host sshd[10534]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 10:24:47 host sshd[10540]: Invalid user se from 174.61.227.28 port 36818
Jan  7 10:24:47 host sshd[10540]: input_userauth_request: invalid user se [preauth]
Jan  7 10:24:47 host sshd[10540]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 10:24:47 host sshd[10540]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.61.227.28
Jan  7 10:24:48 host sshd[10534]: Failed password for invalid user root from 206.189.219.241 port 44428 ssh2
Jan  7 10:24:48 host sshd[10584]: User root from 124.123.66.20 not allowed because not listed in AllowUsers
Jan  7 10:24:48 host sshd[10584]: input_userauth_request: invalid user root [preauth]
Jan  7 10:24:48 host unix_chkpwd[10586]: password check failed for user (root)
Jan  7 10:24:48 host sshd[10584]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.123.66.20  user=root
Jan  7 10:24:48 host sshd[10584]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 10:24:49 host sshd[10540]: Failed password for invalid user se from 174.61.227.28 port 36818 ssh2
Jan  7 10:24:49 host sshd[10540]: Received disconnect from 174.61.227.28 port 36818:11: Bye Bye [preauth]
Jan  7 10:24:49 host sshd[10540]: Disconnected from 174.61.227.28 port 36818 [preauth]
Jan  7 10:24:50 host sshd[10584]: Failed password for invalid user root from 124.123.66.20 port 33180 ssh2
Jan  7 10:24:50 host sshd[10584]: Received disconnect from 124.123.66.20 port 33180:11: Bye Bye [preauth]
Jan  7 10:24:50 host sshd[10584]: Disconnected from 124.123.66.20 port 33180 [preauth]
Jan  7 10:25:33 host sshd[10885]: User root from 190.64.136.124 not allowed because not listed in AllowUsers
Jan  7 10:25:33 host sshd[10885]: input_userauth_request: invalid user root [preauth]
Jan  7 10:25:33 host sshd[10906]: Invalid user se from 68.178.167.153 port 59406
Jan  7 10:25:33 host sshd[10906]: input_userauth_request: invalid user se [preauth]
Jan  7 10:25:33 host sshd[10906]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 10:25:33 host sshd[10906]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.178.167.153
Jan  7 10:25:33 host unix_chkpwd[10909]: password check failed for user (root)
Jan  7 10:25:33 host sshd[10885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.64.136.124  user=root
Jan  7 10:25:33 host sshd[10885]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 10:25:35 host sshd[10906]: Failed password for invalid user se from 68.178.167.153 port 59406 ssh2
Jan  7 10:25:35 host sshd[10906]: Received disconnect from 68.178.167.153 port 59406:11: Bye Bye [preauth]
Jan  7 10:25:35 host sshd[10906]: Disconnected from 68.178.167.153 port 59406 [preauth]
Jan  7 10:25:35 host sshd[10885]: Failed password for invalid user root from 190.64.136.124 port 22419 ssh2
Jan  7 10:25:35 host sshd[10885]: Received disconnect from 190.64.136.124 port 22419:11: Bye Bye [preauth]
Jan  7 10:25:35 host sshd[10885]: Disconnected from 190.64.136.124 port 22419 [preauth]
Jan  7 10:25:40 host sshd[10971]: Invalid user payment from 103.68.183.202 port 52942
Jan  7 10:25:40 host sshd[10971]: input_userauth_request: invalid user payment [preauth]
Jan  7 10:25:40 host sshd[10971]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 10:25:40 host sshd[10971]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.68.183.202
Jan  7 10:25:42 host sshd[10971]: Failed password for invalid user payment from 103.68.183.202 port 52942 ssh2
Jan  7 10:25:43 host sshd[10971]: Received disconnect from 103.68.183.202 port 52942:11: Bye Bye [preauth]
Jan  7 10:25:43 host sshd[10971]: Disconnected from 103.68.183.202 port 52942 [preauth]
Jan  7 10:26:22 host sshd[11144]: Invalid user git-reps from 187.111.28.131 port 59376
Jan  7 10:26:22 host sshd[11144]: input_userauth_request: invalid user git-reps [preauth]
Jan  7 10:26:22 host sshd[11144]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 10:26:22 host sshd[11144]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.111.28.131
Jan  7 10:26:25 host sshd[11144]: Failed password for invalid user git-reps from 187.111.28.131 port 59376 ssh2
Jan  7 10:26:25 host sshd[11144]: Received disconnect from 187.111.28.131 port 59376:11: Bye Bye [preauth]
Jan  7 10:26:25 host sshd[11144]: Disconnected from 187.111.28.131 port 59376 [preauth]
Jan  7 10:26:45 host sshd[11277]: Invalid user tmpu from 175.196.129.245 port 33784
Jan  7 10:26:45 host sshd[11277]: input_userauth_request: invalid user tmpu [preauth]
Jan  7 10:26:45 host sshd[11277]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 10:26:45 host sshd[11277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.196.129.245
Jan  7 10:26:47 host sshd[11277]: Failed password for invalid user tmpu from 175.196.129.245 port 33784 ssh2
Jan  7 10:26:47 host sshd[11277]: Received disconnect from 175.196.129.245 port 33784:11: Bye Bye [preauth]
Jan  7 10:26:47 host sshd[11277]: Disconnected from 175.196.129.245 port 33784 [preauth]
Jan  7 10:26:53 host sshd[11342]: User root from 68.178.167.153 not allowed because not listed in AllowUsers
Jan  7 10:26:53 host sshd[11342]: input_userauth_request: invalid user root [preauth]
Jan  7 10:26:53 host unix_chkpwd[11346]: password check failed for user (root)
Jan  7 10:26:53 host sshd[11342]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.178.167.153  user=root
Jan  7 10:26:53 host sshd[11342]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 10:26:55 host sshd[11342]: Failed password for invalid user root from 68.178.167.153 port 54334 ssh2
Jan  7 10:26:55 host sshd[11342]: Received disconnect from 68.178.167.153 port 54334:11: Bye Bye [preauth]
Jan  7 10:26:55 host sshd[11342]: Disconnected from 68.178.167.153 port 54334 [preauth]
Jan  7 10:27:14 host sshd[11644]: Invalid user avigdor from 103.154.94.27 port 48996
Jan  7 10:27:14 host sshd[11644]: input_userauth_request: invalid user avigdor [preauth]
Jan  7 10:27:14 host sshd[11644]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 10:27:14 host sshd[11644]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.154.94.27
Jan  7 10:27:16 host sshd[11644]: Failed password for invalid user avigdor from 103.154.94.27 port 48996 ssh2
Jan  7 10:27:16 host sshd[11644]: Received disconnect from 103.154.94.27 port 48996:11: Bye Bye [preauth]
Jan  7 10:27:16 host sshd[11644]: Disconnected from 103.154.94.27 port 48996 [preauth]
Jan  7 10:27:40 host sshd[11855]: Invalid user eleve from 43.135.162.180 port 34224
Jan  7 10:27:40 host sshd[11855]: input_userauth_request: invalid user eleve [preauth]
Jan  7 10:27:40 host sshd[11855]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 10:27:40 host sshd[11855]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.135.162.180
Jan  7 10:27:42 host sshd[11855]: Failed password for invalid user eleve from 43.135.162.180 port 34224 ssh2
Jan  7 10:27:42 host sshd[11855]: Received disconnect from 43.135.162.180 port 34224:11: Bye Bye [preauth]
Jan  7 10:27:42 host sshd[11855]: Disconnected from 43.135.162.180 port 34224 [preauth]
Jan  7 10:27:51 host sshd[11922]: Invalid user cip from 103.68.183.202 port 48500
Jan  7 10:27:51 host sshd[11922]: input_userauth_request: invalid user cip [preauth]
Jan  7 10:27:51 host sshd[11922]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 10:27:51 host sshd[11922]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.68.183.202
Jan  7 10:27:53 host sshd[11922]: Failed password for invalid user cip from 103.68.183.202 port 48500 ssh2
Jan  7 10:27:53 host sshd[11922]: Received disconnect from 103.68.183.202 port 48500:11: Bye Bye [preauth]
Jan  7 10:27:53 host sshd[11922]: Disconnected from 103.68.183.202 port 48500 [preauth]
Jan  7 10:28:44 host sshd[12228]: Invalid user agylis from 175.196.129.245 port 58446
Jan  7 10:28:44 host sshd[12228]: input_userauth_request: invalid user agylis [preauth]
Jan  7 10:28:44 host sshd[12228]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 10:28:44 host sshd[12228]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.196.129.245
Jan  7 10:28:45 host sshd[12228]: Failed password for invalid user agylis from 175.196.129.245 port 58446 ssh2
Jan  7 10:28:46 host sshd[12228]: Received disconnect from 175.196.129.245 port 58446:11: Bye Bye [preauth]
Jan  7 10:28:46 host sshd[12228]: Disconnected from 175.196.129.245 port 58446 [preauth]
Jan  7 10:28:51 host sshd[12258]: Invalid user wangqi from 43.135.162.180 port 33838
Jan  7 10:28:51 host sshd[12258]: input_userauth_request: invalid user wangqi [preauth]
Jan  7 10:28:51 host sshd[12258]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 10:28:51 host sshd[12258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.135.162.180
Jan  7 10:28:53 host sshd[12258]: Failed password for invalid user wangqi from 43.135.162.180 port 33838 ssh2
Jan  7 10:28:58 host sshd[12325]: Invalid user dspace from 103.68.183.202 port 35216
Jan  7 10:28:58 host sshd[12325]: input_userauth_request: invalid user dspace [preauth]
Jan  7 10:28:58 host sshd[12325]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 10:28:58 host sshd[12325]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.68.183.202
Jan  7 10:28:59 host sshd[12325]: Failed password for invalid user dspace from 103.68.183.202 port 35216 ssh2
Jan  7 10:29:00 host sshd[12325]: Received disconnect from 103.68.183.202 port 35216:11: Bye Bye [preauth]
Jan  7 10:29:00 host sshd[12325]: Disconnected from 103.68.183.202 port 35216 [preauth]
Jan  7 10:29:22 host sshd[12476]: Invalid user llb from 187.111.28.131 port 59384
Jan  7 10:29:22 host sshd[12476]: input_userauth_request: invalid user llb [preauth]
Jan  7 10:29:22 host sshd[12476]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 10:29:22 host sshd[12476]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.111.28.131
Jan  7 10:29:24 host sshd[12476]: Failed password for invalid user llb from 187.111.28.131 port 59384 ssh2
Jan  7 10:29:25 host sshd[12476]: Received disconnect from 187.111.28.131 port 59384:11: Bye Bye [preauth]
Jan  7 10:29:25 host sshd[12476]: Disconnected from 187.111.28.131 port 59384 [preauth]
Jan  7 10:29:36 host sshd[12568]: Invalid user tmpu from 103.154.94.27 port 50964
Jan  7 10:29:36 host sshd[12568]: input_userauth_request: invalid user tmpu [preauth]
Jan  7 10:29:36 host sshd[12568]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 10:29:36 host sshd[12568]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.154.94.27
Jan  7 10:29:39 host sshd[12568]: Failed password for invalid user tmpu from 103.154.94.27 port 50964 ssh2
Jan  7 10:29:39 host sshd[12568]: Received disconnect from 103.154.94.27 port 50964:11: Bye Bye [preauth]
Jan  7 10:29:39 host sshd[12568]: Disconnected from 103.154.94.27 port 50964 [preauth]
Jan  7 10:30:12 host sshd[12748]: Invalid user fhl from 175.196.129.245 port 60684
Jan  7 10:30:12 host sshd[12748]: input_userauth_request: invalid user fhl [preauth]
Jan  7 10:30:12 host sshd[12748]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 10:30:12 host sshd[12748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.196.129.245
Jan  7 10:30:14 host sshd[12748]: Failed password for invalid user fhl from 175.196.129.245 port 60684 ssh2
Jan  7 10:30:47 host sshd[12959]: Invalid user linktechs from 187.111.28.131 port 59400
Jan  7 10:30:47 host sshd[12959]: input_userauth_request: invalid user linktechs [preauth]
Jan  7 10:30:47 host sshd[12959]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 10:30:47 host sshd[12959]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.111.28.131
Jan  7 10:30:49 host sshd[12959]: Failed password for invalid user linktechs from 187.111.28.131 port 59400 ssh2
Jan  7 10:30:49 host sshd[12959]: Received disconnect from 187.111.28.131 port 59400:11: Bye Bye [preauth]
Jan  7 10:30:49 host sshd[12959]: Disconnected from 187.111.28.131 port 59400 [preauth]
Jan  7 10:30:51 host sshd[12988]: Invalid user cyr from 103.154.94.27 port 46006
Jan  7 10:30:51 host sshd[12988]: input_userauth_request: invalid user cyr [preauth]
Jan  7 10:30:51 host sshd[12988]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 10:30:51 host sshd[12988]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.154.94.27
Jan  7 10:30:53 host sshd[12988]: Failed password for invalid user cyr from 103.154.94.27 port 46006 ssh2
Jan  7 10:41:16 host sshd[16515]: Invalid user pi from 82.66.3.241 port 36738
Jan  7 10:41:16 host sshd[16515]: input_userauth_request: invalid user pi [preauth]
Jan  7 10:41:16 host sshd[16517]: Invalid user pi from 82.66.3.241 port 36744
Jan  7 10:41:16 host sshd[16517]: input_userauth_request: invalid user pi [preauth]
Jan  7 10:41:17 host sshd[16515]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 10:41:17 host sshd[16515]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.66.3.241
Jan  7 10:41:17 host sshd[16517]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 10:41:17 host sshd[16517]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.66.3.241
Jan  7 10:41:18 host sshd[16515]: Failed password for invalid user pi from 82.66.3.241 port 36738 ssh2
Jan  7 10:41:18 host sshd[16517]: Failed password for invalid user pi from 82.66.3.241 port 36744 ssh2
Jan  7 10:41:19 host sshd[16515]: Connection closed by 82.66.3.241 port 36738 [preauth]
Jan  7 10:41:19 host sshd[16517]: Connection closed by 82.66.3.241 port 36744 [preauth]
Jan  7 10:50:27 host sshd[20481]: User root from 192.241.148.118 not allowed because not listed in AllowUsers
Jan  7 10:50:27 host sshd[20481]: input_userauth_request: invalid user root [preauth]
Jan  7 10:50:27 host unix_chkpwd[20510]: password check failed for user (root)
Jan  7 10:50:27 host sshd[20481]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.148.118  user=root
Jan  7 10:50:27 host sshd[20481]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 10:50:29 host sshd[20481]: Failed password for invalid user root from 192.241.148.118 port 47142 ssh2
Jan  7 10:50:29 host sshd[20481]: Received disconnect from 192.241.148.118 port 47142:11: Bye Bye [preauth]
Jan  7 10:50:29 host sshd[20481]: Disconnected from 192.241.148.118 port 47142 [preauth]
Jan  7 10:54:27 host sshd[21786]: User root from 192.241.148.118 not allowed because not listed in AllowUsers
Jan  7 10:54:27 host sshd[21786]: input_userauth_request: invalid user root [preauth]
Jan  7 10:54:28 host unix_chkpwd[21824]: password check failed for user (root)
Jan  7 10:54:28 host sshd[21786]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.148.118  user=root
Jan  7 10:54:28 host sshd[21786]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 10:54:30 host sshd[21786]: Failed password for invalid user root from 192.241.148.118 port 50162 ssh2
Jan  7 10:55:56 host sshd[22187]: User root from 67.164.27.145 not allowed because not listed in AllowUsers
Jan  7 10:55:56 host sshd[22187]: input_userauth_request: invalid user root [preauth]
Jan  7 10:55:56 host unix_chkpwd[22190]: password check failed for user (root)
Jan  7 10:55:56 host sshd[22187]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.164.27.145  user=root
Jan  7 10:55:56 host sshd[22187]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 10:55:58 host sshd[22187]: Failed password for invalid user root from 67.164.27.145 port 41048 ssh2
Jan  7 10:55:58 host sshd[22187]: Received disconnect from 67.164.27.145 port 41048:11: Bye Bye [preauth]
Jan  7 10:55:58 host sshd[22187]: Disconnected from 67.164.27.145 port 41048 [preauth]
Jan  7 11:00:22 host sshd[23290]: User ftp from 80.68.3.98 not allowed because not listed in AllowUsers
Jan  7 11:00:22 host sshd[23290]: input_userauth_request: invalid user ftp [preauth]
Jan  7 11:00:22 host unix_chkpwd[23296]: password check failed for user (ftp)
Jan  7 11:00:22 host sshd[23290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.68.3.98  user=ftp
Jan  7 11:00:22 host sshd[23290]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp"
Jan  7 11:00:24 host sshd[23290]: Failed password for invalid user ftp from 80.68.3.98 port 50721 ssh2
Jan  7 11:00:24 host sshd[23290]: Received disconnect from 80.68.3.98 port 50721:11: Bye Bye [preauth]
Jan  7 11:00:24 host sshd[23290]: Disconnected from 80.68.3.98 port 50721 [preauth]
Jan  7 11:01:13 host sshd[23691]: User root from 68.183.78.141 not allowed because not listed in AllowUsers
Jan  7 11:01:13 host sshd[23691]: input_userauth_request: invalid user root [preauth]
Jan  7 11:01:13 host unix_chkpwd[23699]: password check failed for user (root)
Jan  7 11:01:13 host sshd[23691]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.78.141  user=root
Jan  7 11:01:13 host sshd[23691]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 11:01:15 host sshd[23704]: Invalid user zw from 185.74.5.184 port 38548
Jan  7 11:01:15 host sshd[23704]: input_userauth_request: invalid user zw [preauth]
Jan  7 11:01:15 host sshd[23704]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 11:01:15 host sshd[23704]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.74.5.184
Jan  7 11:01:15 host sshd[23691]: Failed password for invalid user root from 68.183.78.141 port 58218 ssh2
Jan  7 11:01:15 host sshd[23691]: Received disconnect from 68.183.78.141 port 58218:11: Bye Bye [preauth]
Jan  7 11:01:15 host sshd[23691]: Disconnected from 68.183.78.141 port 58218 [preauth]
Jan  7 11:01:16 host sshd[23710]: Invalid user mongodb from 67.164.27.145 port 57268
Jan  7 11:01:16 host sshd[23710]: input_userauth_request: invalid user mongodb [preauth]
Jan  7 11:01:16 host sshd[23710]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 11:01:16 host sshd[23710]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.164.27.145
Jan  7 11:01:17 host sshd[23704]: Failed password for invalid user zw from 185.74.5.184 port 38548 ssh2
Jan  7 11:01:18 host sshd[23710]: Failed password for invalid user mongodb from 67.164.27.145 port 57268 ssh2
Jan  7 11:01:18 host sshd[23704]: Received disconnect from 185.74.5.184 port 38548:11: Bye Bye [preauth]
Jan  7 11:01:18 host sshd[23704]: Disconnected from 185.74.5.184 port 38548 [preauth]
Jan  7 11:01:18 host sshd[23710]: Received disconnect from 67.164.27.145 port 57268:11: Bye Bye [preauth]
Jan  7 11:01:18 host sshd[23710]: Disconnected from 67.164.27.145 port 57268 [preauth]
Jan  7 11:02:00 host sshd[23967]: Invalid user user from 34.207.193.24 port 58368
Jan  7 11:02:00 host sshd[23967]: input_userauth_request: invalid user user [preauth]
Jan  7 11:02:00 host sshd[23967]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 11:02:00 host sshd[23967]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.207.193.24
Jan  7 11:02:02 host sshd[23967]: Failed password for invalid user user from 34.207.193.24 port 58368 ssh2
Jan  7 11:02:02 host sshd[23967]: Received disconnect from 34.207.193.24 port 58368:11: Bye Bye [preauth]
Jan  7 11:02:02 host sshd[23967]: Disconnected from 34.207.193.24 port 58368 [preauth]
Jan  7 11:02:45 host sshd[24227]: User root from 80.68.3.98 not allowed because not listed in AllowUsers
Jan  7 11:02:45 host sshd[24227]: input_userauth_request: invalid user root [preauth]
Jan  7 11:02:45 host unix_chkpwd[24234]: password check failed for user (root)
Jan  7 11:02:45 host sshd[24227]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.68.3.98  user=root
Jan  7 11:02:45 host sshd[24227]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 11:02:47 host sshd[24227]: Failed password for invalid user root from 80.68.3.98 port 37633 ssh2
Jan  7 11:02:47 host sshd[24227]: Received disconnect from 80.68.3.98 port 37633:11: Bye Bye [preauth]
Jan  7 11:02:47 host sshd[24227]: Disconnected from 80.68.3.98 port 37633 [preauth]
Jan  7 11:02:57 host sshd[24305]: Invalid user wangk from 185.74.5.184 port 35980
Jan  7 11:02:57 host sshd[24305]: input_userauth_request: invalid user wangk [preauth]
Jan  7 11:02:57 host sshd[24305]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 11:02:57 host sshd[24305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.74.5.184
Jan  7 11:02:59 host sshd[24312]: User root from 68.183.78.141 not allowed because not listed in AllowUsers
Jan  7 11:02:59 host sshd[24312]: input_userauth_request: invalid user root [preauth]
Jan  7 11:02:59 host unix_chkpwd[24323]: password check failed for user (root)
Jan  7 11:02:59 host sshd[24312]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.78.141  user=root
Jan  7 11:02:59 host sshd[24312]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 11:02:59 host sshd[24305]: Failed password for invalid user wangk from 185.74.5.184 port 35980 ssh2
Jan  7 11:02:59 host sshd[24305]: Received disconnect from 185.74.5.184 port 35980:11: Bye Bye [preauth]
Jan  7 11:02:59 host sshd[24305]: Disconnected from 185.74.5.184 port 35980 [preauth]
Jan  7 11:03:01 host sshd[24312]: Failed password for invalid user root from 68.183.78.141 port 46090 ssh2
Jan  7 11:03:01 host sshd[24312]: Received disconnect from 68.183.78.141 port 46090:11: Bye Bye [preauth]
Jan  7 11:03:01 host sshd[24312]: Disconnected from 68.183.78.141 port 46090 [preauth]
Jan  7 11:04:11 host sshd[24710]: Invalid user fi from 185.74.5.184 port 58580
Jan  7 11:04:11 host sshd[24710]: input_userauth_request: invalid user fi [preauth]
Jan  7 11:04:11 host sshd[24710]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 11:04:11 host sshd[24710]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.74.5.184
Jan  7 11:04:14 host sshd[24710]: Failed password for invalid user fi from 185.74.5.184 port 58580 ssh2
Jan  7 11:04:14 host sshd[24710]: Received disconnect from 185.74.5.184 port 58580:11: Bye Bye [preauth]
Jan  7 11:04:14 host sshd[24710]: Disconnected from 185.74.5.184 port 58580 [preauth]
Jan  7 11:07:13 host sshd[25747]: Invalid user redmine from 34.207.193.24 port 34232
Jan  7 11:07:13 host sshd[25747]: input_userauth_request: invalid user redmine [preauth]
Jan  7 11:07:13 host sshd[25747]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 11:07:13 host sshd[25747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.207.193.24
Jan  7 11:07:15 host sshd[25747]: Failed password for invalid user redmine from 34.207.193.24 port 34232 ssh2
Jan  7 11:07:16 host sshd[25747]: Received disconnect from 34.207.193.24 port 34232:11: Bye Bye [preauth]
Jan  7 11:07:16 host sshd[25747]: Disconnected from 34.207.193.24 port 34232 [preauth]
Jan  7 11:10:42 host sshd[26855]: User root from 34.207.193.24 not allowed because not listed in AllowUsers
Jan  7 11:10:42 host sshd[26855]: input_userauth_request: invalid user root [preauth]
Jan  7 11:10:42 host unix_chkpwd[26881]: password check failed for user (root)
Jan  7 11:10:42 host sshd[26855]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.207.193.24  user=root
Jan  7 11:10:42 host sshd[26855]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 11:10:45 host sshd[26855]: Failed password for invalid user root from 34.207.193.24 port 47594 ssh2
Jan  7 11:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  7 11:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 11:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 11:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  7 11:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 11:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 11:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  7 11:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 11:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 11:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  7 11:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 11:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 11:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  7 11:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 11:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 11:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  7 11:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 11:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 11:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  7 11:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 11:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 11:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  7 11:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 11:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 11:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  7 11:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 11:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 11:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  7 11:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 11:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 11:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  7 11:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 11:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 11:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  7 11:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 11:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 11:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  7 11:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 11:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 11:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwevmhonda user-2=bonifacegroup user-3=wwwletsstalkfood user-4=straightcurve user-5=kottayamcalldriv user-6=phmetals user-7=palco123 user-8=gifterman user-9=mrsclean user-10=wwwnexidigital user-11=wwwkmaorg user-12=disposeat user-13=remysagr user-14=woodpeck user-15=wwwkapin user-16=shalinijames user-17=wwwtestugo user-18=vfmassets user-19=pmcresources user-20=wwwpmcresource user-21=travelboniface user-22=ugotscom user-23=wwwresourcehunte user-24=keralaholi user-25=wwwrmswll user-26=wwwkaretakers user-27=cochintaxi user-28=a2zgroup user-29=dartsimp user-30=laundryboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  7 11:21:54 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  7 11:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 11:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 11:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  7 11:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 11:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 11:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-1jWqCpIGCxON11yV.~
Jan  7 11:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 11:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 11:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-1jWqCpIGCxON11yV.~'
Jan  7 11:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 11:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 11:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-1jWqCpIGCxON11yV.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  7 11:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 11:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 11:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  7 11:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 11:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 11:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  7 11:21:55 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 11:21:55 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 11:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  7 11:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 11:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 11:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  7 11:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 11:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 11:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  7 11:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 11:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 11:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  7 11:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 11:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 11:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  7 11:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 11:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 11:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  7 11:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  7 11:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  7 11:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  7 11:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  7 11:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  7 11:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  7 11:22:02 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  7 11:22:07 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  7 11:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  7 11:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 11:22:11 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 11:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  7 11:22:11 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 11:22:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 11:22:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  7 11:22:12 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 11:22:14 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 11:22:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  7 11:22:14 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 11:22:15 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 11:22:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  7 11:22:16 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 11:22:17 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 11:25:23 host sshd[29634]: User root from 178.62.50.191 not allowed because not listed in AllowUsers
Jan  7 11:25:23 host sshd[29634]: input_userauth_request: invalid user root [preauth]
Jan  7 11:25:23 host unix_chkpwd[29640]: password check failed for user (root)
Jan  7 11:25:23 host sshd[29634]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.50.191  user=root
Jan  7 11:25:23 host sshd[29634]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 11:25:26 host sshd[29634]: Failed password for invalid user root from 178.62.50.191 port 47452 ssh2
Jan  7 11:25:26 host sshd[29634]: Received disconnect from 178.62.50.191 port 47452:11: Bye Bye [preauth]
Jan  7 11:25:26 host sshd[29634]: Disconnected from 178.62.50.191 port 47452 [preauth]
Jan  7 11:25:30 host sshd[29677]: User root from 43.155.101.206 not allowed because not listed in AllowUsers
Jan  7 11:25:30 host sshd[29677]: input_userauth_request: invalid user root [preauth]
Jan  7 11:25:30 host unix_chkpwd[29680]: password check failed for user (root)
Jan  7 11:25:30 host sshd[29677]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.101.206  user=root
Jan  7 11:25:30 host sshd[29677]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 11:25:33 host sshd[29677]: Failed password for invalid user root from 43.155.101.206 port 59022 ssh2
Jan  7 11:25:33 host sshd[29677]: Received disconnect from 43.155.101.206 port 59022:11: Bye Bye [preauth]
Jan  7 11:25:33 host sshd[29677]: Disconnected from 43.155.101.206 port 59022 [preauth]
Jan  7 11:26:46 host sshd[29861]: Invalid user sammy from 178.128.122.222 port 35656
Jan  7 11:26:46 host sshd[29861]: input_userauth_request: invalid user sammy [preauth]
Jan  7 11:26:46 host sshd[29861]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 11:26:46 host sshd[29861]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.122.222
Jan  7 11:26:48 host sshd[29861]: Failed password for invalid user sammy from 178.128.122.222 port 35656 ssh2
Jan  7 11:26:49 host sshd[29861]: Received disconnect from 178.128.122.222 port 35656:11: Bye Bye [preauth]
Jan  7 11:26:49 host sshd[29861]: Disconnected from 178.128.122.222 port 35656 [preauth]
Jan  7 11:26:52 host sshd[29873]: User root from 195.211.108.114 not allowed because not listed in AllowUsers
Jan  7 11:26:52 host sshd[29873]: input_userauth_request: invalid user root [preauth]
Jan  7 11:26:52 host unix_chkpwd[29875]: password check failed for user (root)
Jan  7 11:26:52 host sshd[29873]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.211.108.114  user=root
Jan  7 11:26:52 host sshd[29873]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 11:26:54 host sshd[29873]: Failed password for invalid user root from 195.211.108.114 port 50612 ssh2
Jan  7 11:26:54 host sshd[29873]: Received disconnect from 195.211.108.114 port 50612:11: Bye Bye [preauth]
Jan  7 11:26:54 host sshd[29873]: Disconnected from 195.211.108.114 port 50612 [preauth]
Jan  7 11:28:14 host sshd[30164]: Invalid user hadoop from 207.249.96.147 port 33232
Jan  7 11:28:14 host sshd[30164]: input_userauth_request: invalid user hadoop [preauth]
Jan  7 11:28:14 host sshd[30164]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 11:28:14 host sshd[30164]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.249.96.147
Jan  7 11:28:16 host sshd[30164]: Failed password for invalid user hadoop from 207.249.96.147 port 33232 ssh2
Jan  7 11:28:17 host sshd[30164]: Received disconnect from 207.249.96.147 port 33232:11: Bye Bye [preauth]
Jan  7 11:28:17 host sshd[30164]: Disconnected from 207.249.96.147 port 33232 [preauth]
Jan  7 11:30:03 host sshd[30417]: Invalid user slider from 178.128.122.222 port 46904
Jan  7 11:30:03 host sshd[30417]: input_userauth_request: invalid user slider [preauth]
Jan  7 11:30:03 host sshd[30417]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 11:30:03 host sshd[30417]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.122.222
Jan  7 11:30:05 host sshd[30417]: Failed password for invalid user slider from 178.128.122.222 port 46904 ssh2
Jan  7 11:30:05 host sshd[30417]: Received disconnect from 178.128.122.222 port 46904:11: Bye Bye [preauth]
Jan  7 11:30:05 host sshd[30417]: Disconnected from 178.128.122.222 port 46904 [preauth]
Jan  7 11:30:10 host sshd[30430]: User root from 178.62.50.191 not allowed because not listed in AllowUsers
Jan  7 11:30:10 host sshd[30430]: input_userauth_request: invalid user root [preauth]
Jan  7 11:30:10 host unix_chkpwd[30434]: password check failed for user (root)
Jan  7 11:30:10 host sshd[30430]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.50.191  user=root
Jan  7 11:30:10 host sshd[30430]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 11:30:12 host sshd[30430]: Failed password for invalid user root from 178.62.50.191 port 40004 ssh2
Jan  7 11:30:12 host sshd[30430]: Received disconnect from 178.62.50.191 port 40004:11: Bye Bye [preauth]
Jan  7 11:30:12 host sshd[30430]: Disconnected from 178.62.50.191 port 40004 [preauth]
Jan  7 11:30:16 host sshd[30441]: Invalid user ftpuser from 207.249.96.147 port 36872
Jan  7 11:30:16 host sshd[30441]: input_userauth_request: invalid user ftpuser [preauth]
Jan  7 11:30:16 host sshd[30441]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 11:30:16 host sshd[30441]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.249.96.147
Jan  7 11:30:18 host sshd[30441]: Failed password for invalid user ftpuser from 207.249.96.147 port 36872 ssh2
Jan  7 11:30:18 host sshd[30441]: Received disconnect from 207.249.96.147 port 36872:11: Bye Bye [preauth]
Jan  7 11:30:18 host sshd[30441]: Disconnected from 207.249.96.147 port 36872 [preauth]
Jan  7 11:30:39 host sshd[30543]: Invalid user ftpuser from 195.211.108.114 port 50758
Jan  7 11:30:39 host sshd[30543]: input_userauth_request: invalid user ftpuser [preauth]
Jan  7 11:30:39 host sshd[30543]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 11:30:39 host sshd[30543]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.211.108.114
Jan  7 11:30:41 host sshd[30543]: Failed password for invalid user ftpuser from 195.211.108.114 port 50758 ssh2
Jan  7 11:30:41 host sshd[30543]: Received disconnect from 195.211.108.114 port 50758:11: Bye Bye [preauth]
Jan  7 11:30:41 host sshd[30543]: Disconnected from 195.211.108.114 port 50758 [preauth]
Jan  7 11:31:23 host sshd[30648]: User root from 43.155.101.206 not allowed because not listed in AllowUsers
Jan  7 11:31:23 host sshd[30648]: input_userauth_request: invalid user root [preauth]
Jan  7 11:31:23 host unix_chkpwd[30650]: password check failed for user (root)
Jan  7 11:31:23 host sshd[30648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.101.206  user=root
Jan  7 11:31:23 host sshd[30648]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 11:31:25 host sshd[30648]: Failed password for invalid user root from 43.155.101.206 port 53058 ssh2
Jan  7 11:31:25 host sshd[30648]: Received disconnect from 43.155.101.206 port 53058:11: Bye Bye [preauth]
Jan  7 11:31:25 host sshd[30648]: Disconnected from 43.155.101.206 port 53058 [preauth]
Jan  7 11:31:36 host sshd[30729]: Invalid user ftpuser from 178.128.122.222 port 46204
Jan  7 11:31:36 host sshd[30729]: input_userauth_request: invalid user ftpuser [preauth]
Jan  7 11:31:36 host sshd[30729]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 11:31:36 host sshd[30729]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.122.222
Jan  7 11:31:36 host sshd[30726]: Invalid user nigga from 207.249.96.147 port 36012
Jan  7 11:31:36 host sshd[30726]: input_userauth_request: invalid user nigga [preauth]
Jan  7 11:31:36 host sshd[30726]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 11:31:36 host sshd[30726]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.249.96.147
Jan  7 11:31:38 host sshd[30729]: Failed password for invalid user ftpuser from 178.128.122.222 port 46204 ssh2
Jan  7 11:31:38 host sshd[30729]: Received disconnect from 178.128.122.222 port 46204:11: Bye Bye [preauth]
Jan  7 11:31:38 host sshd[30729]: Disconnected from 178.128.122.222 port 46204 [preauth]
Jan  7 11:31:38 host sshd[30733]: Invalid user administrativo from 182.16.245.79 port 33046
Jan  7 11:31:38 host sshd[30733]: input_userauth_request: invalid user administrativo [preauth]
Jan  7 11:31:38 host sshd[30733]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 11:31:38 host sshd[30733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.16.245.79
Jan  7 11:31:38 host sshd[30726]: Failed password for invalid user nigga from 207.249.96.147 port 36012 ssh2
Jan  7 11:31:38 host sshd[30726]: Received disconnect from 207.249.96.147 port 36012:11: Bye Bye [preauth]
Jan  7 11:31:38 host sshd[30726]: Disconnected from 207.249.96.147 port 36012 [preauth]
Jan  7 11:31:40 host sshd[30733]: Failed password for invalid user administrativo from 182.16.245.79 port 33046 ssh2
Jan  7 11:31:40 host sshd[30733]: Received disconnect from 182.16.245.79 port 33046:11: Bye Bye [preauth]
Jan  7 11:31:40 host sshd[30733]: Disconnected from 182.16.245.79 port 33046 [preauth]
Jan  7 11:32:03 host sshd[30850]: Invalid user gaetan from 51.178.137.178 port 39134
Jan  7 11:32:03 host sshd[30850]: input_userauth_request: invalid user gaetan [preauth]
Jan  7 11:32:03 host sshd[30850]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 11:32:03 host sshd[30850]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.137.178
Jan  7 11:32:05 host sshd[30850]: Failed password for invalid user gaetan from 51.178.137.178 port 39134 ssh2
Jan  7 11:32:06 host sshd[30850]: Received disconnect from 51.178.137.178 port 39134:11: Bye Bye [preauth]
Jan  7 11:32:06 host sshd[30850]: Disconnected from 51.178.137.178 port 39134 [preauth]
Jan  7 11:36:06 host sshd[31567]: Invalid user ade from 147.182.156.122 port 58110
Jan  7 11:36:06 host sshd[31567]: input_userauth_request: invalid user ade [preauth]
Jan  7 11:36:06 host sshd[31567]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 11:36:06 host sshd[31567]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.182.156.122
Jan  7 11:36:08 host sshd[31567]: Failed password for invalid user ade from 147.182.156.122 port 58110 ssh2
Jan  7 11:36:09 host sshd[31567]: Received disconnect from 147.182.156.122 port 58110:11: Bye Bye [preauth]
Jan  7 11:36:09 host sshd[31567]: Disconnected from 147.182.156.122 port 58110 [preauth]
Jan  7 11:36:50 host sshd[31658]: Invalid user jgarcia from 143.198.233.171 port 47242
Jan  7 11:36:50 host sshd[31658]: input_userauth_request: invalid user jgarcia [preauth]
Jan  7 11:36:50 host sshd[31658]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 11:36:50 host sshd[31658]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.233.171
Jan  7 11:36:51 host sshd[31663]: Invalid user wind from 134.209.103.60 port 43030
Jan  7 11:36:51 host sshd[31663]: input_userauth_request: invalid user wind [preauth]
Jan  7 11:36:51 host sshd[31663]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 11:36:51 host sshd[31663]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.103.60
Jan  7 11:36:53 host sshd[31658]: Failed password for invalid user jgarcia from 143.198.233.171 port 47242 ssh2
Jan  7 11:36:53 host sshd[31658]: Received disconnect from 143.198.233.171 port 47242:11: Bye Bye [preauth]
Jan  7 11:36:53 host sshd[31658]: Disconnected from 143.198.233.171 port 47242 [preauth]
Jan  7 11:36:53 host sshd[31663]: Failed password for invalid user wind from 134.209.103.60 port 43030 ssh2
Jan  7 11:36:53 host sshd[31663]: Received disconnect from 134.209.103.60 port 43030:11: Bye Bye [preauth]
Jan  7 11:36:53 host sshd[31663]: Disconnected from 134.209.103.60 port 43030 [preauth]
Jan  7 11:37:02 host sshd[31688]: Invalid user lo from 64.227.148.177 port 55614
Jan  7 11:37:02 host sshd[31688]: input_userauth_request: invalid user lo [preauth]
Jan  7 11:37:02 host sshd[31688]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 11:37:02 host sshd[31688]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.148.177
Jan  7 11:37:04 host sshd[31688]: Failed password for invalid user lo from 64.227.148.177 port 55614 ssh2
Jan  7 11:37:04 host sshd[31688]: Received disconnect from 64.227.148.177 port 55614:11: Bye Bye [preauth]
Jan  7 11:37:04 host sshd[31688]: Disconnected from 64.227.148.177 port 55614 [preauth]
Jan  7 11:37:31 host sshd[31750]: Invalid user hex from 51.178.137.178 port 38314
Jan  7 11:37:31 host sshd[31750]: input_userauth_request: invalid user hex [preauth]
Jan  7 11:37:31 host sshd[31750]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 11:37:31 host sshd[31750]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.137.178
Jan  7 11:37:34 host sshd[31750]: Failed password for invalid user hex from 51.178.137.178 port 38314 ssh2
Jan  7 11:37:34 host sshd[31750]: Received disconnect from 51.178.137.178 port 38314:11: Bye Bye [preauth]
Jan  7 11:37:34 host sshd[31750]: Disconnected from 51.178.137.178 port 38314 [preauth]
Jan  7 11:38:10 host sshd[31824]: Invalid user t3 from 182.16.245.79 port 34864
Jan  7 11:38:10 host sshd[31824]: input_userauth_request: invalid user t3 [preauth]
Jan  7 11:38:10 host sshd[31824]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 11:38:10 host sshd[31824]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.16.245.79
Jan  7 11:38:12 host sshd[31824]: Failed password for invalid user t3 from 182.16.245.79 port 34864 ssh2
Jan  7 11:38:12 host sshd[31824]: Received disconnect from 182.16.245.79 port 34864:11: Bye Bye [preauth]
Jan  7 11:38:12 host sshd[31824]: Disconnected from 182.16.245.79 port 34864 [preauth]
Jan  7 11:38:45 host sshd[31893]: Invalid user ade from 143.198.233.171 port 54690
Jan  7 11:38:45 host sshd[31893]: input_userauth_request: invalid user ade [preauth]
Jan  7 11:38:45 host sshd[31893]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 11:38:45 host sshd[31893]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.233.171
Jan  7 11:38:46 host sshd[31893]: Failed password for invalid user ade from 143.198.233.171 port 54690 ssh2
Jan  7 11:38:47 host sshd[31893]: Received disconnect from 143.198.233.171 port 54690:11: Bye Bye [preauth]
Jan  7 11:38:47 host sshd[31893]: Disconnected from 143.198.233.171 port 54690 [preauth]
Jan  7 11:38:47 host sshd[31897]: Invalid user rvx from 51.178.137.178 port 37118
Jan  7 11:38:47 host sshd[31897]: input_userauth_request: invalid user rvx [preauth]
Jan  7 11:38:47 host sshd[31897]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 11:38:47 host sshd[31897]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.137.178
Jan  7 11:38:48 host sshd[31900]: Invalid user rud from 134.209.103.60 port 41470
Jan  7 11:38:48 host sshd[31900]: input_userauth_request: invalid user rud [preauth]
Jan  7 11:38:48 host sshd[31900]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 11:38:48 host sshd[31900]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.103.60
Jan  7 11:38:49 host sshd[31897]: Failed password for invalid user rvx from 51.178.137.178 port 37118 ssh2
Jan  7 11:38:49 host sshd[31897]: Received disconnect from 51.178.137.178 port 37118:11: Bye Bye [preauth]
Jan  7 11:38:49 host sshd[31897]: Disconnected from 51.178.137.178 port 37118 [preauth]
Jan  7 11:38:50 host sshd[31900]: Failed password for invalid user rud from 134.209.103.60 port 41470 ssh2
Jan  7 11:38:50 host sshd[31900]: Received disconnect from 134.209.103.60 port 41470:11: Bye Bye [preauth]
Jan  7 11:38:50 host sshd[31900]: Disconnected from 134.209.103.60 port 41470 [preauth]
Jan  7 11:39:06 host sshd[32075]: Invalid user yb from 64.227.148.177 port 55702
Jan  7 11:39:06 host sshd[32075]: input_userauth_request: invalid user yb [preauth]
Jan  7 11:39:06 host sshd[32075]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 11:39:06 host sshd[32075]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.148.177
Jan  7 11:39:08 host sshd[32075]: Failed password for invalid user yb from 64.227.148.177 port 55702 ssh2
Jan  7 11:39:08 host sshd[32075]: Received disconnect from 64.227.148.177 port 55702:11: Bye Bye [preauth]
Jan  7 11:39:08 host sshd[32075]: Disconnected from 64.227.148.177 port 55702 [preauth]
Jan  7 11:39:29 host sshd[32127]: Invalid user aip from 182.16.245.79 port 57800
Jan  7 11:39:29 host sshd[32127]: input_userauth_request: invalid user aip [preauth]
Jan  7 11:39:29 host sshd[32127]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 11:39:29 host sshd[32127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.16.245.79
Jan  7 11:39:31 host sshd[32127]: Failed password for invalid user aip from 182.16.245.79 port 57800 ssh2
Jan  7 11:39:46 host sshd[32195]: Invalid user vmware from 143.198.233.171 port 53306
Jan  7 11:39:46 host sshd[32195]: input_userauth_request: invalid user vmware [preauth]
Jan  7 11:39:46 host sshd[32195]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 11:39:46 host sshd[32195]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.233.171
Jan  7 11:39:48 host sshd[32195]: Failed password for invalid user vmware from 143.198.233.171 port 53306 ssh2
Jan  7 11:39:48 host sshd[32195]: Received disconnect from 143.198.233.171 port 53306:11: Bye Bye [preauth]
Jan  7 11:39:48 host sshd[32195]: Disconnected from 143.198.233.171 port 53306 [preauth]
Jan  7 11:40:13 host sshd[32313]: Invalid user vadim from 134.209.103.60 port 40450
Jan  7 11:40:13 host sshd[32313]: input_userauth_request: invalid user vadim [preauth]
Jan  7 11:40:13 host sshd[32313]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 11:40:13 host sshd[32313]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.103.60
Jan  7 11:40:15 host sshd[32313]: Failed password for invalid user vadim from 134.209.103.60 port 40450 ssh2
Jan  7 11:40:15 host sshd[32313]: Received disconnect from 134.209.103.60 port 40450:11: Bye Bye [preauth]
Jan  7 11:40:15 host sshd[32313]: Disconnected from 134.209.103.60 port 40450 [preauth]
Jan  7 11:40:22 host sshd[32367]: Invalid user marvin from 64.227.148.177 port 55778
Jan  7 11:40:22 host sshd[32367]: input_userauth_request: invalid user marvin [preauth]
Jan  7 11:40:22 host sshd[32367]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 11:40:22 host sshd[32367]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.148.177
Jan  7 11:40:23 host sshd[32367]: Failed password for invalid user marvin from 64.227.148.177 port 55778 ssh2
Jan  7 11:40:23 host sshd[32367]: Received disconnect from 64.227.148.177 port 55778:11: Bye Bye [preauth]
Jan  7 11:40:23 host sshd[32367]: Disconnected from 64.227.148.177 port 55778 [preauth]
Jan  7 11:40:28 host sshd[32425]: Invalid user flarum from 147.182.156.122 port 59628
Jan  7 11:40:28 host sshd[32425]: input_userauth_request: invalid user flarum [preauth]
Jan  7 11:40:28 host sshd[32425]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 11:40:28 host sshd[32425]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.182.156.122
Jan  7 11:40:30 host sshd[32425]: Failed password for invalid user flarum from 147.182.156.122 port 59628 ssh2
Jan  7 11:40:30 host sshd[32425]: Received disconnect from 147.182.156.122 port 59628:11: Bye Bye [preauth]
Jan  7 11:40:30 host sshd[32425]: Disconnected from 147.182.156.122 port 59628 [preauth]
Jan  7 11:41:01 host sshd[32467]: Connection closed by 191.185.77.110 port 46110 [preauth]
Jan  7 11:41:29 host sshd[32551]: Invalid user fusihao from 147.182.156.122 port 37576
Jan  7 11:41:29 host sshd[32551]: input_userauth_request: invalid user fusihao [preauth]
Jan  7 11:41:29 host sshd[32551]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 11:41:29 host sshd[32551]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.182.156.122
Jan  7 11:41:31 host sshd[32551]: Failed password for invalid user fusihao from 147.182.156.122 port 37576 ssh2
Jan  7 11:43:48 host sshd[467]: Invalid user inventory from 111.19.156.16 port 45150
Jan  7 11:43:48 host sshd[467]: input_userauth_request: invalid user inventory [preauth]
Jan  7 11:43:48 host sshd[467]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 11:43:48 host sshd[467]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.19.156.16
Jan  7 11:43:51 host sshd[467]: Failed password for invalid user inventory from 111.19.156.16 port 45150 ssh2
Jan  7 11:43:51 host sshd[467]: Received disconnect from 111.19.156.16 port 45150:11: Bye Bye [preauth]
Jan  7 11:43:51 host sshd[467]: Disconnected from 111.19.156.16 port 45150 [preauth]
Jan  7 11:45:00 host sshd[766]: Invalid user nadege from 111.19.156.16 port 54870
Jan  7 11:45:00 host sshd[766]: input_userauth_request: invalid user nadege [preauth]
Jan  7 11:45:00 host sshd[766]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 11:45:00 host sshd[766]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.19.156.16
Jan  7 11:45:03 host sshd[766]: Failed password for invalid user nadege from 111.19.156.16 port 54870 ssh2
Jan  7 11:45:03 host sshd[766]: Received disconnect from 111.19.156.16 port 54870:11: Bye Bye [preauth]
Jan  7 11:45:03 host sshd[766]: Disconnected from 111.19.156.16 port 54870 [preauth]
Jan  7 11:45:57 host sshd[915]: Invalid user sourabh from 111.19.156.16 port 36008
Jan  7 11:45:57 host sshd[915]: input_userauth_request: invalid user sourabh [preauth]
Jan  7 11:45:57 host sshd[915]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 11:45:57 host sshd[915]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.19.156.16
Jan  7 11:45:59 host sshd[915]: Failed password for invalid user sourabh from 111.19.156.16 port 36008 ssh2
Jan  7 11:45:59 host sshd[915]: Received disconnect from 111.19.156.16 port 36008:11: Bye Bye [preauth]
Jan  7 11:45:59 host sshd[915]: Disconnected from 111.19.156.16 port 36008 [preauth]
Jan  7 11:54:30 host sshd[2315]: Invalid user at from 194.110.203.109 port 39666
Jan  7 11:54:30 host sshd[2315]: input_userauth_request: invalid user at [preauth]
Jan  7 11:54:30 host sshd[2315]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 11:54:30 host sshd[2315]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109
Jan  7 11:54:32 host sshd[2315]: Failed password for invalid user at from 194.110.203.109 port 39666 ssh2
Jan  7 11:54:36 host sshd[2315]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 11:54:38 host sshd[2315]: Failed password for invalid user at from 194.110.203.109 port 39666 ssh2
Jan  7 11:54:41 host sshd[2315]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 11:54:44 host sshd[2315]: Failed password for invalid user at from 194.110.203.109 port 39666 ssh2
Jan  7 11:54:47 host sshd[2315]: Connection closed by 194.110.203.109 port 39666 [preauth]
Jan  7 11:54:47 host sshd[2315]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109
Jan  7 11:56:52 host sshd[2711]: User dbus from 104.244.74.6 not allowed because not listed in AllowUsers
Jan  7 11:56:52 host sshd[2711]: input_userauth_request: invalid user dbus [preauth]
Jan  7 11:56:52 host unix_chkpwd[2713]: password check failed for user (dbus)
Jan  7 11:56:52 host sshd[2711]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6  user=dbus
Jan  7 11:56:52 host sshd[2711]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "dbus"
Jan  7 11:56:54 host sshd[2711]: Failed password for invalid user dbus from 104.244.74.6 port 53646 ssh2
Jan  7 11:56:54 host sshd[2711]: Connection closed by 104.244.74.6 port 53646 [preauth]
Jan  7 11:57:01 host sshd[2724]: Invalid user konitada from 43.131.30.155 port 46110
Jan  7 11:57:01 host sshd[2724]: input_userauth_request: invalid user konitada [preauth]
Jan  7 11:57:01 host sshd[2724]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 11:57:01 host sshd[2724]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.131.30.155
Jan  7 11:57:01 host sshd[2728]: Connection reset by 201.144.108.57 port 47416 [preauth]
Jan  7 11:57:04 host sshd[2724]: Failed password for invalid user konitada from 43.131.30.155 port 46110 ssh2
Jan  7 11:57:04 host sshd[2724]: Received disconnect from 43.131.30.155 port 46110:11: Bye Bye [preauth]
Jan  7 11:57:04 host sshd[2724]: Disconnected from 43.131.30.155 port 46110 [preauth]
Jan  7 11:57:42 host sshd[2826]: Invalid user ii from 2.38.102.191 port 43482
Jan  7 11:57:42 host sshd[2826]: input_userauth_request: invalid user ii [preauth]
Jan  7 11:57:42 host sshd[2826]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 11:57:42 host sshd[2826]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.38.102.191
Jan  7 11:57:44 host sshd[2826]: Failed password for invalid user ii from 2.38.102.191 port 43482 ssh2
Jan  7 11:57:44 host sshd[2826]: Received disconnect from 2.38.102.191 port 43482:11: Bye Bye [preauth]
Jan  7 11:57:44 host sshd[2826]: Disconnected from 2.38.102.191 port 43482 [preauth]
Jan  7 11:59:24 host sshd[3079]: Invalid user obama from 197.248.20.39 port 62696
Jan  7 11:59:24 host sshd[3079]: input_userauth_request: invalid user obama [preauth]
Jan  7 11:59:24 host sshd[3079]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 11:59:24 host sshd[3079]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.248.20.39
Jan  7 11:59:26 host sshd[3079]: Failed password for invalid user obama from 197.248.20.39 port 62696 ssh2
Jan  7 11:59:26 host sshd[3079]: Received disconnect from 197.248.20.39 port 62696:11: Bye Bye [preauth]
Jan  7 11:59:26 host sshd[3079]: Disconnected from 197.248.20.39 port 62696 [preauth]
Jan  7 11:59:30 host sshd[3114]: Invalid user cheoleon from 159.89.162.253 port 43302
Jan  7 11:59:30 host sshd[3114]: input_userauth_request: invalid user cheoleon [preauth]
Jan  7 11:59:30 host sshd[3114]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 11:59:30 host sshd[3114]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.162.253
Jan  7 11:59:32 host sshd[3114]: Failed password for invalid user cheoleon from 159.89.162.253 port 43302 ssh2
Jan  7 11:59:32 host sshd[3114]: Received disconnect from 159.89.162.253 port 43302:11: Bye Bye [preauth]
Jan  7 11:59:32 host sshd[3114]: Disconnected from 159.89.162.253 port 43302 [preauth]
Jan  7 12:01:26 host sshd[3383]: Invalid user mengzhen from 200.137.65.37 port 52647
Jan  7 12:01:26 host sshd[3383]: input_userauth_request: invalid user mengzhen [preauth]
Jan  7 12:01:26 host sshd[3383]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 12:01:26 host sshd[3383]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.137.65.37
Jan  7 12:01:27 host sshd[3387]: Invalid user konitada from 111.253.206.219 port 37706
Jan  7 12:01:27 host sshd[3387]: input_userauth_request: invalid user konitada [preauth]
Jan  7 12:01:27 host sshd[3387]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 12:01:27 host sshd[3387]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.253.206.219
Jan  7 12:01:27 host sshd[3383]: Failed password for invalid user mengzhen from 200.137.65.37 port 52647 ssh2
Jan  7 12:01:28 host sshd[3383]: Received disconnect from 200.137.65.37 port 52647:11: Bye Bye [preauth]
Jan  7 12:01:28 host sshd[3383]: Disconnected from 200.137.65.37 port 52647 [preauth]
Jan  7 12:01:29 host sshd[3387]: Failed password for invalid user konitada from 111.253.206.219 port 37706 ssh2
Jan  7 12:01:29 host sshd[3387]: Received disconnect from 111.253.206.219 port 37706:11: Bye Bye [preauth]
Jan  7 12:01:29 host sshd[3387]: Disconnected from 111.253.206.219 port 37706 [preauth]
Jan  7 12:01:40 host sshd[3534]: Invalid user gabby from 68.183.232.192 port 54310
Jan  7 12:01:40 host sshd[3534]: input_userauth_request: invalid user gabby [preauth]
Jan  7 12:01:40 host sshd[3534]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 12:01:40 host sshd[3534]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.232.192
Jan  7 12:01:42 host sshd[3534]: Failed password for invalid user gabby from 68.183.232.192 port 54310 ssh2
Jan  7 12:01:42 host sshd[3534]: Received disconnect from 68.183.232.192 port 54310:11: Bye Bye [preauth]
Jan  7 12:01:42 host sshd[3534]: Disconnected from 68.183.232.192 port 54310 [preauth]
Jan  7 12:02:14 host sshd[3584]: Invalid user jimenez from 143.198.233.114 port 46726
Jan  7 12:02:14 host sshd[3584]: input_userauth_request: invalid user jimenez [preauth]
Jan  7 12:02:14 host sshd[3584]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 12:02:14 host sshd[3584]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.233.114
Jan  7 12:02:15 host sshd[3584]: Failed password for invalid user jimenez from 143.198.233.114 port 46726 ssh2
Jan  7 12:02:16 host sshd[3584]: Received disconnect from 143.198.233.114 port 46726:11: Bye Bye [preauth]
Jan  7 12:02:16 host sshd[3584]: Disconnected from 143.198.233.114 port 46726 [preauth]
Jan  7 12:02:40 host sshd[3643]: Invalid user oh from 159.89.162.253 port 53600
Jan  7 12:02:40 host sshd[3643]: input_userauth_request: invalid user oh [preauth]
Jan  7 12:02:40 host sshd[3643]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 12:02:40 host sshd[3643]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.162.253
Jan  7 12:02:42 host sshd[3643]: Failed password for invalid user oh from 159.89.162.253 port 53600 ssh2
Jan  7 12:02:42 host sshd[3643]: Received disconnect from 159.89.162.253 port 53600:11: Bye Bye [preauth]
Jan  7 12:02:42 host sshd[3643]: Disconnected from 159.89.162.253 port 53600 [preauth]
Jan  7 12:02:47 host sshd[3651]: Invalid user suzana from 2.38.102.191 port 58220
Jan  7 12:02:47 host sshd[3651]: input_userauth_request: invalid user suzana [preauth]
Jan  7 12:02:47 host sshd[3651]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 12:02:47 host sshd[3651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.38.102.191
Jan  7 12:02:49 host sshd[3651]: Failed password for invalid user suzana from 2.38.102.191 port 58220 ssh2
Jan  7 12:02:49 host sshd[3651]: Received disconnect from 2.38.102.191 port 58220:11: Bye Bye [preauth]
Jan  7 12:02:49 host sshd[3651]: Disconnected from 2.38.102.191 port 58220 [preauth]
Jan  7 12:03:14 host sshd[3713]: Invalid user attila from 43.131.30.155 port 43382
Jan  7 12:03:14 host sshd[3713]: input_userauth_request: invalid user attila [preauth]
Jan  7 12:03:14 host sshd[3713]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 12:03:14 host sshd[3713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.131.30.155
Jan  7 12:03:16 host sshd[3713]: Failed password for invalid user attila from 43.131.30.155 port 43382 ssh2
Jan  7 12:03:16 host sshd[3713]: Received disconnect from 43.131.30.155 port 43382:11: Bye Bye [preauth]
Jan  7 12:03:16 host sshd[3713]: Disconnected from 43.131.30.155 port 43382 [preauth]
Jan  7 12:03:43 host sshd[3793]: Invalid user ssm-user from 143.198.233.114 port 60594
Jan  7 12:03:43 host sshd[3793]: input_userauth_request: invalid user ssm-user [preauth]
Jan  7 12:03:43 host sshd[3793]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 12:03:43 host sshd[3793]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.233.114
Jan  7 12:03:45 host sshd[3793]: Failed password for invalid user ssm-user from 143.198.233.114 port 60594 ssh2
Jan  7 12:03:45 host sshd[3793]: Received disconnect from 143.198.233.114 port 60594:11: Bye Bye [preauth]
Jan  7 12:03:45 host sshd[3793]: Disconnected from 143.198.233.114 port 60594 [preauth]
Jan  7 12:03:55 host sshd[3815]: Invalid user deb from 2.38.102.191 port 60896
Jan  7 12:03:55 host sshd[3815]: input_userauth_request: invalid user deb [preauth]
Jan  7 12:03:55 host sshd[3815]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 12:03:55 host sshd[3815]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.38.102.191
Jan  7 12:03:57 host sshd[3815]: Failed password for invalid user deb from 2.38.102.191 port 60896 ssh2
Jan  7 12:04:00 host sshd[3856]: Invalid user physics from 159.89.162.253 port 52012
Jan  7 12:04:00 host sshd[3856]: input_userauth_request: invalid user physics [preauth]
Jan  7 12:04:00 host sshd[3856]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 12:04:00 host sshd[3856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.162.253
Jan  7 12:04:03 host sshd[3856]: Failed password for invalid user physics from 159.89.162.253 port 52012 ssh2
Jan  7 12:04:35 host sshd[3981]: Invalid user aboggs from 111.253.206.219 port 43148
Jan  7 12:04:35 host sshd[3981]: input_userauth_request: invalid user aboggs [preauth]
Jan  7 12:04:35 host sshd[3981]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 12:04:35 host sshd[3981]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.253.206.219
Jan  7 12:04:37 host sshd[3981]: Failed password for invalid user aboggs from 111.253.206.219 port 43148 ssh2
Jan  7 12:04:37 host sshd[3981]: Received disconnect from 111.253.206.219 port 43148:11: Bye Bye [preauth]
Jan  7 12:04:37 host sshd[3981]: Disconnected from 111.253.206.219 port 43148 [preauth]
Jan  7 12:04:38 host sshd[3992]: Invalid user isaiah from 197.248.20.39 port 35929
Jan  7 12:04:38 host sshd[3992]: input_userauth_request: invalid user isaiah [preauth]
Jan  7 12:04:38 host sshd[3992]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 12:04:38 host sshd[3992]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.248.20.39
Jan  7 12:04:40 host sshd[3992]: Failed password for invalid user isaiah from 197.248.20.39 port 35929 ssh2
Jan  7 12:04:40 host sshd[4006]: Invalid user pe from 43.131.30.155 port 42100
Jan  7 12:04:40 host sshd[4006]: input_userauth_request: invalid user pe [preauth]
Jan  7 12:04:40 host sshd[4006]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 12:04:40 host sshd[4006]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.131.30.155
Jan  7 12:04:40 host sshd[3992]: Received disconnect from 197.248.20.39 port 35929:11: Bye Bye [preauth]
Jan  7 12:04:40 host sshd[3992]: Disconnected from 197.248.20.39 port 35929 [preauth]
Jan  7 12:04:42 host sshd[4006]: Failed password for invalid user pe from 43.131.30.155 port 42100 ssh2
Jan  7 12:04:49 host sshd[4052]: Invalid user bd3g from 143.198.233.114 port 53460
Jan  7 12:04:49 host sshd[4052]: input_userauth_request: invalid user bd3g [preauth]
Jan  7 12:04:49 host sshd[4052]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 12:04:49 host sshd[4052]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.233.114
Jan  7 12:04:51 host sshd[4052]: Failed password for invalid user bd3g from 143.198.233.114 port 53460 ssh2
Jan  7 12:04:52 host sshd[4052]: Received disconnect from 143.198.233.114 port 53460:11: Bye Bye [preauth]
Jan  7 12:04:52 host sshd[4052]: Disconnected from 143.198.233.114 port 53460 [preauth]
Jan  7 12:05:06 host sshd[4139]: Invalid user ssm-user from 68.183.232.192 port 47636
Jan  7 12:05:06 host sshd[4139]: input_userauth_request: invalid user ssm-user [preauth]
Jan  7 12:05:06 host sshd[4139]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 12:05:06 host sshd[4139]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.232.192
Jan  7 12:05:08 host sshd[4139]: Failed password for invalid user ssm-user from 68.183.232.192 port 47636 ssh2
Jan  7 12:05:08 host sshd[4139]: Received disconnect from 68.183.232.192 port 47636:11: Bye Bye [preauth]
Jan  7 12:05:08 host sshd[4139]: Disconnected from 68.183.232.192 port 47636 [preauth]
Jan  7 12:05:43 host sshd[4235]: Invalid user yonald from 200.137.65.37 port 51560
Jan  7 12:05:43 host sshd[4235]: input_userauth_request: invalid user yonald [preauth]
Jan  7 12:05:43 host sshd[4235]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 12:05:43 host sshd[4235]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.137.65.37
Jan  7 12:05:45 host sshd[4235]: Failed password for invalid user yonald from 200.137.65.37 port 51560 ssh2
Jan  7 12:05:45 host sshd[4235]: Received disconnect from 200.137.65.37 port 51560:11: Bye Bye [preauth]
Jan  7 12:05:45 host sshd[4235]: Disconnected from 200.137.65.37 port 51560 [preauth]
Jan  7 12:05:59 host sshd[4262]: Invalid user deb from 111.253.206.219 port 38320
Jan  7 12:05:59 host sshd[4262]: input_userauth_request: invalid user deb [preauth]
Jan  7 12:05:59 host sshd[4262]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 12:05:59 host sshd[4262]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.253.206.219
Jan  7 12:06:01 host sshd[4262]: Failed password for invalid user deb from 111.253.206.219 port 38320 ssh2
Jan  7 12:06:01 host sshd[4262]: Received disconnect from 111.253.206.219 port 38320:11: Bye Bye [preauth]
Jan  7 12:06:01 host sshd[4262]: Disconnected from 111.253.206.219 port 38320 [preauth]
Jan  7 12:06:04 host sshd[4319]: Invalid user cheoleon from 197.248.20.39 port 41959
Jan  7 12:06:04 host sshd[4319]: input_userauth_request: invalid user cheoleon [preauth]
Jan  7 12:06:04 host sshd[4319]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 12:06:04 host sshd[4319]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.248.20.39
Jan  7 12:06:05 host sshd[4319]: Failed password for invalid user cheoleon from 197.248.20.39 port 41959 ssh2
Jan  7 12:06:06 host sshd[4319]: Received disconnect from 197.248.20.39 port 41959:11: Bye Bye [preauth]
Jan  7 12:06:06 host sshd[4319]: Disconnected from 197.248.20.39 port 41959 [preauth]
Jan  7 12:06:25 host sshd[4383]: Invalid user oskar from 68.183.232.192 port 34122
Jan  7 12:06:25 host sshd[4383]: input_userauth_request: invalid user oskar [preauth]
Jan  7 12:06:25 host sshd[4383]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 12:06:25 host sshd[4383]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.232.192
Jan  7 12:06:28 host sshd[4383]: Failed password for invalid user oskar from 68.183.232.192 port 34122 ssh2
Jan  7 12:08:39 host sshd[4798]: Invalid user db_shv from 200.137.65.37 port 46611
Jan  7 12:08:39 host sshd[4798]: input_userauth_request: invalid user db_shv [preauth]
Jan  7 12:08:39 host sshd[4798]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 12:08:39 host sshd[4798]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.137.65.37
Jan  7 12:08:41 host sshd[4798]: Failed password for invalid user db_shv from 200.137.65.37 port 46611 ssh2
Jan  7 12:08:41 host sshd[4798]: Received disconnect from 200.137.65.37 port 46611:11: Bye Bye [preauth]
Jan  7 12:08:41 host sshd[4798]: Disconnected from 200.137.65.37 port 46611 [preauth]
Jan  7 12:11:09 host sshd[5182]: User dbus from 104.244.74.6 not allowed because not listed in AllowUsers
Jan  7 12:11:09 host sshd[5182]: input_userauth_request: invalid user dbus [preauth]
Jan  7 12:11:09 host unix_chkpwd[5186]: password check failed for user (dbus)
Jan  7 12:11:09 host sshd[5182]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6  user=dbus
Jan  7 12:11:09 host sshd[5182]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "dbus"
Jan  7 12:11:10 host sshd[5182]: Failed password for invalid user dbus from 104.244.74.6 port 50036 ssh2
Jan  7 12:11:10 host sshd[5182]: Connection closed by 104.244.74.6 port 50036 [preauth]
Jan  7 12:15:24 host sshd[5997]: Connection closed by 172.104.11.46 port 18488 [preauth]
Jan  7 12:15:25 host sshd[6009]: Connection closed by 172.104.11.46 port 18496 [preauth]
Jan  7 12:15:27 host sshd[6014]: Connection closed by 172.104.11.46 port 18506 [preauth]
Jan  7 12:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  7 12:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 12:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 12:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  7 12:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 12:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 12:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  7 12:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 12:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 12:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  7 12:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 12:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 12:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  7 12:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 12:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 12:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  7 12:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 12:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 12:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  7 12:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 12:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 12:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  7 12:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 12:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 12:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  7 12:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 12:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 12:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  7 12:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 12:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 12:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  7 12:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 12:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 12:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  7 12:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 12:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 12:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  7 12:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 12:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 12:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=straightcurve user-2=wwwletsstalkfood user-3=wwwevmhonda user-4=bonifacegroup user-5=mrsclean user-6=wwwnexidigital user-7=kottayamcalldriv user-8=phmetals user-9=palco123 user-10=gifterman user-11=wwwkapin user-12=woodpeck user-13=remysagr user-14=wwwkmaorg user-15=disposeat user-16=pmcresources user-17=shalinijames user-18=wwwtestugo user-19=vfmassets user-20=wwwpmcresource user-21=ugotscom user-22=keralaholi user-23=wwwresourcehunte user-24=wwwrmswll user-25=travelboniface user-26=cochintaxi user-27=wwwkaretakers user-28=laundryboniface user-29=a2zgroup user-30=dartsimp feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  7 12:21:54 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  7 12:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 12:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 12:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  7 12:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 12:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 12:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-gdZGkkMImCIa3Ko3.~
Jan  7 12:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 12:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 12:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-gdZGkkMImCIa3Ko3.~'
Jan  7 12:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 12:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 12:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-gdZGkkMImCIa3Ko3.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  7 12:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 12:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 12:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  7 12:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 12:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 12:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  7 12:21:58 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 12:21:58 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 12:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  7 12:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 12:21:59 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 12:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  7 12:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 12:21:59 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 12:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  7 12:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 12:21:59 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 12:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  7 12:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 12:21:59 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 12:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  7 12:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 12:22:00 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 12:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  7 12:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  7 12:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  7 12:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  7 12:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  7 12:22:09 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  7 12:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  7 12:22:10 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  7 12:22:17 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  7 12:22:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  7 12:22:17 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 12:22:21 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 12:22:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  7 12:22:21 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 12:22:21 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 12:22:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  7 12:22:22 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 12:22:24 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 12:22:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  7 12:22:24 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 12:22:25 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 12:22:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  7 12:22:25 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 12:22:32 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 12:26:45 host sshd[9048]: Connection reset by 201.144.108.57 port 36633 [preauth]
Jan  7 12:28:33 host sshd[9399]: Connection reset by 201.144.108.57 port 50066 [preauth]
Jan  7 12:32:12 host sshd[9833]: Connection reset by 201.144.108.57 port 48700 [preauth]
Jan  7 12:33:47 host sshd[10003]: Connection reset by 201.144.108.57 port 33894 [preauth]
Jan  7 12:38:53 host sshd[10740]: Connection reset by 201.144.108.57 port 45954 [preauth]
Jan  7 12:42:13 host sshd[11259]: Invalid user nexidigital from 178.128.163.55 port 42118
Jan  7 12:42:13 host sshd[11259]: input_userauth_request: invalid user nexidigital [preauth]
Jan  7 12:42:13 host sshd[11259]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 12:42:13 host sshd[11259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.163.55
Jan  7 12:42:16 host sshd[11259]: Failed password for invalid user nexidigital from 178.128.163.55 port 42118 ssh2
Jan  7 12:42:16 host sshd[11259]: Connection closed by 178.128.163.55 port 42118 [preauth]
Jan  7 12:42:17 host sshd[11272]: Connection reset by 201.144.108.57 port 44582 [preauth]
Jan  7 12:43:35 host sshd[11462]: Invalid user nexidigital from 178.128.163.55 port 46526
Jan  7 12:43:35 host sshd[11462]: input_userauth_request: invalid user nexidigital [preauth]
Jan  7 12:43:35 host sshd[11462]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 12:43:35 host sshd[11462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.163.55
Jan  7 12:43:38 host sshd[11462]: Failed password for invalid user nexidigital from 178.128.163.55 port 46526 ssh2
Jan  7 12:43:38 host sshd[11462]: Connection closed by 178.128.163.55 port 46526 [preauth]
Jan  7 12:44:46 host sshd[11653]: Invalid user nexidigital from 178.128.163.55 port 50886
Jan  7 12:44:46 host sshd[11653]: input_userauth_request: invalid user nexidigital [preauth]
Jan  7 12:44:46 host sshd[11653]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 12:44:46 host sshd[11653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.163.55
Jan  7 12:44:48 host sshd[11653]: Failed password for invalid user nexidigital from 178.128.163.55 port 50886 ssh2
Jan  7 12:44:48 host sshd[11653]: Connection closed by 178.128.163.55 port 50886 [preauth]
Jan  7 12:50:59 host sshd[12812]: Connection reset by 201.144.108.57 port 55280 [preauth]
Jan  7 12:55:48 host sshd[13596]: Invalid user drcomadmin from 165.232.141.0 port 38654
Jan  7 12:55:48 host sshd[13596]: input_userauth_request: invalid user drcomadmin [preauth]
Jan  7 12:55:48 host sshd[13596]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 12:55:48 host sshd[13596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.141.0
Jan  7 12:55:50 host sshd[13596]: Failed password for invalid user drcomadmin from 165.232.141.0 port 38654 ssh2
Jan  7 12:55:51 host sshd[13596]: Received disconnect from 165.232.141.0 port 38654:11: Bye Bye [preauth]
Jan  7 12:55:51 host sshd[13596]: Disconnected from 165.232.141.0 port 38654 [preauth]
Jan  7 12:56:05 host sshd[13631]: Invalid user wangfang from 143.110.179.172 port 36782
Jan  7 12:56:05 host sshd[13631]: input_userauth_request: invalid user wangfang [preauth]
Jan  7 12:56:05 host sshd[13631]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 12:56:05 host sshd[13631]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.179.172
Jan  7 12:56:07 host sshd[13631]: Failed password for invalid user wangfang from 143.110.179.172 port 36782 ssh2
Jan  7 12:56:07 host sshd[13631]: Received disconnect from 143.110.179.172 port 36782:11: Bye Bye [preauth]
Jan  7 12:56:07 host sshd[13631]: Disconnected from 143.110.179.172 port 36782 [preauth]
Jan  7 12:56:13 host sshd[13651]: Invalid user ubuntu1 from 193.19.96.225 port 57309
Jan  7 12:56:13 host sshd[13651]: input_userauth_request: invalid user ubuntu1 [preauth]
Jan  7 12:56:13 host sshd[13651]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 12:56:13 host sshd[13651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.19.96.225
Jan  7 12:56:15 host sshd[13651]: Failed password for invalid user ubuntu1 from 193.19.96.225 port 57309 ssh2
Jan  7 12:56:15 host sshd[13651]: Received disconnect from 193.19.96.225 port 57309:11: Bye Bye [preauth]
Jan  7 12:56:15 host sshd[13651]: Disconnected from 193.19.96.225 port 57309 [preauth]
Jan  7 12:56:22 host sshd[13667]: Invalid user freeswitch from 201.163.1.66 port 36432
Jan  7 12:56:22 host sshd[13667]: input_userauth_request: invalid user freeswitch [preauth]
Jan  7 12:56:22 host sshd[13667]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 12:56:22 host sshd[13667]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.163.1.66
Jan  7 12:56:23 host sshd[13667]: Failed password for invalid user freeswitch from 201.163.1.66 port 36432 ssh2
Jan  7 12:56:24 host sshd[13667]: Received disconnect from 201.163.1.66 port 36432:11: Bye Bye [preauth]
Jan  7 12:56:24 host sshd[13667]: Disconnected from 201.163.1.66 port 36432 [preauth]
Jan  7 12:56:49 host sshd[13734]: Invalid user filip from 164.92.154.145 port 55506
Jan  7 12:56:49 host sshd[13734]: input_userauth_request: invalid user filip [preauth]
Jan  7 12:56:49 host sshd[13734]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 12:56:49 host sshd[13734]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.154.145
Jan  7 12:56:51 host sshd[13734]: Failed password for invalid user filip from 164.92.154.145 port 55506 ssh2
Jan  7 12:56:52 host sshd[13734]: Received disconnect from 164.92.154.145 port 55506:11: Bye Bye [preauth]
Jan  7 12:56:52 host sshd[13734]: Disconnected from 164.92.154.145 port 55506 [preauth]
Jan  7 12:58:37 host sshd[14098]: Invalid user filip from 43.133.229.111 port 54052
Jan  7 12:58:37 host sshd[14098]: input_userauth_request: invalid user filip [preauth]
Jan  7 12:58:37 host sshd[14098]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 12:58:37 host sshd[14098]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.133.229.111
Jan  7 12:58:39 host sshd[14098]: Failed password for invalid user filip from 43.133.229.111 port 54052 ssh2
Jan  7 12:58:40 host sshd[14098]: Received disconnect from 43.133.229.111 port 54052:11: Bye Bye [preauth]
Jan  7 12:58:40 host sshd[14098]: Disconnected from 43.133.229.111 port 54052 [preauth]
Jan  7 12:58:41 host sshd[14125]: Invalid user deployop from 143.244.162.174 port 36396
Jan  7 12:58:41 host sshd[14125]: input_userauth_request: invalid user deployop [preauth]
Jan  7 12:58:41 host sshd[14125]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 12:58:41 host sshd[14125]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.244.162.174
Jan  7 12:58:43 host sshd[14125]: Failed password for invalid user deployop from 143.244.162.174 port 36396 ssh2
Jan  7 12:58:43 host sshd[14125]: Received disconnect from 143.244.162.174 port 36396:11: Bye Bye [preauth]
Jan  7 12:58:43 host sshd[14125]: Disconnected from 143.244.162.174 port 36396 [preauth]
Jan  7 12:59:55 host sshd[14322]: Connection closed by 167.94.138.44 port 34052 [preauth]
Jan  7 13:00:28 host sshd[14473]: Invalid user krystian from 165.232.141.0 port 40436
Jan  7 13:00:28 host sshd[14473]: input_userauth_request: invalid user krystian [preauth]
Jan  7 13:00:29 host sshd[14473]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 13:00:29 host sshd[14473]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.141.0
Jan  7 13:00:31 host sshd[14473]: Failed password for invalid user krystian from 165.232.141.0 port 40436 ssh2
Jan  7 13:00:31 host sshd[14473]: Received disconnect from 165.232.141.0 port 40436:11: Bye Bye [preauth]
Jan  7 13:00:31 host sshd[14473]: Disconnected from 165.232.141.0 port 40436 [preauth]
Jan  7 13:00:46 host sshd[14520]: Invalid user ubuntu1 from 164.92.154.145 port 44424
Jan  7 13:00:46 host sshd[14520]: input_userauth_request: invalid user ubuntu1 [preauth]
Jan  7 13:00:46 host sshd[14520]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 13:00:46 host sshd[14520]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.154.145
Jan  7 13:00:47 host sshd[14524]: Invalid user ycq from 143.110.179.172 port 58742
Jan  7 13:00:47 host sshd[14524]: input_userauth_request: invalid user ycq [preauth]
Jan  7 13:00:47 host sshd[14524]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 13:00:47 host sshd[14524]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.179.172
Jan  7 13:00:48 host sshd[14520]: Failed password for invalid user ubuntu1 from 164.92.154.145 port 44424 ssh2
Jan  7 13:00:48 host sshd[14520]: Received disconnect from 164.92.154.145 port 44424:11: Bye Bye [preauth]
Jan  7 13:00:48 host sshd[14520]: Disconnected from 164.92.154.145 port 44424 [preauth]
Jan  7 13:00:50 host sshd[14524]: Failed password for invalid user ycq from 143.110.179.172 port 58742 ssh2
Jan  7 13:00:50 host sshd[14524]: Received disconnect from 143.110.179.172 port 58742:11: Bye Bye [preauth]
Jan  7 13:00:50 host sshd[14524]: Disconnected from 143.110.179.172 port 58742 [preauth]
Jan  7 13:00:52 host sshd[14530]: Invalid user ela from 201.163.1.66 port 52902
Jan  7 13:00:52 host sshd[14530]: input_userauth_request: invalid user ela [preauth]
Jan  7 13:00:52 host sshd[14530]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 13:00:52 host sshd[14530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.163.1.66
Jan  7 13:00:54 host sshd[14530]: Failed password for invalid user ela from 201.163.1.66 port 52902 ssh2
Jan  7 13:00:55 host sshd[14530]: Received disconnect from 201.163.1.66 port 52902:11: Bye Bye [preauth]
Jan  7 13:00:55 host sshd[14530]: Disconnected from 201.163.1.66 port 52902 [preauth]
Jan  7 13:01:25 host sshd[14604]: Invalid user ira from 164.92.112.145 port 40160
Jan  7 13:01:25 host sshd[14604]: input_userauth_request: invalid user ira [preauth]
Jan  7 13:01:25 host sshd[14604]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 13:01:25 host sshd[14604]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.112.145
Jan  7 13:01:27 host sshd[14604]: Failed password for invalid user ira from 164.92.112.145 port 40160 ssh2
Jan  7 13:01:27 host sshd[14604]: Received disconnect from 164.92.112.145 port 40160:11: Bye Bye [preauth]
Jan  7 13:01:27 host sshd[14604]: Disconnected from 164.92.112.145 port 40160 [preauth]
Jan  7 13:01:37 host sshd[14642]: Invalid user wuct from 143.244.162.174 port 43160
Jan  7 13:01:37 host sshd[14642]: input_userauth_request: invalid user wuct [preauth]
Jan  7 13:01:37 host sshd[14642]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 13:01:37 host sshd[14642]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.244.162.174
Jan  7 13:01:38 host sshd[14642]: Failed password for invalid user wuct from 143.244.162.174 port 43160 ssh2
Jan  7 13:01:38 host sshd[14642]: Received disconnect from 143.244.162.174 port 43160:11: Bye Bye [preauth]
Jan  7 13:01:39 host sshd[14642]: Disconnected from 143.244.162.174 port 43160 [preauth]
Jan  7 13:01:42 host sshd[14656]: Invalid user ira from 43.133.229.111 port 39456
Jan  7 13:01:42 host sshd[14656]: input_userauth_request: invalid user ira [preauth]
Jan  7 13:01:42 host sshd[14656]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 13:01:42 host sshd[14656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.133.229.111
Jan  7 13:01:44 host sshd[14661]: Invalid user wl from 165.232.141.0 port 55356
Jan  7 13:01:44 host sshd[14661]: input_userauth_request: invalid user wl [preauth]
Jan  7 13:01:44 host sshd[14661]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 13:01:44 host sshd[14661]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.141.0
Jan  7 13:01:44 host sshd[14656]: Failed password for invalid user ira from 43.133.229.111 port 39456 ssh2
Jan  7 13:01:44 host sshd[14656]: Received disconnect from 43.133.229.111 port 39456:11: Bye Bye [preauth]
Jan  7 13:01:44 host sshd[14656]: Disconnected from 43.133.229.111 port 39456 [preauth]
Jan  7 13:01:46 host sshd[14661]: Failed password for invalid user wl from 165.232.141.0 port 55356 ssh2
Jan  7 13:01:46 host sshd[14661]: Received disconnect from 165.232.141.0 port 55356:11: Bye Bye [preauth]
Jan  7 13:01:46 host sshd[14661]: Disconnected from 165.232.141.0 port 55356 [preauth]
Jan  7 13:01:56 host sshd[14713]: Invalid user incoming from 164.92.154.145 port 43338
Jan  7 13:01:56 host sshd[14713]: input_userauth_request: invalid user incoming [preauth]
Jan  7 13:01:56 host sshd[14713]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 13:01:56 host sshd[14713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.154.145
Jan  7 13:01:58 host sshd[14713]: Failed password for invalid user incoming from 164.92.154.145 port 43338 ssh2
Jan  7 13:01:58 host sshd[14713]: Received disconnect from 164.92.154.145 port 43338:11: Bye Bye [preauth]
Jan  7 13:01:58 host sshd[14713]: Disconnected from 164.92.154.145 port 43338 [preauth]
Jan  7 13:02:01 host sshd[14751]: Invalid user yarn from 201.163.1.66 port 48036
Jan  7 13:02:01 host sshd[14751]: input_userauth_request: invalid user yarn [preauth]
Jan  7 13:02:01 host sshd[14751]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 13:02:01 host sshd[14751]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.163.1.66
Jan  7 13:02:03 host sshd[14751]: Failed password for invalid user yarn from 201.163.1.66 port 48036 ssh2
Jan  7 13:02:03 host sshd[14751]: Received disconnect from 201.163.1.66 port 48036:11: Bye Bye [preauth]
Jan  7 13:02:03 host sshd[14751]: Disconnected from 201.163.1.66 port 48036 [preauth]
Jan  7 13:02:06 host sshd[14804]: Invalid user krystian from 193.19.96.225 port 36873
Jan  7 13:02:06 host sshd[14804]: input_userauth_request: invalid user krystian [preauth]
Jan  7 13:02:06 host sshd[14804]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 13:02:06 host sshd[14804]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.19.96.225
Jan  7 13:02:08 host sshd[14804]: Failed password for invalid user krystian from 193.19.96.225 port 36873 ssh2
Jan  7 13:02:08 host sshd[14804]: Received disconnect from 193.19.96.225 port 36873:11: Bye Bye [preauth]
Jan  7 13:02:08 host sshd[14804]: Disconnected from 193.19.96.225 port 36873 [preauth]
Jan  7 13:02:29 host sshd[14860]: Invalid user onkar from 164.92.112.145 port 34318
Jan  7 13:02:29 host sshd[14860]: input_userauth_request: invalid user onkar [preauth]
Jan  7 13:02:29 host sshd[14860]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 13:02:29 host sshd[14860]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.112.145
Jan  7 13:02:31 host sshd[14860]: Failed password for invalid user onkar from 164.92.112.145 port 34318 ssh2
Jan  7 13:02:31 host sshd[14860]: Received disconnect from 164.92.112.145 port 34318:11: Bye Bye [preauth]
Jan  7 13:02:31 host sshd[14860]: Disconnected from 164.92.112.145 port 34318 [preauth]
Jan  7 13:02:34 host sshd[14871]: Invalid user wym from 143.110.179.172 port 48534
Jan  7 13:02:34 host sshd[14871]: input_userauth_request: invalid user wym [preauth]
Jan  7 13:02:34 host sshd[14871]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 13:02:34 host sshd[14871]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.179.172
Jan  7 13:02:35 host sshd[14871]: Failed password for invalid user wym from 143.110.179.172 port 48534 ssh2
Jan  7 13:02:35 host sshd[14871]: Received disconnect from 143.110.179.172 port 48534:11: Bye Bye [preauth]
Jan  7 13:02:35 host sshd[14871]: Disconnected from 143.110.179.172 port 48534 [preauth]
Jan  7 13:02:41 host sshd[14946]: Invalid user ubuntu1 from 143.244.162.174 port 38014
Jan  7 13:02:41 host sshd[14946]: input_userauth_request: invalid user ubuntu1 [preauth]
Jan  7 13:02:41 host sshd[14946]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 13:02:41 host sshd[14946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.244.162.174
Jan  7 13:02:43 host sshd[14946]: Failed password for invalid user ubuntu1 from 143.244.162.174 port 38014 ssh2
Jan  7 13:02:43 host sshd[14946]: Received disconnect from 143.244.162.174 port 38014:11: Bye Bye [preauth]
Jan  7 13:02:43 host sshd[14946]: Disconnected from 143.244.162.174 port 38014 [preauth]
Jan  7 13:03:07 host sshd[15108]: Invalid user zhaoyu from 43.133.229.111 port 49612
Jan  7 13:03:07 host sshd[15108]: input_userauth_request: invalid user zhaoyu [preauth]
Jan  7 13:03:07 host sshd[15108]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 13:03:07 host sshd[15108]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.133.229.111
Jan  7 13:03:09 host sshd[15108]: Failed password for invalid user zhaoyu from 43.133.229.111 port 49612 ssh2
Jan  7 13:03:26 host sshd[15167]: Invalid user yjy from 164.92.112.145 port 52878
Jan  7 13:03:26 host sshd[15167]: input_userauth_request: invalid user yjy [preauth]
Jan  7 13:03:26 host sshd[15167]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 13:03:26 host sshd[15167]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.112.145
Jan  7 13:03:28 host sshd[15167]: Failed password for invalid user yjy from 164.92.112.145 port 52878 ssh2
Jan  7 13:03:28 host sshd[15167]: Received disconnect from 164.92.112.145 port 52878:11: Bye Bye [preauth]
Jan  7 13:03:28 host sshd[15167]: Disconnected from 164.92.112.145 port 52878 [preauth]
Jan  7 13:03:41 host sshd[15257]: Invalid user ubadmin from 193.19.96.225 port 58564
Jan  7 13:03:41 host sshd[15257]: input_userauth_request: invalid user ubadmin [preauth]
Jan  7 13:03:41 host sshd[15257]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 13:03:41 host sshd[15257]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.19.96.225
Jan  7 13:03:43 host sshd[15257]: Failed password for invalid user ubadmin from 193.19.96.225 port 58564 ssh2
Jan  7 13:03:43 host sshd[15257]: Received disconnect from 193.19.96.225 port 58564:11: Bye Bye [preauth]
Jan  7 13:03:43 host sshd[15257]: Disconnected from 193.19.96.225 port 58564 [preauth]
Jan  7 13:07:02 host sshd[15643]: Invalid user shield from 140.207.232.13 port 57802
Jan  7 13:07:02 host sshd[15643]: input_userauth_request: invalid user shield [preauth]
Jan  7 13:07:02 host sshd[15643]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 13:07:02 host sshd[15643]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.207.232.13
Jan  7 13:07:04 host sshd[15643]: Failed password for invalid user shield from 140.207.232.13 port 57802 ssh2
Jan  7 13:07:04 host sshd[15643]: Received disconnect from 140.207.232.13 port 57802:11: Bye Bye [preauth]
Jan  7 13:07:04 host sshd[15643]: Disconnected from 140.207.232.13 port 57802 [preauth]
Jan  7 13:07:40 host sshd[15724]: Invalid user videolan from 140.207.232.13 port 39144
Jan  7 13:07:40 host sshd[15724]: input_userauth_request: invalid user videolan [preauth]
Jan  7 13:07:40 host sshd[15724]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 13:07:40 host sshd[15724]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.207.232.13
Jan  7 13:07:42 host sshd[15724]: Failed password for invalid user videolan from 140.207.232.13 port 39144 ssh2
Jan  7 13:07:42 host sshd[15724]: Received disconnect from 140.207.232.13 port 39144:11: Bye Bye [preauth]
Jan  7 13:07:42 host sshd[15724]: Disconnected from 140.207.232.13 port 39144 [preauth]
Jan  7 13:08:17 host sshd[15781]: Invalid user wuct from 140.207.232.13 port 48712
Jan  7 13:08:17 host sshd[15781]: input_userauth_request: invalid user wuct [preauth]
Jan  7 13:08:17 host sshd[15781]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 13:08:17 host sshd[15781]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.207.232.13
Jan  7 13:08:19 host sshd[15781]: Failed password for invalid user wuct from 140.207.232.13 port 48712 ssh2
Jan  7 13:08:19 host sshd[15781]: Received disconnect from 140.207.232.13 port 48712:11: Bye Bye [preauth]
Jan  7 13:08:19 host sshd[15781]: Disconnected from 140.207.232.13 port 48712 [preauth]
Jan  7 13:09:58 host sshd[16156]: Did not receive identification string from 20.163.208.188 port 44852
Jan  7 13:10:01 host sshd[16167]: Invalid user fa from 20.163.208.188 port 45128
Jan  7 13:10:01 host sshd[16167]: input_userauth_request: invalid user fa [preauth]
Jan  7 13:10:01 host sshd[16162]: Invalid user teamspeak3 from 20.163.208.188 port 44962
Jan  7 13:10:01 host sshd[16162]: input_userauth_request: invalid user teamspeak3 [preauth]
Jan  7 13:10:01 host sshd[16165]: Invalid user esuser from 20.163.208.188 port 45002
Jan  7 13:10:01 host sshd[16165]: input_userauth_request: invalid user esuser [preauth]
Jan  7 13:10:01 host sshd[16161]: Invalid user postgres from 20.163.208.188 port 44894
Jan  7 13:10:01 host sshd[16161]: input_userauth_request: invalid user postgres [preauth]
Jan  7 13:10:01 host sshd[16171]: Invalid user web from 20.163.208.188 port 45076
Jan  7 13:10:01 host sshd[16158]: Invalid user zjw from 20.163.208.188 port 44900
Jan  7 13:10:01 host sshd[16171]: input_userauth_request: invalid user web [preauth]
Jan  7 13:10:01 host sshd[16158]: input_userauth_request: invalid user zjw [preauth]
Jan  7 13:10:01 host sshd[16172]: Invalid user postgres from 20.163.208.188 port 45028
Jan  7 13:10:01 host sshd[16172]: input_userauth_request: invalid user postgres [preauth]
Jan  7 13:10:01 host sshd[16166]: Invalid user ubuntu from 20.163.208.188 port 44928
Jan  7 13:10:01 host sshd[16164]: Invalid user guest from 20.163.208.188 port 44882
Jan  7 13:10:01 host sshd[16166]: input_userauth_request: invalid user ubuntu [preauth]
Jan  7 13:10:01 host sshd[16164]: input_userauth_request: invalid user guest [preauth]
Jan  7 13:10:01 host sshd[16168]: Invalid user test from 20.163.208.188 port 44946
Jan  7 13:10:01 host sshd[16168]: input_userauth_request: invalid user test [preauth]
Jan  7 13:10:01 host sshd[16159]: Invalid user guest from 20.163.208.188 port 44906
Jan  7 13:10:01 host sshd[16159]: input_userauth_request: invalid user guest [preauth]
Jan  7 13:10:01 host sshd[16157]: Invalid user oracle from 20.163.208.188 port 44866
Jan  7 13:10:01 host sshd[16177]: Invalid user steam from 20.163.208.188 port 45104
Jan  7 13:10:01 host sshd[16178]: Invalid user ubuntu from 20.163.208.188 port 45102
Jan  7 13:10:01 host sshd[16177]: input_userauth_request: invalid user steam [preauth]
Jan  7 13:10:01 host sshd[16160]: Invalid user elastic from 20.163.208.188 port 44930
Jan  7 13:10:01 host sshd[16178]: input_userauth_request: invalid user ubuntu [preauth]
Jan  7 13:10:01 host sshd[16157]: input_userauth_request: invalid user oracle [preauth]
Jan  7 13:10:01 host sshd[16160]: input_userauth_request: invalid user elastic [preauth]
Jan  7 13:10:01 host sshd[16174]: Invalid user ftpuser from 20.163.208.188 port 45108
Jan  7 13:10:01 host sshd[16174]: input_userauth_request: invalid user ftpuser [preauth]
Jan  7 13:10:01 host sshd[16176]: Invalid user guest from 20.163.208.188 port 45012
Jan  7 13:10:01 host sshd[16176]: input_userauth_request: invalid user guest [preauth]
Jan  7 13:10:01 host sshd[16180]: Invalid user git from 20.163.208.188 port 45176
Jan  7 13:10:01 host sshd[16180]: input_userauth_request: invalid user git [preauth]
Jan  7 13:10:01 host sshd[16179]: Invalid user jenkins from 20.163.208.188 port 45068
Jan  7 13:10:01 host sshd[16179]: input_userauth_request: invalid user jenkins [preauth]
Jan  7 13:10:01 host sshd[16170]: Invalid user steam from 20.163.208.188 port 45136
Jan  7 13:10:01 host sshd[16170]: input_userauth_request: invalid user steam [preauth]
Jan  7 13:10:01 host sshd[16181]: Invalid user jenkins from 20.163.208.188 port 45032
Jan  7 13:10:01 host sshd[16181]: input_userauth_request: invalid user jenkins [preauth]
Jan  7 13:10:01 host sshd[16175]: Invalid user ubuntu from 20.163.208.188 port 45052
Jan  7 13:10:01 host sshd[16173]: Invalid user testuser from 20.163.208.188 port 45048
Jan  7 13:10:01 host sshd[16175]: input_userauth_request: invalid user ubuntu [preauth]
Jan  7 13:10:01 host sshd[16173]: input_userauth_request: invalid user testuser [preauth]
Jan  7 13:10:01 host sshd[16169]: Invalid user steam from 20.163.208.188 port 44876
Jan  7 13:10:01 host sshd[16169]: input_userauth_request: invalid user steam [preauth]
Jan  7 13:10:01 host sshd[16182]: Invalid user ftpuser from 20.163.208.188 port 45180
Jan  7 13:10:01 host sshd[16182]: input_userauth_request: invalid user ftpuser [preauth]
Jan  7 13:10:01 host sshd[16163]: Invalid user hadoop from 20.163.208.188 port 44908
Jan  7 13:10:01 host sshd[16163]: input_userauth_request: invalid user hadoop [preauth]
Jan  7 13:10:01 host sshd[16167]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 13:10:01 host sshd[16167]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188
Jan  7 13:10:01 host sshd[16162]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 13:10:01 host sshd[16162]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188
Jan  7 13:10:02 host sshd[16165]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 13:10:02 host sshd[16165]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188
Jan  7 13:10:02 host sshd[16171]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 13:10:02 host sshd[16171]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188
Jan  7 13:10:02 host sshd[16168]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 13:10:02 host sshd[16168]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188
Jan  7 13:10:02 host sshd[16172]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 13:10:02 host sshd[16172]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188
Jan  7 13:10:02 host sshd[16180]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 13:10:02 host sshd[16180]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188
Jan  7 13:10:02 host sshd[16163]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 13:10:02 host sshd[16163]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188
Jan  7 13:10:02 host sshd[16169]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 13:10:02 host sshd[16169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188
Jan  7 13:10:02 host sshd[16160]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 13:10:02 host sshd[16160]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188
Jan  7 13:10:02 host sshd[16176]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 13:10:02 host sshd[16176]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188
Jan  7 13:10:02 host sshd[16182]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 13:10:02 host sshd[16182]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188
Jan  7 13:10:02 host sshd[16178]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 13:10:02 host sshd[16178]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188
Jan  7 13:10:02 host sshd[16170]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 13:10:02 host sshd[16170]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188
Jan  7 13:10:02 host sshd[16173]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 13:10:02 host sshd[16173]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188
Jan  7 13:10:02 host sshd[16175]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 13:10:02 host sshd[16175]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188
Jan  7 13:10:02 host sshd[16179]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 13:10:02 host sshd[16179]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188
Jan  7 13:10:02 host sshd[16181]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 13:10:02 host sshd[16181]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188
Jan  7 13:10:02 host sshd[16158]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 13:10:02 host sshd[16158]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188
Jan  7 13:10:02 host sshd[16174]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 13:10:02 host sshd[16174]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188
Jan  7 13:10:02 host sshd[16159]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 13:10:02 host sshd[16159]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188
Jan  7 13:10:02 host sshd[16164]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 13:10:02 host sshd[16164]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188
Jan  7 13:10:02 host sshd[16177]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 13:10:02 host sshd[16177]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188
Jan  7 13:10:02 host sshd[16157]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 13:10:02 host sshd[16157]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188
Jan  7 13:10:02 host sshd[16161]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 13:10:02 host sshd[16161]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188
Jan  7 13:10:02 host sshd[16166]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 13:10:02 host sshd[16166]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188
Jan  7 13:10:03 host sshd[16168]: Failed password for invalid user test from 20.163.208.188 port 44946 ssh2
Jan  7 13:10:03 host sshd[16171]: Failed password for invalid user web from 20.163.208.188 port 45076 ssh2
Jan  7 13:10:03 host sshd[16165]: Failed password for invalid user esuser from 20.163.208.188 port 45002 ssh2
Jan  7 13:10:03 host sshd[16172]: Failed password for invalid user postgres from 20.163.208.188 port 45028 ssh2
Jan  7 13:10:03 host sshd[16180]: Failed password for invalid user git from 20.163.208.188 port 45176 ssh2
Jan  7 13:10:03 host sshd[16167]: Failed password for invalid user fa from 20.163.208.188 port 45128 ssh2
Jan  7 13:10:03 host sshd[16162]: Failed password for invalid user teamspeak3 from 20.163.208.188 port 44962 ssh2
Jan  7 13:10:03 host sshd[16165]: Connection closed by 20.163.208.188 port 45002 [preauth]
Jan  7 13:10:03 host sshd[16168]: Connection closed by 20.163.208.188 port 44946 [preauth]
Jan  7 13:10:03 host sshd[16171]: Connection closed by 20.163.208.188 port 45076 [preauth]
Jan  7 13:10:03 host sshd[16172]: Connection closed by 20.163.208.188 port 45028 [preauth]
Jan  7 13:10:03 host sshd[16180]: Connection closed by 20.163.208.188 port 45176 [preauth]
Jan  7 13:10:03 host sshd[16167]: Connection closed by 20.163.208.188 port 45128 [preauth]
Jan  7 13:10:03 host sshd[16162]: Connection closed by 20.163.208.188 port 44962 [preauth]
Jan  7 13:10:04 host sshd[16169]: Failed password for invalid user steam from 20.163.208.188 port 44876 ssh2
Jan  7 13:10:04 host sshd[16160]: Failed password for invalid user elastic from 20.163.208.188 port 44930 ssh2
Jan  7 13:10:04 host sshd[16163]: Failed password for invalid user hadoop from 20.163.208.188 port 44908 ssh2
Jan  7 13:10:04 host sshd[16176]: Failed password for invalid user guest from 20.163.208.188 port 45012 ssh2
Jan  7 13:10:04 host sshd[16182]: Failed password for invalid user ftpuser from 20.163.208.188 port 45180 ssh2
Jan  7 13:10:04 host sshd[16178]: Failed password for invalid user ubuntu from 20.163.208.188 port 45102 ssh2
Jan  7 13:10:04 host sshd[16170]: Failed password for invalid user steam from 20.163.208.188 port 45136 ssh2
Jan  7 13:10:04 host sshd[16173]: Failed password for invalid user testuser from 20.163.208.188 port 45048 ssh2
Jan  7 13:10:04 host sshd[16175]: Failed password for invalid user ubuntu from 20.163.208.188 port 45052 ssh2
Jan  7 13:10:04 host sshd[16179]: Failed password for invalid user jenkins from 20.163.208.188 port 45068 ssh2
Jan  7 13:10:04 host sshd[16181]: Failed password for invalid user jenkins from 20.163.208.188 port 45032 ssh2
Jan  7 13:10:04 host sshd[16158]: Failed password for invalid user zjw from 20.163.208.188 port 44900 ssh2
Jan  7 13:10:04 host sshd[16174]: Failed password for invalid user ftpuser from 20.163.208.188 port 45108 ssh2
Jan  7 13:10:04 host sshd[16159]: Failed password for invalid user guest from 20.163.208.188 port 44906 ssh2
Jan  7 13:10:04 host sshd[16177]: Failed password for invalid user steam from 20.163.208.188 port 45104 ssh2
Jan  7 13:10:04 host sshd[16164]: Failed password for invalid user guest from 20.163.208.188 port 44882 ssh2
Jan  7 13:10:04 host sshd[16157]: Failed password for invalid user oracle from 20.163.208.188 port 44866 ssh2
Jan  7 13:10:04 host sshd[16161]: Failed password for invalid user postgres from 20.163.208.188 port 44894 ssh2
Jan  7 13:10:04 host sshd[16166]: Failed password for invalid user ubuntu from 20.163.208.188 port 44928 ssh2
Jan  7 13:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  7 13:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 13:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 13:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  7 13:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 13:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 13:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  7 13:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 13:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 13:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  7 13:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 13:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 13:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  7 13:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 13:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 13:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  7 13:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 13:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 13:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  7 13:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 13:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 13:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  7 13:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 13:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 13:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  7 13:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 13:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 13:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  7 13:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 13:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 13:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  7 13:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 13:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 13:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  7 13:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 13:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 13:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  7 13:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 13:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 13:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=cochintaxi user-2=wwwkaretakers user-3=laundryboniface user-4=dartsimp user-5=a2zgroup user-6=wwwpmcresource user-7=ugotscom user-8=wwwrmswll user-9=keralaholi user-10=wwwresourcehunte user-11=travelboniface user-12=woodpeck user-13=wwwkapin user-14=wwwkmaorg user-15=remysagr user-16=disposeat user-17=pmcresources user-18=wwwtestugo user-19=shalinijames user-20=vfmassets user-21=straightcurve user-22=wwwletsstalkfood user-23=wwwevmhonda user-24=bonifacegroup user-25=wwwnexidigital user-26=mrsclean user-27=phmetals user-28=kottayamcalldriv user-29=gifterman user-30=palco123 feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  7 13:21:55 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  7 13:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 13:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 13:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  7 13:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 13:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 13:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-UB9WRdUhBojwktgG.~
Jan  7 13:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 13:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 13:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-UB9WRdUhBojwktgG.~'
Jan  7 13:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 13:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 13:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-UB9WRdUhBojwktgG.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  7 13:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 13:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 13:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  7 13:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 13:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 13:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  7 13:21:56 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 13:21:56 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 13:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  7 13:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 13:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 13:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  7 13:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 13:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 13:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  7 13:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 13:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 13:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  7 13:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 13:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 13:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  7 13:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 13:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 13:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  7 13:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  7 13:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  7 13:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  7 13:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  7 13:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  7 13:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  7 13:22:00 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  7 13:22:02 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  7 13:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  7 13:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 13:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 13:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  7 13:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 13:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 13:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  7 13:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 13:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 13:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  7 13:22:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 13:22:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 13:22:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  7 13:22:12 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 13:22:16 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 13:32:22 host sshd[19455]: Invalid user  from 64.62.197.182 port 29747
Jan  7 13:32:22 host sshd[19455]: input_userauth_request: invalid user  [preauth]
Jan  7 13:32:25 host sshd[19455]: Connection closed by 64.62.197.182 port 29747 [preauth]
Jan  7 13:41:19 host sshd[20578]: User adm from 213.108.108.200 not allowed because not listed in AllowUsers
Jan  7 13:41:19 host sshd[20578]: input_userauth_request: invalid user adm [preauth]
Jan  7 13:41:19 host unix_chkpwd[20581]: password check failed for user (adm)
Jan  7 13:41:19 host sshd[20578]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.108.108.200  user=adm
Jan  7 13:41:19 host sshd[20578]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "adm"
Jan  7 13:41:21 host sshd[20578]: Failed password for invalid user adm from 213.108.108.200 port 33614 ssh2
Jan  7 13:41:21 host sshd[20578]: Received disconnect from 213.108.108.200 port 33614:11: Bye Bye [preauth]
Jan  7 13:41:21 host sshd[20578]: Disconnected from 213.108.108.200 port 33614 [preauth]
Jan  7 13:41:25 host sshd[20585]: Invalid user xdj from 167.71.166.90 port 41660
Jan  7 13:41:25 host sshd[20585]: input_userauth_request: invalid user xdj [preauth]
Jan  7 13:41:25 host sshd[20585]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 13:41:25 host sshd[20585]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.166.90
Jan  7 13:41:27 host sshd[20585]: Failed password for invalid user xdj from 167.71.166.90 port 41660 ssh2
Jan  7 13:41:28 host sshd[20585]: Received disconnect from 167.71.166.90 port 41660:11: Bye Bye [preauth]
Jan  7 13:41:28 host sshd[20585]: Disconnected from 167.71.166.90 port 41660 [preauth]
Jan  7 13:42:29 host sshd[20713]: Invalid user shi from 207.178.145.171 port 35629
Jan  7 13:42:29 host sshd[20713]: input_userauth_request: invalid user shi [preauth]
Jan  7 13:42:29 host sshd[20713]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 13:42:29 host sshd[20713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.178.145.171
Jan  7 13:42:31 host sshd[20713]: Failed password for invalid user shi from 207.178.145.171 port 35629 ssh2
Jan  7 13:42:31 host sshd[20713]: Received disconnect from 207.178.145.171 port 35629:11: Bye Bye [preauth]
Jan  7 13:42:31 host sshd[20713]: Disconnected from 207.178.145.171 port 35629 [preauth]
Jan  7 13:43:10 host sshd[20883]: Invalid user shi from 143.198.169.154 port 41882
Jan  7 13:43:10 host sshd[20883]: input_userauth_request: invalid user shi [preauth]
Jan  7 13:43:10 host sshd[20883]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 13:43:10 host sshd[20883]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.169.154
Jan  7 13:43:12 host sshd[20883]: Failed password for invalid user shi from 143.198.169.154 port 41882 ssh2
Jan  7 13:43:12 host sshd[20883]: Received disconnect from 143.198.169.154 port 41882:11: Bye Bye [preauth]
Jan  7 13:43:12 host sshd[20883]: Disconnected from 143.198.169.154 port 41882 [preauth]
Jan  7 13:44:03 host sshd[20997]: Invalid user pokemon from 213.108.108.200 port 58930
Jan  7 13:44:03 host sshd[20997]: input_userauth_request: invalid user pokemon [preauth]
Jan  7 13:44:03 host sshd[20997]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 13:44:03 host sshd[20997]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.108.108.200
Jan  7 13:44:05 host sshd[20997]: Failed password for invalid user pokemon from 213.108.108.200 port 58930 ssh2
Jan  7 13:44:05 host sshd[20997]: Received disconnect from 213.108.108.200 port 58930:11: Bye Bye [preauth]
Jan  7 13:44:05 host sshd[20997]: Disconnected from 213.108.108.200 port 58930 [preauth]
Jan  7 13:44:13 host sshd[21053]: Invalid user wpy from 188.254.0.218 port 38070
Jan  7 13:44:13 host sshd[21053]: input_userauth_request: invalid user wpy [preauth]
Jan  7 13:44:13 host sshd[21053]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 13:44:13 host sshd[21053]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.254.0.218
Jan  7 13:44:15 host sshd[21053]: Failed password for invalid user wpy from 188.254.0.218 port 38070 ssh2
Jan  7 13:44:15 host sshd[21053]: Received disconnect from 188.254.0.218 port 38070:11: Bye Bye [preauth]
Jan  7 13:44:15 host sshd[21053]: Disconnected from 188.254.0.218 port 38070 [preauth]
Jan  7 13:44:25 host sshd[21152]: Invalid user adp from 167.71.166.90 port 53920
Jan  7 13:44:25 host sshd[21152]: input_userauth_request: invalid user adp [preauth]
Jan  7 13:44:25 host sshd[21152]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 13:44:25 host sshd[21152]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.166.90
Jan  7 13:44:27 host sshd[21152]: Failed password for invalid user adp from 167.71.166.90 port 53920 ssh2
Jan  7 13:44:28 host sshd[21152]: Received disconnect from 167.71.166.90 port 53920:11: Bye Bye [preauth]
Jan  7 13:44:28 host sshd[21152]: Disconnected from 167.71.166.90 port 53920 [preauth]
Jan  7 13:45:35 host sshd[21382]: Invalid user wyh from 167.71.166.90 port 53580
Jan  7 13:45:35 host sshd[21382]: input_userauth_request: invalid user wyh [preauth]
Jan  7 13:45:35 host sshd[21382]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 13:45:35 host sshd[21382]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.166.90
Jan  7 13:45:37 host sshd[21382]: Failed password for invalid user wyh from 167.71.166.90 port 53580 ssh2
Jan  7 13:45:37 host sshd[21382]: Received disconnect from 167.71.166.90 port 53580:11: Bye Bye [preauth]
Jan  7 13:45:37 host sshd[21382]: Disconnected from 167.71.166.90 port 53580 [preauth]
Jan  7 13:45:44 host sshd[21447]: Connection closed by 143.198.169.154 port 41996 [preauth]
Jan  7 13:45:45 host sshd[21452]: Invalid user xdj from 188.254.0.218 port 34658
Jan  7 13:45:45 host sshd[21452]: input_userauth_request: invalid user xdj [preauth]
Jan  7 13:45:45 host sshd[21452]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 13:45:45 host sshd[21452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.254.0.218
Jan  7 13:45:47 host sshd[21452]: Failed password for invalid user xdj from 188.254.0.218 port 34658 ssh2
Jan  7 13:45:47 host sshd[21452]: Received disconnect from 188.254.0.218 port 34658:11: Bye Bye [preauth]
Jan  7 13:45:47 host sshd[21452]: Disconnected from 188.254.0.218 port 34658 [preauth]
Jan  7 13:46:52 host sshd[21696]: Invalid user xen from 188.254.0.218 port 57302
Jan  7 13:46:52 host sshd[21696]: input_userauth_request: invalid user xen [preauth]
Jan  7 13:46:52 host sshd[21696]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 13:46:52 host sshd[21696]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.254.0.218
Jan  7 13:46:54 host sshd[21696]: Failed password for invalid user xen from 188.254.0.218 port 57302 ssh2
Jan  7 13:46:54 host sshd[21696]: Received disconnect from 188.254.0.218 port 57302:11: Bye Bye [preauth]
Jan  7 13:46:54 host sshd[21696]: Disconnected from 188.254.0.218 port 57302 [preauth]
Jan  7 13:47:55 host sshd[21863]: Invalid user adp from 143.198.169.154 port 42112
Jan  7 13:47:55 host sshd[21863]: input_userauth_request: invalid user adp [preauth]
Jan  7 13:47:55 host sshd[21863]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 13:47:55 host sshd[21863]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.169.154
Jan  7 13:47:57 host sshd[21863]: Failed password for invalid user adp from 143.198.169.154 port 42112 ssh2
Jan  7 13:47:57 host sshd[21863]: Received disconnect from 143.198.169.154 port 42112:11: Bye Bye [preauth]
Jan  7 13:47:57 host sshd[21863]: Disconnected from 143.198.169.154 port 42112 [preauth]
Jan  7 13:50:10 host sshd[22234]: Invalid user user11 from 143.198.169.154 port 42220
Jan  7 13:50:10 host sshd[22234]: input_userauth_request: invalid user user11 [preauth]
Jan  7 13:50:10 host sshd[22234]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 13:50:10 host sshd[22234]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.169.154
Jan  7 13:50:12 host sshd[22234]: Failed password for invalid user user11 from 143.198.169.154 port 42220 ssh2
Jan  7 14:16:32 host sshd[25894]: Invalid user au from 194.110.203.109 port 55354
Jan  7 14:16:32 host sshd[25894]: input_userauth_request: invalid user au [preauth]
Jan  7 14:16:32 host sshd[25894]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 14:16:32 host sshd[25894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109
Jan  7 14:16:34 host sshd[25894]: Failed password for invalid user au from 194.110.203.109 port 55354 ssh2
Jan  7 14:16:37 host sshd[25894]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 14:16:40 host sshd[25894]: Failed password for invalid user au from 194.110.203.109 port 55354 ssh2
Jan  7 14:16:43 host sshd[25894]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 14:16:45 host sshd[25894]: Failed password for invalid user au from 194.110.203.109 port 55354 ssh2
Jan  7 14:16:48 host sshd[25894]: Connection closed by 194.110.203.109 port 55354 [preauth]
Jan  7 14:16:48 host sshd[25894]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109
Jan  7 14:18:33 host sshd[26091]: Invalid user zpk from 134.17.89.159 port 36656
Jan  7 14:18:33 host sshd[26091]: input_userauth_request: invalid user zpk [preauth]
Jan  7 14:18:33 host sshd[26091]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 14:18:33 host sshd[26091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.17.89.159
Jan  7 14:18:36 host sshd[26091]: Failed password for invalid user zpk from 134.17.89.159 port 36656 ssh2
Jan  7 14:18:36 host sshd[26091]: Received disconnect from 134.17.89.159 port 36656:11: Bye Bye [preauth]
Jan  7 14:18:36 host sshd[26091]: Disconnected from 134.17.89.159 port 36656 [preauth]
Jan  7 14:20:37 host sshd[26388]: Invalid user webb666 from 61.80.237.204 port 33318
Jan  7 14:20:37 host sshd[26388]: input_userauth_request: invalid user webb666 [preauth]
Jan  7 14:20:37 host sshd[26388]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 14:20:37 host sshd[26388]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.80.237.204
Jan  7 14:20:39 host sshd[26388]: Failed password for invalid user webb666 from 61.80.237.204 port 33318 ssh2
Jan  7 14:20:39 host sshd[26388]: Received disconnect from 61.80.237.204 port 33318:11: Bye Bye [preauth]
Jan  7 14:20:39 host sshd[26388]: Disconnected from 61.80.237.204 port 33318 [preauth]
Jan  7 14:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  7 14:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 14:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 14:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  7 14:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 14:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 14:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  7 14:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 14:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 14:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  7 14:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 14:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 14:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  7 14:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 14:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 14:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  7 14:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 14:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 14:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  7 14:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 14:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 14:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  7 14:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 14:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 14:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  7 14:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 14:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 14:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  7 14:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 14:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 14:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  7 14:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 14:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 14:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  7 14:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 14:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 14:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  7 14:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 14:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 14:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=travelboniface user-3=ugotscom user-4=wwwresourcehunte user-5=keralaholi user-6=wwwrmswll user-7=wwwkaretakers user-8=cochintaxi user-9=a2zgroup user-10=dartsimp user-11=laundryboniface user-12=wwwevmhonda user-13=bonifacegroup user-14=wwwletsstalkfood user-15=straightcurve user-16=kottayamcalldriv user-17=phmetals user-18=palco123 user-19=gifterman user-20=mrsclean user-21=wwwnexidigital user-22=remysagr user-23=wwwkmaorg user-24=disposeat user-25=woodpeck user-26=wwwkapin user-27=shalinijames user-28=wwwtestugo user-29=vfmassets user-30=pmcresources feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  7 14:21:55 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  7 14:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 14:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 14:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  7 14:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 14:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 14:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-4wqxG3snwuWlO8yL.~
Jan  7 14:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 14:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 14:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-4wqxG3snwuWlO8yL.~'
Jan  7 14:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 14:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 14:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-4wqxG3snwuWlO8yL.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  7 14:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 14:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 14:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  7 14:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 14:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 14:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  7 14:21:56 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 14:21:56 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 14:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  7 14:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 14:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 14:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  7 14:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 14:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 14:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  7 14:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 14:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 14:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  7 14:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 14:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 14:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  7 14:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 14:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 14:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  7 14:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  7 14:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  7 14:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  7 14:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  7 14:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  7 14:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  7 14:22:01 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  7 14:22:03 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  7 14:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  7 14:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 14:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 14:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  7 14:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 14:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 14:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  7 14:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 14:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 14:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  7 14:22:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 14:22:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 14:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  7 14:22:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 14:22:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 14:23:59 host sshd[27136]: Invalid user heidi from 61.80.237.204 port 42728
Jan  7 14:23:59 host sshd[27136]: input_userauth_request: invalid user heidi [preauth]
Jan  7 14:23:59 host sshd[27136]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 14:23:59 host sshd[27136]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.80.237.204
Jan  7 14:24:01 host sshd[27136]: Failed password for invalid user heidi from 61.80.237.204 port 42728 ssh2
Jan  7 14:24:01 host sshd[27136]: Received disconnect from 61.80.237.204 port 42728:11: Bye Bye [preauth]
Jan  7 14:24:01 host sshd[27136]: Disconnected from 61.80.237.204 port 42728 [preauth]
Jan  7 14:24:58 host sshd[27287]: Invalid user shonda from 134.17.89.159 port 59754
Jan  7 14:24:58 host sshd[27287]: input_userauth_request: invalid user shonda [preauth]
Jan  7 14:24:58 host sshd[27287]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 14:24:58 host sshd[27287]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.17.89.159
Jan  7 14:24:59 host sshd[27287]: Failed password for invalid user shonda from 134.17.89.159 port 59754 ssh2
Jan  7 14:24:59 host sshd[27287]: Received disconnect from 134.17.89.159 port 59754:11: Bye Bye [preauth]
Jan  7 14:24:59 host sshd[27287]: Disconnected from 134.17.89.159 port 59754 [preauth]
Jan  7 14:26:27 host sshd[27522]: Invalid user Aleksanteri from 134.17.89.159 port 54410
Jan  7 14:26:27 host sshd[27522]: input_userauth_request: invalid user Aleksanteri [preauth]
Jan  7 14:26:27 host sshd[27522]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 14:26:27 host sshd[27522]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.17.89.159
Jan  7 14:26:29 host sshd[27522]: Failed password for invalid user Aleksanteri from 134.17.89.159 port 54410 ssh2
Jan  7 14:26:30 host sshd[27522]: Received disconnect from 134.17.89.159 port 54410:11: Bye Bye [preauth]
Jan  7 14:26:30 host sshd[27522]: Disconnected from 134.17.89.159 port 54410 [preauth]
Jan  7 14:30:50 host sshd[28430]: Invalid user dingshizhe from 61.80.237.204 port 40278
Jan  7 14:30:50 host sshd[28430]: input_userauth_request: invalid user dingshizhe [preauth]
Jan  7 14:30:50 host sshd[28430]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 14:30:50 host sshd[28430]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.80.237.204
Jan  7 14:30:53 host sshd[28430]: Failed password for invalid user dingshizhe from 61.80.237.204 port 40278 ssh2
Jan  7 14:45:31 host sshd[30684]: Invalid user pearlynixon@ugotechnologies.com from 41.100.72.158 port 38951
Jan  7 14:45:31 host sshd[30684]: input_userauth_request: invalid user pearlynixon@ugotechnologies.com [preauth]
Jan  7 14:45:32 host sshd[30684]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 14:45:32 host sshd[30684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.100.72.158
Jan  7 14:45:34 host sshd[30684]: Failed password for invalid user pearlynixon@ugotechnologies.com from 41.100.72.158 port 38951 ssh2
Jan  7 14:45:34 host sshd[30684]: Connection closed by 41.100.72.158 port 38951 [preauth]
Jan  7 14:45:35 host sshd[30767]: User root from 41.100.72.158 not allowed because not listed in AllowUsers
Jan  7 14:45:35 host sshd[30767]: input_userauth_request: invalid user root [preauth]
Jan  7 14:45:35 host unix_chkpwd[30803]: password check failed for user (root)
Jan  7 14:45:35 host sshd[30767]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.100.72.158  user=root
Jan  7 14:45:35 host sshd[30767]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 14:45:37 host sshd[30767]: Failed password for invalid user root from 41.100.72.158 port 39799 ssh2
Jan  7 14:45:37 host sshd[30767]: Connection closed by 41.100.72.158 port 39799 [preauth]
Jan  7 14:45:54 host sshd[30865]: Invalid user nicholas from 107.189.30.59 port 60808
Jan  7 14:45:54 host sshd[30865]: input_userauth_request: invalid user nicholas [preauth]
Jan  7 14:45:54 host sshd[30865]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 14:45:54 host sshd[30865]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59
Jan  7 14:45:56 host sshd[30865]: Failed password for invalid user nicholas from 107.189.30.59 port 60808 ssh2
Jan  7 14:45:57 host sshd[30865]: Connection closed by 107.189.30.59 port 60808 [preauth]
Jan  7 14:48:59 host sshd[31209]: Did not receive identification string from 46.101.97.107 port 61000
Jan  7 14:50:32 host sshd[31445]: Invalid user bluehost from 46.101.249.11 port 56288
Jan  7 14:50:32 host sshd[31445]: input_userauth_request: invalid user bluehost [preauth]
Jan  7 14:50:32 host sshd[31445]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 14:50:32 host sshd[31445]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.249.11
Jan  7 14:50:35 host sshd[31445]: Failed password for invalid user bluehost from 46.101.249.11 port 56288 ssh2
Jan  7 14:50:35 host sshd[31445]: Received disconnect from 46.101.249.11 port 56288:11: Bye Bye [preauth]
Jan  7 14:50:35 host sshd[31445]: Disconnected from 46.101.249.11 port 56288 [preauth]
Jan  7 14:51:23 host sshd[31659]: Invalid user st from 170.64.136.252 port 54124
Jan  7 14:51:23 host sshd[31659]: input_userauth_request: invalid user st [preauth]
Jan  7 14:51:23 host sshd[31659]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 14:51:23 host sshd[31659]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.64.136.252
Jan  7 14:51:25 host sshd[31659]: Failed password for invalid user st from 170.64.136.252 port 54124 ssh2
Jan  7 14:51:25 host sshd[31659]: Received disconnect from 170.64.136.252 port 54124:11: Bye Bye [preauth]
Jan  7 14:51:25 host sshd[31659]: Disconnected from 170.64.136.252 port 54124 [preauth]
Jan  7 14:52:53 host sshd[31855]: Invalid user hasana from 139.59.188.98 port 57364
Jan  7 14:52:53 host sshd[31855]: input_userauth_request: invalid user hasana [preauth]
Jan  7 14:52:53 host sshd[31855]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 14:52:53 host sshd[31855]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.188.98
Jan  7 14:52:55 host sshd[31855]: Failed password for invalid user hasana from 139.59.188.98 port 57364 ssh2
Jan  7 14:52:55 host sshd[31855]: Received disconnect from 139.59.188.98 port 57364:11: Bye Bye [preauth]
Jan  7 14:52:55 host sshd[31855]: Disconnected from 139.59.188.98 port 57364 [preauth]
Jan  7 14:53:42 host sshd[31975]: User root from 209.141.55.27 not allowed because not listed in AllowUsers
Jan  7 14:53:42 host sshd[31975]: input_userauth_request: invalid user root [preauth]
Jan  7 14:53:42 host unix_chkpwd[31978]: password check failed for user (root)
Jan  7 14:53:42 host sshd[31975]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.55.27  user=root
Jan  7 14:53:42 host sshd[31975]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 14:53:45 host sshd[31975]: Failed password for invalid user root from 209.141.55.27 port 57882 ssh2
Jan  7 14:53:45 host sshd[31975]: Received disconnect from 209.141.55.27 port 57882:11: Normal Shutdown, Thank you for playing [preauth]
Jan  7 14:53:45 host sshd[31975]: Disconnected from 209.141.55.27 port 57882 [preauth]
Jan  7 14:55:45 host sshd[32264]: Invalid user wangxb from 34.80.102.160 port 56682
Jan  7 14:55:45 host sshd[32264]: input_userauth_request: invalid user wangxb [preauth]
Jan  7 14:55:45 host sshd[32264]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 14:55:45 host sshd[32264]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.80.102.160
Jan  7 14:55:46 host sshd[32264]: Failed password for invalid user wangxb from 34.80.102.160 port 56682 ssh2
Jan  7 14:55:46 host sshd[32264]: Received disconnect from 34.80.102.160 port 56682:11: Bye Bye [preauth]
Jan  7 14:55:46 host sshd[32264]: Disconnected from 34.80.102.160 port 56682 [preauth]
Jan  7 14:56:01 host sshd[32283]: Invalid user MSI from 170.106.117.160 port 37602
Jan  7 14:56:01 host sshd[32283]: input_userauth_request: invalid user MSI [preauth]
Jan  7 14:56:01 host sshd[32283]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 14:56:01 host sshd[32283]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.106.117.160
Jan  7 14:56:03 host sshd[32283]: Failed password for invalid user MSI from 170.106.117.160 port 37602 ssh2
Jan  7 14:56:04 host sshd[32283]: Received disconnect from 170.106.117.160 port 37602:11: Bye Bye [preauth]
Jan  7 14:56:04 host sshd[32283]: Disconnected from 170.106.117.160 port 37602 [preauth]
Jan  7 14:56:14 host sshd[32315]: Invalid user dbsi from 156.67.221.77 port 50006
Jan  7 14:56:14 host sshd[32315]: input_userauth_request: invalid user dbsi [preauth]
Jan  7 14:56:14 host sshd[32315]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 14:56:14 host sshd[32315]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.67.221.77
Jan  7 14:56:16 host sshd[32320]: Invalid user dbsi from 82.64.139.41 port 60258
Jan  7 14:56:16 host sshd[32320]: input_userauth_request: invalid user dbsi [preauth]
Jan  7 14:56:16 host sshd[32320]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 14:56:16 host sshd[32320]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.64.139.41
Jan  7 14:56:17 host sshd[32315]: Failed password for invalid user dbsi from 156.67.221.77 port 50006 ssh2
Jan  7 14:56:17 host sshd[32315]: Received disconnect from 156.67.221.77 port 50006:11: Bye Bye [preauth]
Jan  7 14:56:17 host sshd[32315]: Disconnected from 156.67.221.77 port 50006 [preauth]
Jan  7 14:56:18 host sshd[32320]: Failed password for invalid user dbsi from 82.64.139.41 port 60258 ssh2
Jan  7 14:56:19 host sshd[32320]: Received disconnect from 82.64.139.41 port 60258:11: Bye Bye [preauth]
Jan  7 14:56:19 host sshd[32320]: Disconnected from 82.64.139.41 port 60258 [preauth]
Jan  7 14:56:23 host sshd[32432]: Invalid user dbsi from 46.101.249.11 port 59136
Jan  7 14:56:23 host sshd[32432]: input_userauth_request: invalid user dbsi [preauth]
Jan  7 14:56:23 host sshd[32432]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 14:56:23 host sshd[32432]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.249.11
Jan  7 14:56:26 host sshd[32432]: Failed password for invalid user dbsi from 46.101.249.11 port 59136 ssh2
Jan  7 14:56:26 host sshd[32432]: Received disconnect from 46.101.249.11 port 59136:11: Bye Bye [preauth]
Jan  7 14:56:26 host sshd[32432]: Disconnected from 46.101.249.11 port 59136 [preauth]
Jan  7 14:56:58 host sshd[32520]: Invalid user sole from 170.64.136.252 port 60374
Jan  7 14:56:58 host sshd[32520]: input_userauth_request: invalid user sole [preauth]
Jan  7 14:56:58 host sshd[32520]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 14:56:58 host sshd[32520]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.64.136.252
Jan  7 14:57:00 host sshd[32520]: Failed password for invalid user sole from 170.64.136.252 port 60374 ssh2
Jan  7 14:57:00 host sshd[32520]: Received disconnect from 170.64.136.252 port 60374:11: Bye Bye [preauth]
Jan  7 14:57:00 host sshd[32520]: Disconnected from 170.64.136.252 port 60374 [preauth]
Jan  7 14:57:11 host sshd[32548]: Invalid user fupengfei from 139.59.188.98 port 47674
Jan  7 14:57:11 host sshd[32548]: input_userauth_request: invalid user fupengfei [preauth]
Jan  7 14:57:11 host sshd[32548]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 14:57:11 host sshd[32548]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.188.98
Jan  7 14:57:13 host sshd[32548]: Failed password for invalid user fupengfei from 139.59.188.98 port 47674 ssh2
Jan  7 14:57:14 host sshd[32548]: Received disconnect from 139.59.188.98 port 47674:11: Bye Bye [preauth]
Jan  7 14:57:14 host sshd[32548]: Disconnected from 139.59.188.98 port 47674 [preauth]
Jan  7 14:57:18 host sshd[32558]: Invalid user nelia from 176.96.186.130 port 33984
Jan  7 14:57:18 host sshd[32558]: input_userauth_request: invalid user nelia [preauth]
Jan  7 14:57:18 host sshd[32558]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 14:57:18 host sshd[32558]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.96.186.130
Jan  7 14:57:20 host sshd[32558]: Failed password for invalid user nelia from 176.96.186.130 port 33984 ssh2
Jan  7 14:57:20 host sshd[32558]: Received disconnect from 176.96.186.130 port 33984:11: Bye Bye [preauth]
Jan  7 14:57:20 host sshd[32558]: Disconnected from 176.96.186.130 port 33984 [preauth]
Jan  7 14:57:29 host sshd[32596]: Invalid user shiqimeng from 82.64.139.41 port 52226
Jan  7 14:57:29 host sshd[32596]: input_userauth_request: invalid user shiqimeng [preauth]
Jan  7 14:57:29 host sshd[32596]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 14:57:29 host sshd[32596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.64.139.41
Jan  7 14:57:31 host sshd[32596]: Failed password for invalid user shiqimeng from 82.64.139.41 port 52226 ssh2
Jan  7 14:57:31 host sshd[32596]: Received disconnect from 82.64.139.41 port 52226:11: Bye Bye [preauth]
Jan  7 14:57:31 host sshd[32596]: Disconnected from 82.64.139.41 port 52226 [preauth]
Jan  7 14:57:39 host sshd[32610]: Invalid user trip from 46.101.249.11 port 58042
Jan  7 14:57:39 host sshd[32610]: input_userauth_request: invalid user trip [preauth]
Jan  7 14:57:39 host sshd[32610]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 14:57:39 host sshd[32610]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.249.11
Jan  7 14:57:42 host sshd[32610]: Failed password for invalid user trip from 46.101.249.11 port 58042 ssh2
Jan  7 14:57:42 host sshd[32610]: Received disconnect from 46.101.249.11 port 58042:11: Bye Bye [preauth]
Jan  7 14:57:42 host sshd[32610]: Disconnected from 46.101.249.11 port 58042 [preauth]
Jan  7 14:58:04 host sshd[32703]: Invalid user humberto from 170.106.117.160 port 40310
Jan  7 14:58:04 host sshd[32703]: input_userauth_request: invalid user humberto [preauth]
Jan  7 14:58:04 host sshd[32703]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 14:58:04 host sshd[32703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.106.117.160
Jan  7 14:58:06 host sshd[32703]: Failed password for invalid user humberto from 170.106.117.160 port 40310 ssh2
Jan  7 14:58:06 host sshd[32703]: Received disconnect from 170.106.117.160 port 40310:11: Bye Bye [preauth]
Jan  7 14:58:06 host sshd[32703]: Disconnected from 170.106.117.160 port 40310 [preauth]
Jan  7 14:58:10 host sshd[32713]: Invalid user avinash from 34.80.102.160 port 59274
Jan  7 14:58:10 host sshd[32713]: input_userauth_request: invalid user avinash [preauth]
Jan  7 14:58:10 host sshd[32713]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 14:58:10 host sshd[32713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.80.102.160
Jan  7 14:58:12 host sshd[32713]: Failed password for invalid user avinash from 34.80.102.160 port 59274 ssh2
Jan  7 14:58:12 host sshd[32713]: Received disconnect from 34.80.102.160 port 59274:11: Bye Bye [preauth]
Jan  7 14:58:12 host sshd[32713]: Disconnected from 34.80.102.160 port 59274 [preauth]
Jan  7 14:58:14 host sshd[32718]: Invalid user ryu from 139.59.188.98 port 52638
Jan  7 14:58:14 host sshd[32718]: input_userauth_request: invalid user ryu [preauth]
Jan  7 14:58:14 host sshd[32718]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 14:58:14 host sshd[32718]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.188.98
Jan  7 14:58:16 host sshd[32718]: Failed password for invalid user ryu from 139.59.188.98 port 52638 ssh2
Jan  7 14:58:16 host sshd[32718]: Received disconnect from 139.59.188.98 port 52638:11: Bye Bye [preauth]
Jan  7 14:58:16 host sshd[32718]: Disconnected from 139.59.188.98 port 52638 [preauth]
Jan  7 14:58:26 host sshd[302]: Invalid user wvlpadmin from 170.64.136.252 port 35104
Jan  7 14:58:26 host sshd[302]: input_userauth_request: invalid user wvlpadmin [preauth]
Jan  7 14:58:26 host sshd[302]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 14:58:26 host sshd[302]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.64.136.252
Jan  7 14:58:28 host sshd[302]: Failed password for invalid user wvlpadmin from 170.64.136.252 port 35104 ssh2
Jan  7 14:58:28 host sshd[302]: Received disconnect from 170.64.136.252 port 35104:11: Bye Bye [preauth]
Jan  7 14:58:28 host sshd[302]: Disconnected from 170.64.136.252 port 35104 [preauth]
Jan  7 14:58:33 host sshd[379]: Invalid user vpn1 from 176.96.186.130 port 50208
Jan  7 14:58:33 host sshd[379]: input_userauth_request: invalid user vpn1 [preauth]
Jan  7 14:58:33 host sshd[379]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 14:58:33 host sshd[379]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.96.186.130
Jan  7 14:58:36 host sshd[379]: Failed password for invalid user vpn1 from 176.96.186.130 port 50208 ssh2
Jan  7 14:58:36 host sshd[379]: Received disconnect from 176.96.186.130 port 50208:11: Bye Bye [preauth]
Jan  7 14:58:36 host sshd[379]: Disconnected from 176.96.186.130 port 50208 [preauth]
Jan  7 14:58:37 host sshd[390]: Invalid user liangyu from 82.64.139.41 port 38970
Jan  7 14:58:37 host sshd[390]: input_userauth_request: invalid user liangyu [preauth]
Jan  7 14:58:37 host sshd[390]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 14:58:37 host sshd[390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.64.139.41
Jan  7 14:58:39 host sshd[390]: Failed password for invalid user liangyu from 82.64.139.41 port 38970 ssh2
Jan  7 14:59:05 host sshd[488]: Invalid user t from 156.67.221.77 port 57618
Jan  7 14:59:05 host sshd[488]: input_userauth_request: invalid user t [preauth]
Jan  7 14:59:05 host sshd[488]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 14:59:05 host sshd[488]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.67.221.77
Jan  7 14:59:07 host sshd[488]: Failed password for invalid user t from 156.67.221.77 port 57618 ssh2
Jan  7 14:59:07 host sshd[488]: Received disconnect from 156.67.221.77 port 57618:11: Bye Bye [preauth]
Jan  7 14:59:07 host sshd[488]: Disconnected from 156.67.221.77 port 57618 [preauth]
Jan  7 14:59:24 host sshd[523]: Invalid user wvlpadmin from 34.80.102.160 port 36374
Jan  7 14:59:24 host sshd[523]: input_userauth_request: invalid user wvlpadmin [preauth]
Jan  7 14:59:24 host sshd[523]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 14:59:24 host sshd[523]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.80.102.160
Jan  7 14:59:26 host sshd[523]: Failed password for invalid user wvlpadmin from 34.80.102.160 port 36374 ssh2
Jan  7 14:59:26 host sshd[523]: Received disconnect from 34.80.102.160 port 36374:11: Bye Bye [preauth]
Jan  7 14:59:26 host sshd[523]: Disconnected from 34.80.102.160 port 36374 [preauth]
Jan  7 14:59:44 host sshd[618]: Invalid user bluehost from 176.96.186.130 port 34962
Jan  7 14:59:44 host sshd[618]: input_userauth_request: invalid user bluehost [preauth]
Jan  7 14:59:44 host sshd[618]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 14:59:44 host sshd[618]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.96.186.130
Jan  7 14:59:45 host sshd[618]: Failed password for invalid user bluehost from 176.96.186.130 port 34962 ssh2
Jan  7 14:59:46 host sshd[618]: Received disconnect from 176.96.186.130 port 34962:11: Bye Bye [preauth]
Jan  7 14:59:46 host sshd[618]: Disconnected from 176.96.186.130 port 34962 [preauth]
Jan  7 15:00:11 host sshd[749]: Invalid user kkk from 170.106.117.160 port 34552
Jan  7 15:00:11 host sshd[749]: input_userauth_request: invalid user kkk [preauth]
Jan  7 15:00:11 host sshd[749]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 15:00:11 host sshd[749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.106.117.160
Jan  7 15:00:13 host sshd[749]: Failed password for invalid user kkk from 170.106.117.160 port 34552 ssh2
Jan  7 15:00:13 host sshd[749]: Received disconnect from 170.106.117.160 port 34552:11: Bye Bye [preauth]
Jan  7 15:00:13 host sshd[749]: Disconnected from 170.106.117.160 port 34552 [preauth]
Jan  7 15:00:40 host sshd[848]: Invalid user kkk from 156.67.221.77 port 55198
Jan  7 15:00:40 host sshd[848]: input_userauth_request: invalid user kkk [preauth]
Jan  7 15:00:40 host sshd[848]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 15:00:40 host sshd[848]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.67.221.77
Jan  7 15:00:42 host sshd[848]: Failed password for invalid user kkk from 156.67.221.77 port 55198 ssh2
Jan  7 15:00:42 host sshd[848]: Received disconnect from 156.67.221.77 port 55198:11: Bye Bye [preauth]
Jan  7 15:00:42 host sshd[848]: Disconnected from 156.67.221.77 port 55198 [preauth]
Jan  7 15:17:41 host sshd[3678]: Did not receive identification string from 167.71.166.243 port 56354
Jan  7 15:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  7 15:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 15:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 15:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  7 15:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 15:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 15:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  7 15:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 15:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 15:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  7 15:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 15:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 15:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  7 15:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 15:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 15:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  7 15:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 15:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 15:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  7 15:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 15:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 15:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  7 15:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 15:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 15:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  7 15:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 15:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 15:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  7 15:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 15:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 15:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  7 15:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 15:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 15:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  7 15:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 15:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 15:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  7 15:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 15:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 15:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=disposeat user-2=wwwkmaorg user-3=remysagr user-4=woodpeck user-5=wwwkapin user-6=vfmassets user-7=shalinijames user-8=wwwtestugo user-9=pmcresources user-10=bonifacegroup user-11=wwwevmhonda user-12=wwwletsstalkfood user-13=straightcurve user-14=palco123 user-15=gifterman user-16=kottayamcalldriv user-17=phmetals user-18=wwwnexidigital user-19=mrsclean user-20=wwwkaretakers user-21=cochintaxi user-22=a2zgroup user-23=dartsimp user-24=laundryboniface user-25=wwwpmcresource user-26=travelboniface user-27=keralaholi user-28=wwwresourcehunte user-29=wwwrmswll user-30=ugotscom feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  7 15:21:55 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  7 15:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 15:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 15:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  7 15:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 15:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 15:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ktDp0WZHdXAZbja8.~
Jan  7 15:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 15:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 15:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ktDp0WZHdXAZbja8.~'
Jan  7 15:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 15:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 15:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ktDp0WZHdXAZbja8.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  7 15:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 15:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 15:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  7 15:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 15:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 15:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  7 15:21:56 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 15:21:56 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 15:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  7 15:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 15:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 15:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  7 15:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 15:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 15:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  7 15:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 15:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 15:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  7 15:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 15:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 15:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  7 15:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 15:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 15:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  7 15:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  7 15:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  7 15:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  7 15:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  7 15:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  7 15:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  7 15:22:01 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  7 15:22:03 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  7 15:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  7 15:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 15:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 15:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  7 15:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 15:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 15:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  7 15:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 15:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 15:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  7 15:22:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 15:22:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 15:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  7 15:22:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 15:22:10 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 15:27:32 host sshd[5452]: Connection closed by 167.71.166.243 port 44056 [preauth]
Jan  7 15:42:25 host sshd[7535]: User root from 134.17.16.196 not allowed because not listed in AllowUsers
Jan  7 15:42:25 host sshd[7535]: input_userauth_request: invalid user root [preauth]
Jan  7 15:42:25 host unix_chkpwd[7539]: password check failed for user (root)
Jan  7 15:42:25 host sshd[7535]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.17.16.196  user=root
Jan  7 15:42:25 host sshd[7535]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 15:42:27 host sshd[7535]: Failed password for invalid user root from 134.17.16.196 port 7332 ssh2
Jan  7 15:42:27 host sshd[7535]: Received disconnect from 134.17.16.196 port 7332:11: Bye Bye [preauth]
Jan  7 15:42:27 host sshd[7535]: Disconnected from 134.17.16.196 port 7332 [preauth]
Jan  7 15:44:08 host sshd[7748]: User root from 134.17.16.196 not allowed because not listed in AllowUsers
Jan  7 15:44:08 host sshd[7748]: input_userauth_request: invalid user root [preauth]
Jan  7 15:44:08 host unix_chkpwd[7751]: password check failed for user (root)
Jan  7 15:44:08 host sshd[7748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.17.16.196  user=root
Jan  7 15:44:08 host sshd[7748]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 15:44:10 host sshd[7748]: Failed password for invalid user root from 134.17.16.196 port 7333 ssh2
Jan  7 15:44:10 host sshd[7748]: Received disconnect from 134.17.16.196 port 7333:11: Bye Bye [preauth]
Jan  7 15:44:10 host sshd[7748]: Disconnected from 134.17.16.196 port 7333 [preauth]
Jan  7 15:58:07 host sshd[9677]: Did not receive identification string from 103.203.57.11 port 46470
Jan  7 16:06:06 host sshd[10702]: Invalid user sbm from 165.22.51.113 port 45982
Jan  7 16:06:06 host sshd[10702]: input_userauth_request: invalid user sbm [preauth]
Jan  7 16:06:06 host sshd[10702]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 16:06:06 host sshd[10702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.51.113
Jan  7 16:06:08 host sshd[10702]: Failed password for invalid user sbm from 165.22.51.113 port 45982 ssh2
Jan  7 16:06:08 host sshd[10702]: Received disconnect from 165.22.51.113 port 45982:11: Bye Bye [preauth]
Jan  7 16:06:08 host sshd[10702]: Disconnected from 165.22.51.113 port 45982 [preauth]
Jan  7 16:06:38 host sshd[10753]: Invalid user gj from 129.154.213.69 port 45886
Jan  7 16:06:38 host sshd[10753]: input_userauth_request: invalid user gj [preauth]
Jan  7 16:06:38 host sshd[10753]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 16:06:38 host sshd[10753]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.154.213.69
Jan  7 16:06:40 host sshd[10753]: Failed password for invalid user gj from 129.154.213.69 port 45886 ssh2
Jan  7 16:06:40 host sshd[10753]: Received disconnect from 129.154.213.69 port 45886:11: Bye Bye [preauth]
Jan  7 16:06:40 host sshd[10753]: Disconnected from 129.154.213.69 port 45886 [preauth]
Jan  7 16:09:38 host sshd[11120]: Invalid user mpd from 70.121.75.174 port 44608
Jan  7 16:09:38 host sshd[11120]: input_userauth_request: invalid user mpd [preauth]
Jan  7 16:09:38 host sshd[11120]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 16:09:38 host sshd[11120]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.121.75.174
Jan  7 16:09:41 host sshd[11120]: Failed password for invalid user mpd from 70.121.75.174 port 44608 ssh2
Jan  7 16:09:41 host sshd[11120]: Received disconnect from 70.121.75.174 port 44608:11: Bye Bye [preauth]
Jan  7 16:09:41 host sshd[11120]: Disconnected from 70.121.75.174 port 44608 [preauth]
Jan  7 16:11:51 host sshd[11488]: Invalid user vision from 124.148.168.201 port 39471
Jan  7 16:11:51 host sshd[11488]: input_userauth_request: invalid user vision [preauth]
Jan  7 16:11:51 host sshd[11488]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 16:11:51 host sshd[11488]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.148.168.201
Jan  7 16:11:53 host sshd[11488]: Failed password for invalid user vision from 124.148.168.201 port 39471 ssh2
Jan  7 16:11:54 host sshd[11488]: Received disconnect from 124.148.168.201 port 39471:11: Bye Bye [preauth]
Jan  7 16:11:54 host sshd[11488]: Disconnected from 124.148.168.201 port 39471 [preauth]
Jan  7 16:12:24 host sshd[11547]: Invalid user indico from 165.22.51.113 port 49440
Jan  7 16:12:24 host sshd[11547]: input_userauth_request: invalid user indico [preauth]
Jan  7 16:12:24 host sshd[11547]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 16:12:24 host sshd[11547]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.51.113
Jan  7 16:12:26 host sshd[11547]: Failed password for invalid user indico from 165.22.51.113 port 49440 ssh2
Jan  7 16:12:26 host sshd[11547]: Received disconnect from 165.22.51.113 port 49440:11: Bye Bye [preauth]
Jan  7 16:12:26 host sshd[11547]: Disconnected from 165.22.51.113 port 49440 [preauth]
Jan  7 16:13:41 host sshd[11694]: Invalid user jojo from 70.121.75.174 port 58354
Jan  7 16:13:41 host sshd[11694]: input_userauth_request: invalid user jojo [preauth]
Jan  7 16:13:41 host sshd[11694]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 16:13:41 host sshd[11694]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.121.75.174
Jan  7 16:13:42 host sshd[11701]: Invalid user clovis from 129.154.213.69 port 41800
Jan  7 16:13:42 host sshd[11701]: input_userauth_request: invalid user clovis [preauth]
Jan  7 16:13:42 host sshd[11701]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 16:13:42 host sshd[11701]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.154.213.69
Jan  7 16:13:43 host sshd[11694]: Failed password for invalid user jojo from 70.121.75.174 port 58354 ssh2
Jan  7 16:13:43 host sshd[11694]: Received disconnect from 70.121.75.174 port 58354:11: Bye Bye [preauth]
Jan  7 16:13:43 host sshd[11694]: Disconnected from 70.121.75.174 port 58354 [preauth]
Jan  7 16:13:44 host sshd[11701]: Failed password for invalid user clovis from 129.154.213.69 port 41800 ssh2
Jan  7 16:13:44 host sshd[11701]: Received disconnect from 129.154.213.69 port 41800:11: Bye Bye [preauth]
Jan  7 16:13:44 host sshd[11701]: Disconnected from 129.154.213.69 port 41800 [preauth]
Jan  7 16:13:51 host sshd[11722]: Invalid user janice from 165.22.51.113 port 48614
Jan  7 16:13:51 host sshd[11722]: input_userauth_request: invalid user janice [preauth]
Jan  7 16:13:51 host sshd[11722]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 16:13:51 host sshd[11722]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.51.113
Jan  7 16:13:53 host sshd[11722]: Failed password for invalid user janice from 165.22.51.113 port 48614 ssh2
Jan  7 16:13:53 host sshd[11722]: Received disconnect from 165.22.51.113 port 48614:11: Bye Bye [preauth]
Jan  7 16:13:53 host sshd[11722]: Disconnected from 165.22.51.113 port 48614 [preauth]
Jan  7 16:14:10 host sshd[11815]: Invalid user qnc from 124.148.168.201 port 44879
Jan  7 16:14:10 host sshd[11815]: input_userauth_request: invalid user qnc [preauth]
Jan  7 16:14:10 host sshd[11815]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 16:14:10 host sshd[11815]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.148.168.201
Jan  7 16:14:11 host sshd[11815]: Failed password for invalid user qnc from 124.148.168.201 port 44879 ssh2
Jan  7 16:14:12 host sshd[11815]: Received disconnect from 124.148.168.201 port 44879:11: Bye Bye [preauth]
Jan  7 16:14:12 host sshd[11815]: Disconnected from 124.148.168.201 port 44879 [preauth]
Jan  7 16:14:44 host sshd[11912]: Invalid user geoeast from 13.77.174.169 port 53966
Jan  7 16:14:44 host sshd[11912]: input_userauth_request: invalid user geoeast [preauth]
Jan  7 16:14:44 host sshd[11912]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 16:14:44 host sshd[11912]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.77.174.169
Jan  7 16:14:46 host sshd[11912]: Failed password for invalid user geoeast from 13.77.174.169 port 53966 ssh2
Jan  7 16:14:46 host sshd[11912]: Received disconnect from 13.77.174.169 port 53966:11: Bye Bye [preauth]
Jan  7 16:14:46 host sshd[11912]: Disconnected from 13.77.174.169 port 53966 [preauth]
Jan  7 16:15:32 host sshd[12045]: Invalid user indico from 70.121.75.174 port 53590
Jan  7 16:15:32 host sshd[12045]: input_userauth_request: invalid user indico [preauth]
Jan  7 16:15:32 host sshd[12045]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 16:15:32 host sshd[12045]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.121.75.174
Jan  7 16:15:34 host sshd[12045]: Failed password for invalid user indico from 70.121.75.174 port 53590 ssh2
Jan  7 16:15:35 host sshd[12045]: Received disconnect from 70.121.75.174 port 53590:11: Bye Bye [preauth]
Jan  7 16:15:35 host sshd[12045]: Disconnected from 70.121.75.174 port 53590 [preauth]
Jan  7 16:15:42 host sshd[12093]: Invalid user geoeast from 129.154.213.69 port 47600
Jan  7 16:15:42 host sshd[12093]: input_userauth_request: invalid user geoeast [preauth]
Jan  7 16:15:42 host sshd[12093]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 16:15:42 host sshd[12093]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.154.213.69
Jan  7 16:15:44 host sshd[12093]: Failed password for invalid user geoeast from 129.154.213.69 port 47600 ssh2
Jan  7 16:15:44 host sshd[12093]: Received disconnect from 129.154.213.69 port 47600:11: Bye Bye [preauth]
Jan  7 16:15:44 host sshd[12093]: Disconnected from 129.154.213.69 port 47600 [preauth]
Jan  7 16:16:05 host sshd[12281]: Invalid user larissa from 13.77.174.169 port 46764
Jan  7 16:16:05 host sshd[12281]: input_userauth_request: invalid user larissa [preauth]
Jan  7 16:16:05 host sshd[12281]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 16:16:05 host sshd[12281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.77.174.169
Jan  7 16:16:07 host sshd[12281]: Failed password for invalid user larissa from 13.77.174.169 port 46764 ssh2
Jan  7 16:16:08 host sshd[12281]: Received disconnect from 13.77.174.169 port 46764:11: Bye Bye [preauth]
Jan  7 16:16:08 host sshd[12281]: Disconnected from 13.77.174.169 port 46764 [preauth]
Jan  7 16:16:13 host sshd[12292]: Invalid user zhangjinyang from 124.148.168.201 port 46177
Jan  7 16:16:13 host sshd[12292]: input_userauth_request: invalid user zhangjinyang [preauth]
Jan  7 16:16:13 host sshd[12292]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 16:16:13 host sshd[12292]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.148.168.201
Jan  7 16:16:15 host sshd[12292]: Failed password for invalid user zhangjinyang from 124.148.168.201 port 46177 ssh2
Jan  7 16:16:15 host sshd[12292]: Received disconnect from 124.148.168.201 port 46177:11: Bye Bye [preauth]
Jan  7 16:16:15 host sshd[12292]: Disconnected from 124.148.168.201 port 46177 [preauth]
Jan  7 16:17:10 host sshd[12454]: Invalid user yzi from 13.77.174.169 port 37764
Jan  7 16:17:10 host sshd[12454]: input_userauth_request: invalid user yzi [preauth]
Jan  7 16:17:10 host sshd[12454]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 16:17:10 host sshd[12454]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.77.174.169
Jan  7 16:17:12 host sshd[12454]: Failed password for invalid user yzi from 13.77.174.169 port 37764 ssh2
Jan  7 16:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  7 16:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 16:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 16:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  7 16:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 16:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 16:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  7 16:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 16:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 16:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  7 16:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 16:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 16:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  7 16:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 16:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 16:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  7 16:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 16:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 16:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  7 16:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 16:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 16:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  7 16:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 16:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 16:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  7 16:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 16:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 16:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  7 16:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 16:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 16:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  7 16:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 16:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 16:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  7 16:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 16:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 16:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  7 16:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 16:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 16:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=laundryboniface user-2=dartsimp user-3=a2zgroup user-4=wwwkaretakers user-5=cochintaxi user-6=ugotscom user-7=wwwrmswll user-8=keralaholi user-9=wwwresourcehunte user-10=travelboniface user-11=wwwpmcresource user-12=pmcresources user-13=wwwtestugo user-14=shalinijames user-15=vfmassets user-16=woodpeck user-17=wwwkapin user-18=disposeat user-19=wwwkmaorg user-20=remysagr user-21=wwwnexidigital user-22=mrsclean user-23=phmetals user-24=kottayamcalldriv user-25=gifterman user-26=palco123 user-27=straightcurve user-28=wwwletsstalkfood user-29=wwwevmhonda user-30=bonifacegroup feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  7 16:21:55 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  7 16:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 16:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 16:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  7 16:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 16:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 16:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Tepw5sDdhFFNBV0l.~
Jan  7 16:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 16:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 16:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Tepw5sDdhFFNBV0l.~'
Jan  7 16:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 16:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 16:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Tepw5sDdhFFNBV0l.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  7 16:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 16:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 16:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  7 16:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 16:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 16:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  7 16:21:56 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 16:21:56 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 16:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  7 16:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 16:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 16:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  7 16:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 16:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 16:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  7 16:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 16:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 16:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  7 16:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 16:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 16:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  7 16:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 16:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 16:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  7 16:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  7 16:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  7 16:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  7 16:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  7 16:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  7 16:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  7 16:22:06 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  7 16:22:08 host sshd[13321]: Invalid user oj from 112.195.139.128 port 41822
Jan  7 16:22:08 host sshd[13321]: input_userauth_request: invalid user oj [preauth]
Jan  7 16:22:08 host sshd[13321]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 16:22:08 host sshd[13321]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.195.139.128
Jan  7 16:22:08 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  7 16:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  7 16:22:08 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 16:22:10 host sshd[13321]: Failed password for invalid user oj from 112.195.139.128 port 41822 ssh2
Jan  7 16:22:10 host sshd[13321]: Received disconnect from 112.195.139.128 port 41822:11: Bye Bye [preauth]
Jan  7 16:22:10 host sshd[13321]: Disconnected from 112.195.139.128 port 41822 [preauth]
Jan  7 16:22:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 16:22:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  7 16:22:12 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 16:22:13 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 16:22:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  7 16:22:13 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 16:22:15 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 16:22:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  7 16:22:16 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 16:22:17 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 16:22:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  7 16:22:17 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 16:22:18 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 16:26:06 host sshd[13821]: Did not receive identification string from 121.137.117.251 port 7137
Jan  7 16:32:16 host sshd[14630]: User root from 112.195.139.128 not allowed because not listed in AllowUsers
Jan  7 16:32:16 host sshd[14630]: input_userauth_request: invalid user root [preauth]
Jan  7 16:32:16 host unix_chkpwd[14638]: password check failed for user (root)
Jan  7 16:32:16 host sshd[14630]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.195.139.128  user=root
Jan  7 16:32:16 host sshd[14630]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 16:32:19 host sshd[14630]: Failed password for invalid user root from 112.195.139.128 port 60660 ssh2
Jan  7 16:32:19 host sshd[14630]: Received disconnect from 112.195.139.128 port 60660:11: Bye Bye [preauth]
Jan  7 16:32:19 host sshd[14630]: Disconnected from 112.195.139.128 port 60660 [preauth]
Jan  7 16:32:40 host sshd[14744]: Invalid user wwwdata from 159.203.85.196 port 43169
Jan  7 16:32:40 host sshd[14744]: input_userauth_request: invalid user wwwdata [preauth]
Jan  7 16:32:40 host sshd[14744]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 16:32:40 host sshd[14744]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.85.196
Jan  7 16:32:42 host sshd[14744]: Failed password for invalid user wwwdata from 159.203.85.196 port 43169 ssh2
Jan  7 16:32:43 host sshd[14744]: Received disconnect from 159.203.85.196 port 43169:11: Bye Bye [preauth]
Jan  7 16:32:43 host sshd[14744]: Disconnected from 159.203.85.196 port 43169 [preauth]
Jan  7 16:33:43 host sshd[14863]: Invalid user av from 194.110.203.109 port 58098
Jan  7 16:33:43 host sshd[14863]: input_userauth_request: invalid user av [preauth]
Jan  7 16:33:43 host sshd[14863]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 16:33:43 host sshd[14863]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109
Jan  7 16:33:45 host sshd[14863]: Failed password for invalid user av from 194.110.203.109 port 58098 ssh2
Jan  7 16:33:48 host sshd[14863]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 16:33:49 host sshd[14863]: Failed password for invalid user av from 194.110.203.109 port 58098 ssh2
Jan  7 16:33:52 host sshd[14863]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 16:33:55 host sshd[14863]: Failed password for invalid user av from 194.110.203.109 port 58098 ssh2
Jan  7 16:33:58 host sshd[14863]: Connection closed by 194.110.203.109 port 58098 [preauth]
Jan  7 16:33:58 host sshd[14863]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109
Jan  7 16:36:19 host sshd[15256]: User root from 101.206.137.238 not allowed because not listed in AllowUsers
Jan  7 16:36:19 host sshd[15256]: input_userauth_request: invalid user root [preauth]
Jan  7 16:36:19 host unix_chkpwd[15269]: password check failed for user (root)
Jan  7 16:36:19 host sshd[15256]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.206.137.238  user=root
Jan  7 16:36:19 host sshd[15256]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 16:36:21 host sshd[15256]: Failed password for invalid user root from 101.206.137.238 port 33456 ssh2
Jan  7 16:36:21 host sshd[15256]: Received disconnect from 101.206.137.238 port 33456:11: Bye Bye [preauth]
Jan  7 16:36:21 host sshd[15256]: Disconnected from 101.206.137.238 port 33456 [preauth]
Jan  7 16:36:39 host sshd[15311]: Invalid user rudi from 159.203.85.196 port 35863
Jan  7 16:36:39 host sshd[15311]: input_userauth_request: invalid user rudi [preauth]
Jan  7 16:36:39 host sshd[15311]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 16:36:39 host sshd[15311]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.85.196
Jan  7 16:36:42 host sshd[15311]: Failed password for invalid user rudi from 159.203.85.196 port 35863 ssh2
Jan  7 16:36:42 host sshd[15311]: Received disconnect from 159.203.85.196 port 35863:11: Bye Bye [preauth]
Jan  7 16:36:42 host sshd[15311]: Disconnected from 159.203.85.196 port 35863 [preauth]
Jan  7 16:37:08 host sshd[15358]: Invalid user ubuntu from 101.206.137.238 port 42722
Jan  7 16:37:08 host sshd[15358]: input_userauth_request: invalid user ubuntu [preauth]
Jan  7 16:37:08 host sshd[15358]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 16:37:08 host sshd[15358]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.206.137.238
Jan  7 16:37:10 host sshd[15358]: Failed password for invalid user ubuntu from 101.206.137.238 port 42722 ssh2
Jan  7 16:37:11 host sshd[15358]: Received disconnect from 101.206.137.238 port 42722:11: Bye Bye [preauth]
Jan  7 16:37:11 host sshd[15358]: Disconnected from 101.206.137.238 port 42722 [preauth]
Jan  7 16:37:44 host sshd[15451]: Invalid user down from 159.203.85.196 port 47399
Jan  7 16:37:44 host sshd[15451]: input_userauth_request: invalid user down [preauth]
Jan  7 16:37:44 host sshd[15451]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 16:37:44 host sshd[15451]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.85.196
Jan  7 16:37:45 host sshd[15451]: Failed password for invalid user down from 159.203.85.196 port 47399 ssh2
Jan  7 16:37:46 host sshd[15451]: Received disconnect from 159.203.85.196 port 47399:11: Bye Bye [preauth]
Jan  7 16:37:46 host sshd[15451]: Disconnected from 159.203.85.196 port 47399 [preauth]
Jan  7 16:44:33 host sshd[16374]: Did not receive identification string from 58.72.18.130 port 21504
Jan  7 16:45:53 host sshd[16512]: Connection closed by 107.170.233.8 port 45080 [preauth]
Jan  7 16:45:54 host sshd[16536]: Did not receive identification string from 27.71.231.21 port 38068
Jan  7 16:45:54 host sshd[16540]: Invalid user mailadmin from 27.71.231.21 port 38286
Jan  7 16:45:54 host sshd[16540]: input_userauth_request: invalid user mailadmin [preauth]
Jan  7 16:45:54 host sshd[16541]: Invalid user steam from 27.71.231.21 port 38232
Jan  7 16:45:54 host sshd[16537]: Invalid user ubuntu from 27.71.231.21 port 38226
Jan  7 16:45:54 host sshd[16541]: input_userauth_request: invalid user steam [preauth]
Jan  7 16:45:54 host sshd[16537]: input_userauth_request: invalid user ubuntu [preauth]
Jan  7 16:45:54 host sshd[16539]: Invalid user discord from 27.71.231.21 port 38164
Jan  7 16:45:54 host sshd[16543]: Invalid user postgres from 27.71.231.21 port 38278
Jan  7 16:45:54 host sshd[16543]: input_userauth_request: invalid user postgres [preauth]
Jan  7 16:45:54 host sshd[16539]: input_userauth_request: invalid user discord [preauth]
Jan  7 16:45:54 host sshd[16538]: Invalid user jenkins from 27.71.231.21 port 38110
Jan  7 16:45:54 host sshd[16538]: input_userauth_request: invalid user jenkins [preauth]
Jan  7 16:45:54 host sshd[16547]: Invalid user oracle from 27.71.231.21 port 38338
Jan  7 16:45:54 host sshd[16547]: input_userauth_request: invalid user oracle [preauth]
Jan  7 16:45:54 host sshd[16542]: Invalid user devops from 27.71.231.21 port 38114
Jan  7 16:45:54 host sshd[16542]: input_userauth_request: invalid user devops [preauth]
Jan  7 16:45:54 host sshd[16544]: Invalid user ubuntu from 27.71.231.21 port 38140
Jan  7 16:45:54 host sshd[16544]: input_userauth_request: invalid user ubuntu [preauth]
Jan  7 16:45:54 host sshd[16545]: Invalid user ansadmin from 27.71.231.21 port 38180
Jan  7 16:45:54 host sshd[16546]: Invalid user guest from 27.71.231.21 port 38086
Jan  7 16:45:54 host sshd[16545]: input_userauth_request: invalid user ansadmin [preauth]
Jan  7 16:45:54 host sshd[16546]: input_userauth_request: invalid user guest [preauth]
Jan  7 16:45:54 host sshd[16548]: Invalid user emqx from 27.71.231.21 port 38244
Jan  7 16:45:54 host sshd[16548]: input_userauth_request: invalid user emqx [preauth]
Jan  7 16:45:54 host sshd[16540]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 16:45:54 host sshd[16540]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  7 16:45:54 host sshd[16537]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 16:45:54 host sshd[16537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  7 16:45:54 host sshd[16541]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 16:45:54 host sshd[16541]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  7 16:45:54 host sshd[16539]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 16:45:54 host sshd[16539]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  7 16:45:54 host sshd[16543]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 16:45:54 host sshd[16543]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  7 16:45:54 host sshd[16538]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 16:45:54 host sshd[16538]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  7 16:45:54 host sshd[16547]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 16:45:54 host sshd[16547]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  7 16:45:54 host sshd[16542]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 16:45:54 host sshd[16542]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  7 16:45:54 host sshd[16544]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 16:45:54 host sshd[16544]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  7 16:45:54 host sshd[16546]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 16:45:54 host sshd[16546]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  7 16:45:54 host sshd[16545]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 16:45:54 host sshd[16545]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  7 16:45:54 host sshd[16548]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 16:45:54 host sshd[16548]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  7 16:45:55 host sshd[16564]: User centos from 27.71.231.21 not allowed because not listed in AllowUsers
Jan  7 16:45:55 host sshd[16564]: input_userauth_request: invalid user centos [preauth]
Jan  7 16:45:55 host sshd[16563]: Invalid user ftpuser from 27.71.231.21 port 38148
Jan  7 16:45:55 host sshd[16563]: input_userauth_request: invalid user ftpuser [preauth]
Jan  7 16:45:55 host sshd[16562]: Invalid user web from 27.71.231.21 port 38370
Jan  7 16:45:55 host sshd[16562]: input_userauth_request: invalid user web [preauth]
Jan  7 16:45:55 host sshd[16572]: Invalid user steam from 27.71.231.21 port 38258
Jan  7 16:45:55 host sshd[16572]: input_userauth_request: invalid user steam [preauth]
Jan  7 16:45:55 host sshd[16566]: Invalid user vagrant from 27.71.231.21 port 38392
Jan  7 16:45:55 host sshd[16573]: Invalid user dockeradmin from 27.71.231.21 port 38078
Jan  7 16:45:55 host sshd[16565]: Invalid user test from 27.71.231.21 port 38312
Jan  7 16:45:55 host sshd[16567]: Invalid user www from 27.71.231.21 port 38242
Jan  7 16:45:55 host sshd[16566]: input_userauth_request: invalid user vagrant [preauth]
Jan  7 16:45:55 host sshd[16565]: input_userauth_request: invalid user test [preauth]
Jan  7 16:45:55 host sshd[16573]: input_userauth_request: invalid user dockeradmin [preauth]
Jan  7 16:45:55 host sshd[16570]: Invalid user oracle from 27.71.231.21 port 38270
Jan  7 16:45:55 host sshd[16570]: input_userauth_request: invalid user oracle [preauth]
Jan  7 16:45:55 host sshd[16568]: Invalid user ubuntu from 27.71.231.21 port 38294
Jan  7 16:45:55 host sshd[16567]: input_userauth_request: invalid user www [preauth]
Jan  7 16:45:55 host sshd[16568]: input_userauth_request: invalid user ubuntu [preauth]
Jan  7 16:45:55 host sshd[16574]: Invalid user mc from 27.71.231.21 port 38352
Jan  7 16:45:55 host sshd[16574]: input_userauth_request: invalid user mc [preauth]
Jan  7 16:45:55 host sshd[16576]: Invalid user guest from 27.71.231.21 port 38198
Jan  7 16:45:55 host sshd[16576]: input_userauth_request: invalid user guest [preauth]
Jan  7 16:45:55 host sshd[16575]: Invalid user elastic from 27.71.231.21 port 38292
Jan  7 16:45:55 host sshd[16569]: User ftp from 27.71.231.21 not allowed because not listed in AllowUsers
Jan  7 16:45:55 host sshd[16575]: input_userauth_request: invalid user elastic [preauth]
Jan  7 16:45:55 host sshd[16569]: input_userauth_request: invalid user ftp [preauth]
Jan  7 16:45:55 host sshd[16563]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 16:45:55 host sshd[16563]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  7 16:45:55 host unix_chkpwd[16590]: password check failed for user (centos)
Jan  7 16:45:55 host sshd[16564]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21  user=centos
Jan  7 16:45:55 host sshd[16562]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 16:45:55 host sshd[16562]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  7 16:45:55 host sshd[16572]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 16:45:55 host sshd[16572]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  7 16:45:55 host sshd[16570]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 16:45:55 host sshd[16566]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 16:45:55 host sshd[16570]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  7 16:45:55 host sshd[16566]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  7 16:45:55 host sshd[16565]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 16:45:55 host sshd[16565]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  7 16:45:55 host sshd[16573]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 16:45:55 host sshd[16573]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  7 16:45:55 host sshd[16568]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 16:45:55 host sshd[16568]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  7 16:45:55 host sshd[16567]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 16:45:55 host sshd[16567]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  7 16:45:55 host sshd[16574]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 16:45:55 host sshd[16574]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  7 16:45:55 host sshd[16576]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 16:45:55 host sshd[16576]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  7 16:45:55 host sshd[16575]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 16:45:55 host sshd[16575]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21
Jan  7 16:45:55 host unix_chkpwd[16591]: password check failed for user (ftp)
Jan  7 16:45:55 host sshd[16569]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21  user=ftp
Jan  7 16:45:55 host sshd[16569]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp"
Jan  7 16:45:56 host sshd[16540]: Failed password for invalid user mailadmin from 27.71.231.21 port 38286 ssh2
Jan  7 16:45:56 host sshd[16537]: Failed password for invalid user ubuntu from 27.71.231.21 port 38226 ssh2
Jan  7 16:45:56 host sshd[16541]: Failed password for invalid user steam from 27.71.231.21 port 38232 ssh2
Jan  7 16:45:56 host sshd[16539]: Failed password for invalid user discord from 27.71.231.21 port 38164 ssh2
Jan  7 16:45:56 host sshd[16543]: Failed password for invalid user postgres from 27.71.231.21 port 38278 ssh2
Jan  7 16:45:56 host sshd[16538]: Failed password for invalid user jenkins from 27.71.231.21 port 38110 ssh2
Jan  7 16:45:56 host sshd[16547]: Failed password for invalid user oracle from 27.71.231.21 port 38338 ssh2
Jan  7 16:45:56 host sshd[16542]: Failed password for invalid user devops from 27.71.231.21 port 38114 ssh2
Jan  7 16:45:56 host sshd[16544]: Failed password for invalid user ubuntu from 27.71.231.21 port 38140 ssh2
Jan  7 16:45:56 host sshd[16546]: Failed password for invalid user guest from 27.71.231.21 port 38086 ssh2
Jan  7 16:45:56 host sshd[16545]: Failed password for invalid user ansadmin from 27.71.231.21 port 38180 ssh2
Jan  7 16:45:56 host sshd[16548]: Failed password for invalid user emqx from 27.71.231.21 port 38244 ssh2
Jan  7 16:45:56 host sshd[16540]: Connection closed by 27.71.231.21 port 38286 [preauth]
Jan  7 16:45:56 host sshd[16537]: Connection closed by 27.71.231.21 port 38226 [preauth]
Jan  7 16:45:56 host sshd[16541]: Connection closed by 27.71.231.21 port 38232 [preauth]
Jan  7 16:45:56 host sshd[16539]: Connection closed by 27.71.231.21 port 38164 [preauth]
Jan  7 16:45:56 host sshd[16543]: Connection closed by 27.71.231.21 port 38278 [preauth]
Jan  7 16:45:56 host sshd[16538]: Connection closed by 27.71.231.21 port 38110 [preauth]
Jan  7 16:45:56 host sshd[16547]: Connection closed by 27.71.231.21 port 38338 [preauth]
Jan  7 16:45:56 host sshd[16542]: Connection closed by 27.71.231.21 port 38114 [preauth]
Jan  7 16:45:56 host sshd[16544]: Connection closed by 27.71.231.21 port 38140 [preauth]
Jan  7 16:45:56 host sshd[16546]: Connection closed by 27.71.231.21 port 38086 [preauth]
Jan  7 16:45:56 host sshd[16545]: Connection closed by 27.71.231.21 port 38180 [preauth]
Jan  7 16:45:56 host sshd[16548]: Connection closed by 27.71.231.21 port 38244 [preauth]
Jan  7 16:45:58 host sshd[16563]: Failed password for invalid user ftpuser from 27.71.231.21 port 38148 ssh2
Jan  7 16:45:58 host sshd[16564]: Failed password for invalid user centos from 27.71.231.21 port 38396 ssh2
Jan  7 16:45:58 host sshd[16562]: Failed password for invalid user web from 27.71.231.21 port 38370 ssh2
Jan  7 16:45:58 host sshd[16572]: Failed password for invalid user steam from 27.71.231.21 port 38258 ssh2
Jan  7 16:45:58 host sshd[16570]: Failed password for invalid user oracle from 27.71.231.21 port 38270 ssh2
Jan  7 16:45:58 host sshd[16566]: Failed password for invalid user vagrant from 27.71.231.21 port 38392 ssh2
Jan  7 16:45:58 host sshd[16565]: Failed password for invalid user test from 27.71.231.21 port 38312 ssh2
Jan  7 16:45:58 host sshd[16573]: Failed password for invalid user dockeradmin from 27.71.231.21 port 38078 ssh2
Jan  7 16:45:58 host sshd[16568]: Failed password for invalid user ubuntu from 27.71.231.21 port 38294 ssh2
Jan  7 16:45:58 host sshd[16567]: Failed password for invalid user www from 27.71.231.21 port 38242 ssh2
Jan  7 16:45:58 host sshd[16574]: Failed password for invalid user mc from 27.71.231.21 port 38352 ssh2
Jan  7 16:45:58 host sshd[16576]: Failed password for invalid user guest from 27.71.231.21 port 38198 ssh2
Jan  7 16:45:58 host sshd[16575]: Failed password for invalid user elastic from 27.71.231.21 port 38292 ssh2
Jan  7 16:45:58 host sshd[16564]: Connection closed by 27.71.231.21 port 38396 [preauth]
Jan  7 16:45:58 host sshd[16563]: Connection closed by 27.71.231.21 port 38148 [preauth]
Jan  7 16:45:58 host sshd[16569]: Failed password for invalid user ftp from 27.71.231.21 port 38256 ssh2
Jan  7 16:45:58 host sshd[16562]: Connection closed by 27.71.231.21 port 38370 [preauth]
Jan  7 16:45:58 host sshd[16572]: Connection closed by 27.71.231.21 port 38258 [preauth]
Jan  7 16:45:58 host sshd[16570]: Connection closed by 27.71.231.21 port 38270 [preauth]
Jan  7 16:45:58 host sshd[16566]: Connection closed by 27.71.231.21 port 38392 [preauth]
Jan  7 16:45:58 host sshd[16565]: Connection closed by 27.71.231.21 port 38312 [preauth]
Jan  7 16:45:58 host sshd[16568]: Connection closed by 27.71.231.21 port 38294 [preauth]
Jan  7 16:45:58 host sshd[16573]: Connection closed by 27.71.231.21 port 38078 [preauth]
Jan  7 16:45:58 host sshd[16567]: Connection closed by 27.71.231.21 port 38242 [preauth]
Jan  7 16:45:58 host sshd[16574]: Connection closed by 27.71.231.21 port 38352 [preauth]
Jan  7 16:45:58 host sshd[16576]: Connection closed by 27.71.231.21 port 38198 [preauth]
Jan  7 16:45:58 host sshd[16575]: Connection closed by 27.71.231.21 port 38292 [preauth]
Jan  7 16:45:58 host sshd[16569]: Connection closed by 27.71.231.21 port 38256 [preauth]
Jan  7 16:51:25 host sshd[17380]: Invalid user ymuto from 112.195.58.107 port 49654
Jan  7 16:51:25 host sshd[17380]: input_userauth_request: invalid user ymuto [preauth]
Jan  7 16:51:25 host sshd[17380]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 16:51:25 host sshd[17380]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.195.58.107
Jan  7 16:51:27 host sshd[17380]: Failed password for invalid user ymuto from 112.195.58.107 port 49654 ssh2
Jan  7 16:51:27 host sshd[17380]: Received disconnect from 112.195.58.107 port 49654:11: Bye Bye [preauth]
Jan  7 16:51:27 host sshd[17380]: Disconnected from 112.195.58.107 port 49654 [preauth]
Jan  7 16:52:20 host sshd[17499]: Invalid user test from 112.195.58.107 port 58986
Jan  7 16:52:20 host sshd[17499]: input_userauth_request: invalid user test [preauth]
Jan  7 16:52:20 host sshd[17499]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 16:52:20 host sshd[17499]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.195.58.107
Jan  7 16:52:22 host sshd[17499]: Failed password for invalid user test from 112.195.58.107 port 58986 ssh2
Jan  7 16:52:22 host sshd[17499]: Received disconnect from 112.195.58.107 port 58986:11: Bye Bye [preauth]
Jan  7 16:52:22 host sshd[17499]: Disconnected from 112.195.58.107 port 58986 [preauth]
Jan  7 16:53:09 host sshd[17684]: Invalid user ex from 112.195.58.107 port 40042
Jan  7 16:53:09 host sshd[17684]: input_userauth_request: invalid user ex [preauth]
Jan  7 16:53:09 host sshd[17684]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 16:53:09 host sshd[17684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.195.58.107
Jan  7 16:53:11 host sshd[17684]: Failed password for invalid user ex from 112.195.58.107 port 40042 ssh2
Jan  7 16:53:12 host sshd[17684]: Received disconnect from 112.195.58.107 port 40042:11: Bye Bye [preauth]
Jan  7 16:53:12 host sshd[17684]: Disconnected from 112.195.58.107 port 40042 [preauth]
Jan  7 17:15:21 host sshd[20634]: Invalid user pi from 173.17.218.8 port 51790
Jan  7 17:15:21 host sshd[20634]: input_userauth_request: invalid user pi [preauth]
Jan  7 17:15:22 host sshd[20634]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 17:15:22 host sshd[20634]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.17.218.8
Jan  7 17:15:23 host sshd[20637]: Invalid user pi from 173.17.218.8 port 51798
Jan  7 17:15:23 host sshd[20637]: input_userauth_request: invalid user pi [preauth]
Jan  7 17:15:23 host sshd[20634]: Failed password for invalid user pi from 173.17.218.8 port 51790 ssh2
Jan  7 17:15:24 host sshd[20637]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 17:15:24 host sshd[20637]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.17.218.8
Jan  7 17:15:24 host sshd[20634]: Connection closed by 173.17.218.8 port 51790 [preauth]
Jan  7 17:15:25 host sshd[20637]: Failed password for invalid user pi from 173.17.218.8 port 51798 ssh2
Jan  7 17:15:26 host sshd[20637]: Connection closed by 173.17.218.8 port 51798 [preauth]
Jan  7 17:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  7 17:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 17:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 17:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  7 17:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 17:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 17:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  7 17:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 17:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 17:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  7 17:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 17:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 17:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  7 17:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 17:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 17:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  7 17:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 17:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 17:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  7 17:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 17:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 17:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  7 17:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 17:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 17:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  7 17:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 17:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 17:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  7 17:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 17:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 17:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  7 17:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 17:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 17:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  7 17:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 17:21:59 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 17:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  7 17:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 17:22:00 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 17:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=travelboniface user-3=wwwresourcehunte user-4=keralaholi user-5=wwwrmswll user-6=ugotscom user-7=cochintaxi user-8=wwwkaretakers user-9=a2zgroup user-10=dartsimp user-11=laundryboniface user-12=bonifacegroup user-13=wwwevmhonda user-14=straightcurve user-15=wwwletsstalkfood user-16=palco123 user-17=gifterman user-18=kottayamcalldriv user-19=phmetals user-20=wwwnexidigital user-21=mrsclean user-22=wwwkmaorg user-23=disposeat user-24=remysagr user-25=wwwkapin user-26=woodpeck user-27=vfmassets user-28=shalinijames user-29=wwwtestugo user-30=pmcresources feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  7 17:22:00 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  7 17:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 17:22:00 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 17:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  7 17:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 17:22:00 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 17:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-YcgkEEtRec8VDzk4.~
Jan  7 17:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 17:22:00 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 17:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-YcgkEEtRec8VDzk4.~'
Jan  7 17:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 17:22:00 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 17:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-YcgkEEtRec8VDzk4.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  7 17:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 17:22:00 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 17:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  7 17:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 17:22:00 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 17:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  7 17:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 17:22:00 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 17:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  7 17:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 17:22:01 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 17:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  7 17:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 17:22:01 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 17:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  7 17:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 17:22:01 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 17:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  7 17:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 17:22:01 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 17:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  7 17:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 17:22:02 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 17:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  7 17:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  7 17:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  7 17:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  7 17:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  7 17:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  7 17:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  7 17:22:08 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  7 17:22:09 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  7 17:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  7 17:22:10 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 17:22:11 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 17:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  7 17:22:11 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 17:22:11 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 17:22:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  7 17:22:12 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 17:22:17 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 17:22:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  7 17:22:17 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 17:22:23 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 17:22:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  7 17:22:24 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 17:22:25 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 17:56:55 host sshd[27041]: Bad protocol version identification '' from 111.200.27.217 port 46678
Jan  7 17:56:57 host sshd[27043]: User root from 106.37.108.146 not allowed because not listed in AllowUsers
Jan  7 17:56:57 host sshd[27043]: input_userauth_request: invalid user root [preauth]
Jan  7 17:56:58 host unix_chkpwd[27047]: password check failed for user (root)
Jan  7 17:56:58 host sshd[27043]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.37.108.146  user=root
Jan  7 17:56:58 host sshd[27043]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 17:57:00 host sshd[27043]: Failed password for invalid user root from 106.37.108.146 port 48886 ssh2
Jan  7 17:57:01 host sshd[27043]: Connection closed by 106.37.108.146 port 48886 [preauth]
Jan  7 18:07:01 host sshd[28348]: Invalid user pi from 185.134.213.175 port 53978
Jan  7 18:07:01 host sshd[28348]: input_userauth_request: invalid user pi [preauth]
Jan  7 18:07:02 host sshd[28351]: Invalid user pi from 185.134.213.175 port 53980
Jan  7 18:07:02 host sshd[28351]: input_userauth_request: invalid user pi [preauth]
Jan  7 18:07:02 host sshd[28348]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 18:07:02 host sshd[28348]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.134.213.175
Jan  7 18:07:02 host sshd[28351]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 18:07:02 host sshd[28351]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.134.213.175
Jan  7 18:07:04 host sshd[28348]: Failed password for invalid user pi from 185.134.213.175 port 53978 ssh2
Jan  7 18:07:04 host sshd[28351]: Failed password for invalid user pi from 185.134.213.175 port 53980 ssh2
Jan  7 18:07:04 host sshd[28348]: Connection closed by 185.134.213.175 port 53978 [preauth]
Jan  7 18:07:04 host sshd[28351]: Connection closed by 185.134.213.175 port 53980 [preauth]
Jan  7 18:14:06 host sshd[29331]: Did not receive identification string from 45.33.80.243 port 38584
Jan  7 18:14:09 host sshd[29335]: Connection closed by 45.33.80.243 port 38586 [preauth]
Jan  7 18:14:10 host sshd[29341]: Did not receive identification string from 45.33.80.243 port 38598
Jan  7 18:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  7 18:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 18:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 18:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  7 18:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 18:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 18:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  7 18:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 18:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 18:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  7 18:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 18:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 18:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  7 18:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 18:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 18:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  7 18:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 18:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 18:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  7 18:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 18:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 18:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  7 18:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 18:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 18:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  7 18:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 18:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 18:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  7 18:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 18:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 18:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  7 18:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 18:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 18:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  7 18:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 18:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 18:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  7 18:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 18:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 18:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=vfmassets user-2=wwwtestugo user-3=shalinijames user-4=pmcresources user-5=remysagr user-6=wwwkmaorg user-7=disposeat user-8=woodpeck user-9=wwwkapin user-10=gifterman user-11=palco123 user-12=kottayamcalldriv user-13=phmetals user-14=mrsclean user-15=wwwnexidigital user-16=bonifacegroup user-17=wwwevmhonda user-18=straightcurve user-19=wwwletsstalkfood user-20=dartsimp user-21=a2zgroup user-22=laundryboniface user-23=wwwkaretakers user-24=cochintaxi user-25=travelboniface user-26=wwwrmswll user-27=wwwresourcehunte user-28=keralaholi user-29=ugotscom user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  7 18:21:55 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  7 18:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 18:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 18:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  7 18:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 18:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 18:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-PUsDXkLaHgjT54tq.~
Jan  7 18:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 18:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 18:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-PUsDXkLaHgjT54tq.~'
Jan  7 18:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 18:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 18:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-PUsDXkLaHgjT54tq.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  7 18:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 18:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 18:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  7 18:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 18:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 18:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  7 18:21:56 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 18:21:56 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 18:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  7 18:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 18:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 18:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  7 18:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 18:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 18:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  7 18:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 18:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 18:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  7 18:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 18:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 18:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  7 18:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 18:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 18:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  7 18:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  7 18:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  7 18:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  7 18:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  7 18:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  7 18:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  7 18:22:01 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  7 18:22:03 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  7 18:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  7 18:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 18:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 18:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  7 18:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 18:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 18:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  7 18:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 18:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 18:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  7 18:22:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 18:22:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 18:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  7 18:22:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 18:22:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 18:27:10 host sshd[31366]: Invalid user service from 194.169.175.102 port 62876
Jan  7 18:27:10 host sshd[31366]: input_userauth_request: invalid user service [preauth]
Jan  7 18:27:10 host sshd[31366]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 18:27:10 host sshd[31366]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.169.175.102
Jan  7 18:27:12 host sshd[31366]: Failed password for invalid user service from 194.169.175.102 port 62876 ssh2
Jan  7 18:27:12 host sshd[31366]: Received disconnect from 194.169.175.102 port 62876:11: Client disconnecting normally [preauth]
Jan  7 18:27:12 host sshd[31366]: Disconnected from 194.169.175.102 port 62876 [preauth]
Jan  7 18:37:10 host sshd[549]: Did not receive identification string from 157.245.156.179 port 36328
Jan  7 18:38:24 host sshd[892]: User root from 157.245.156.179 not allowed because not listed in AllowUsers
Jan  7 18:38:24 host sshd[892]: input_userauth_request: invalid user root [preauth]
Jan  7 18:38:24 host unix_chkpwd[895]: password check failed for user (root)
Jan  7 18:38:24 host sshd[892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.156.179  user=root
Jan  7 18:38:24 host sshd[892]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 18:38:26 host sshd[892]: Failed password for invalid user root from 157.245.156.179 port 60930 ssh2
Jan  7 18:38:26 host sshd[892]: Received disconnect from 157.245.156.179 port 60930:11: Normal Shutdown, Thank you for playing [preauth]
Jan  7 18:38:26 host sshd[892]: Disconnected from 157.245.156.179 port 60930 [preauth]
Jan  7 18:41:14 host sshd[1382]: Bad protocol version identification 'GET / HTTP/1.1' from 143.244.140.70 port 47056
Jan  7 18:41:46 host sshd[1435]: Connection closed by 143.244.140.70 port 47730 [preauth]
Jan  7 18:43:17 host sshd[1749]: Invalid user aw from 194.110.203.109 port 55206
Jan  7 18:43:17 host sshd[1749]: input_userauth_request: invalid user aw [preauth]
Jan  7 18:43:17 host sshd[1749]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 18:43:17 host sshd[1749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109
Jan  7 18:43:19 host sshd[1749]: Failed password for invalid user aw from 194.110.203.109 port 55206 ssh2
Jan  7 18:43:23 host sshd[1749]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 18:43:25 host sshd[1749]: Failed password for invalid user aw from 194.110.203.109 port 55206 ssh2
Jan  7 18:43:28 host sshd[1749]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 18:43:30 host sshd[1749]: Failed password for invalid user aw from 194.110.203.109 port 55206 ssh2
Jan  7 18:43:33 host sshd[1749]: Connection closed by 194.110.203.109 port 55206 [preauth]
Jan  7 18:43:33 host sshd[1749]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109
Jan  7 19:01:25 host sshd[4433]: Invalid user admin from 47.7.117.55 port 50712
Jan  7 19:01:25 host sshd[4433]: input_userauth_request: invalid user admin [preauth]
Jan  7 19:01:25 host sshd[4433]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 19:01:25 host sshd[4433]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.7.117.55
Jan  7 19:01:28 host sshd[4433]: Failed password for invalid user admin from 47.7.117.55 port 50712 ssh2
Jan  7 19:01:28 host sshd[4433]: Received disconnect from 47.7.117.55 port 50712:11: Bye Bye [preauth]
Jan  7 19:01:28 host sshd[4433]: Disconnected from 47.7.117.55 port 50712 [preauth]
Jan  7 19:01:30 host sshd[4461]: User root from 47.7.117.55 not allowed because not listed in AllowUsers
Jan  7 19:01:30 host sshd[4461]: input_userauth_request: invalid user root [preauth]
Jan  7 19:01:30 host unix_chkpwd[4466]: password check failed for user (root)
Jan  7 19:01:30 host sshd[4461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.7.117.55  user=root
Jan  7 19:01:30 host sshd[4461]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 19:01:32 host sshd[4461]: Failed password for invalid user root from 47.7.117.55 port 50911 ssh2
Jan  7 19:01:33 host sshd[4461]: Received disconnect from 47.7.117.55 port 50911:11: Bye Bye [preauth]
Jan  7 19:01:33 host sshd[4461]: Disconnected from 47.7.117.55 port 50911 [preauth]
Jan  7 19:04:50 host sshd[4863]: Invalid user administrator from 175.196.129.174 port 35636
Jan  7 19:04:50 host sshd[4863]: input_userauth_request: invalid user administrator [preauth]
Jan  7 19:04:50 host sshd[4863]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 19:04:50 host sshd[4863]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.196.129.174
Jan  7 19:04:52 host sshd[4863]: Failed password for invalid user administrator from 175.196.129.174 port 35636 ssh2
Jan  7 19:04:53 host sshd[4863]: Received disconnect from 175.196.129.174 port 35636:11: Bye Bye [preauth]
Jan  7 19:04:53 host sshd[4863]: Disconnected from 175.196.129.174 port 35636 [preauth]
Jan  7 19:08:14 host sshd[5466]: Invalid user marek from 92.81.222.217 port 38428
Jan  7 19:08:14 host sshd[5466]: input_userauth_request: invalid user marek [preauth]
Jan  7 19:08:14 host sshd[5466]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 19:08:14 host sshd[5466]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.81.222.217
Jan  7 19:08:16 host sshd[5466]: Failed password for invalid user marek from 92.81.222.217 port 38428 ssh2
Jan  7 19:08:16 host sshd[5466]: Received disconnect from 92.81.222.217 port 38428:11: Bye Bye [preauth]
Jan  7 19:08:16 host sshd[5466]: Disconnected from 92.81.222.217 port 38428 [preauth]
Jan  7 19:08:49 host sshd[5532]: User root from 82.196.7.111 not allowed because not listed in AllowUsers
Jan  7 19:08:49 host sshd[5532]: input_userauth_request: invalid user root [preauth]
Jan  7 19:08:49 host unix_chkpwd[5537]: password check failed for user (root)
Jan  7 19:08:49 host sshd[5532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.196.7.111  user=root
Jan  7 19:08:49 host sshd[5532]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 19:08:51 host sshd[5532]: Failed password for invalid user root from 82.196.7.111 port 37264 ssh2
Jan  7 19:08:52 host sshd[5532]: Received disconnect from 82.196.7.111 port 37264:11: Bye Bye [preauth]
Jan  7 19:08:52 host sshd[5532]: Disconnected from 82.196.7.111 port 37264 [preauth]
Jan  7 19:10:52 host sshd[6038]: Invalid user ah from 82.196.7.111 port 42512
Jan  7 19:10:52 host sshd[6038]: input_userauth_request: invalid user ah [preauth]
Jan  7 19:10:52 host sshd[6038]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 19:10:52 host sshd[6038]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.196.7.111
Jan  7 19:10:55 host sshd[6038]: Failed password for invalid user ah from 82.196.7.111 port 42512 ssh2
Jan  7 19:10:55 host sshd[6038]: Received disconnect from 82.196.7.111 port 42512:11: Bye Bye [preauth]
Jan  7 19:10:55 host sshd[6038]: Disconnected from 82.196.7.111 port 42512 [preauth]
Jan  7 19:11:06 host sshd[6114]: Invalid user admin from 175.196.129.174 port 45784
Jan  7 19:11:06 host sshd[6114]: input_userauth_request: invalid user admin [preauth]
Jan  7 19:11:06 host sshd[6114]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 19:11:06 host sshd[6114]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.196.129.174
Jan  7 19:11:08 host sshd[6114]: Failed password for invalid user admin from 175.196.129.174 port 45784 ssh2
Jan  7 19:11:09 host sshd[6114]: Received disconnect from 175.196.129.174 port 45784:11: Bye Bye [preauth]
Jan  7 19:11:09 host sshd[6114]: Disconnected from 175.196.129.174 port 45784 [preauth]
Jan  7 19:11:20 host sshd[6146]: User root from 80.94.92.241 not allowed because not listed in AllowUsers
Jan  7 19:11:20 host sshd[6146]: input_userauth_request: invalid user root [preauth]
Jan  7 19:11:20 host sshd[6148]: User root from 80.94.92.241 not allowed because not listed in AllowUsers
Jan  7 19:11:20 host sshd[6148]: input_userauth_request: invalid user root [preauth]
Jan  7 19:11:20 host unix_chkpwd[6153]: password check failed for user (root)
Jan  7 19:11:20 host sshd[6146]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.94.92.241  user=root
Jan  7 19:11:20 host sshd[6146]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 19:11:21 host unix_chkpwd[6154]: password check failed for user (root)
Jan  7 19:11:21 host sshd[6148]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.94.92.241  user=root
Jan  7 19:11:21 host sshd[6148]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 19:11:22 host sshd[6146]: Failed password for invalid user root from 80.94.92.241 port 60290 ssh2
Jan  7 19:11:22 host sshd[6146]: Connection closed by 80.94.92.241 port 60290 [preauth]
Jan  7 19:11:23 host sshd[6148]: Failed password for invalid user root from 80.94.92.241 port 60298 ssh2
Jan  7 19:11:23 host sshd[6148]: Connection closed by 80.94.92.241 port 60298 [preauth]
Jan  7 19:12:22 host sshd[6357]: Invalid user onar from 175.196.129.174 port 43076
Jan  7 19:12:22 host sshd[6357]: input_userauth_request: invalid user onar [preauth]
Jan  7 19:12:22 host sshd[6357]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 19:12:22 host sshd[6357]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.196.129.174
Jan  7 19:12:22 host sshd[6360]: User root from 92.81.222.217 not allowed because not listed in AllowUsers
Jan  7 19:12:22 host sshd[6360]: input_userauth_request: invalid user root [preauth]
Jan  7 19:12:22 host unix_chkpwd[6363]: password check failed for user (root)
Jan  7 19:12:22 host sshd[6360]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.81.222.217  user=root
Jan  7 19:12:22 host sshd[6360]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 19:12:24 host sshd[6357]: Failed password for invalid user onar from 175.196.129.174 port 43076 ssh2
Jan  7 19:12:24 host sshd[6360]: Failed password for invalid user root from 92.81.222.217 port 48516 ssh2
Jan  7 19:12:24 host sshd[6360]: Received disconnect from 92.81.222.217 port 48516:11: Bye Bye [preauth]
Jan  7 19:12:24 host sshd[6360]: Disconnected from 92.81.222.217 port 48516 [preauth]
Jan  7 19:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  7 19:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 19:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 19:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  7 19:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 19:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 19:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  7 19:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 19:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 19:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  7 19:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 19:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 19:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  7 19:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 19:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 19:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  7 19:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 19:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 19:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  7 19:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 19:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 19:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  7 19:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 19:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 19:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  7 19:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 19:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 19:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  7 19:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 19:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 19:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  7 19:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 19:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 19:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  7 19:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 19:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 19:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  7 19:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 19:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 19:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=palco123 user-2=gifterman user-3=kottayamcalldriv user-4=phmetals user-5=mrsclean user-6=wwwnexidigital user-7=bonifacegroup user-8=wwwevmhonda user-9=straightcurve user-10=wwwletsstalkfood user-11=vfmassets user-12=shalinijames user-13=wwwtestugo user-14=pmcresources user-15=wwwkmaorg user-16=remysagr user-17=disposeat user-18=wwwkapin user-19=woodpeck user-20=travelboniface user-21=keralaholi user-22=wwwresourcehunte user-23=wwwrmswll user-24=ugotscom user-25=wwwpmcresource user-26=a2zgroup user-27=dartsimp user-28=laundryboniface user-29=wwwkaretakers user-30=cochintaxi feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  7 19:21:55 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  7 19:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 19:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 19:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  7 19:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 19:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 19:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-qgujPwBqqwkWRouD.~
Jan  7 19:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 19:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 19:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-qgujPwBqqwkWRouD.~'
Jan  7 19:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 19:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 19:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-qgujPwBqqwkWRouD.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  7 19:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 19:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 19:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  7 19:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 19:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 19:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  7 19:21:56 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 19:21:56 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 19:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  7 19:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 19:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 19:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  7 19:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 19:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 19:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  7 19:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 19:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 19:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  7 19:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 19:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 19:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  7 19:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 19:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 19:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  7 19:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  7 19:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  7 19:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  7 19:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  7 19:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  7 19:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  7 19:22:00 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  7 19:22:02 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  7 19:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  7 19:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 19:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 19:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  7 19:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 19:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 19:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  7 19:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 19:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 19:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  7 19:22:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 19:22:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 19:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  7 19:22:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 19:22:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 19:52:17 host sshd[14242]: Invalid user roy from 107.189.30.59 port 47268
Jan  7 19:52:17 host sshd[14242]: input_userauth_request: invalid user roy [preauth]
Jan  7 19:52:17 host sshd[14242]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 19:52:17 host sshd[14242]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59
Jan  7 19:52:19 host sshd[14242]: Failed password for invalid user roy from 107.189.30.59 port 47268 ssh2
Jan  7 19:52:19 host sshd[14242]: Connection closed by 107.189.30.59 port 47268 [preauth]
Jan  7 20:04:02 host sshd[15803]: ssh_dispatch_run_fatal: Connection from 69.112.204.55 port 45034: Connection corrupted [preauth]
Jan  7 20:09:30 host sshd[16390]: User root from 151.93.146.217 not allowed because not listed in AllowUsers
Jan  7 20:09:30 host sshd[16390]: input_userauth_request: invalid user root [preauth]
Jan  7 20:09:30 host unix_chkpwd[16410]: password check failed for user (root)
Jan  7 20:09:30 host sshd[16390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.93.146.217  user=root
Jan  7 20:09:30 host sshd[16390]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 20:09:32 host sshd[16390]: Failed password for invalid user root from 151.93.146.217 port 36970 ssh2
Jan  7 20:09:33 host sshd[16390]: Received disconnect from 151.93.146.217 port 36970:11: Bye Bye [preauth]
Jan  7 20:09:33 host sshd[16390]: Disconnected from 151.93.146.217 port 36970 [preauth]
Jan  7 20:10:18 host sshd[16592]: User root from 200.90.8.90 not allowed because not listed in AllowUsers
Jan  7 20:10:18 host sshd[16592]: input_userauth_request: invalid user root [preauth]
Jan  7 20:10:18 host unix_chkpwd[16597]: password check failed for user (root)
Jan  7 20:10:18 host sshd[16592]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.90.8.90  user=root
Jan  7 20:10:18 host sshd[16592]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 20:10:20 host sshd[16592]: Failed password for invalid user root from 200.90.8.90 port 38376 ssh2
Jan  7 20:10:21 host sshd[16592]: Received disconnect from 200.90.8.90 port 38376:11: Bye Bye [preauth]
Jan  7 20:10:21 host sshd[16592]: Disconnected from 200.90.8.90 port 38376 [preauth]
Jan  7 20:11:08 host sshd[16717]: User root from 51.210.254.243 not allowed because not listed in AllowUsers
Jan  7 20:11:08 host sshd[16717]: input_userauth_request: invalid user root [preauth]
Jan  7 20:11:08 host unix_chkpwd[16720]: password check failed for user (root)
Jan  7 20:11:08 host sshd[16717]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.210.254.243  user=root
Jan  7 20:11:08 host sshd[16717]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 20:11:10 host sshd[16717]: Failed password for invalid user root from 51.210.254.243 port 35458 ssh2
Jan  7 20:11:10 host sshd[16717]: Received disconnect from 51.210.254.243 port 35458:11: Bye Bye [preauth]
Jan  7 20:11:10 host sshd[16717]: Disconnected from 51.210.254.243 port 35458 [preauth]
Jan  7 20:12:03 host sshd[16825]: User root from 43.153.55.63 not allowed because not listed in AllowUsers
Jan  7 20:12:03 host sshd[16825]: input_userauth_request: invalid user root [preauth]
Jan  7 20:12:03 host unix_chkpwd[16828]: password check failed for user (root)
Jan  7 20:12:03 host sshd[16825]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.55.63  user=root
Jan  7 20:12:03 host sshd[16825]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 20:12:05 host sshd[16825]: Failed password for invalid user root from 43.153.55.63 port 45602 ssh2
Jan  7 20:12:05 host sshd[16825]: Received disconnect from 43.153.55.63 port 45602:11: Bye Bye [preauth]
Jan  7 20:12:05 host sshd[16825]: Disconnected from 43.153.55.63 port 45602 [preauth]
Jan  7 20:12:32 host sshd[16891]: Invalid user user from 181.30.129.31 port 42942
Jan  7 20:12:32 host sshd[16891]: input_userauth_request: invalid user user [preauth]
Jan  7 20:12:32 host sshd[16891]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 20:12:32 host sshd[16891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.30.129.31
Jan  7 20:12:33 host sshd[16894]: Invalid user redmine from 61.219.171.213 port 42574
Jan  7 20:12:33 host sshd[16894]: input_userauth_request: invalid user redmine [preauth]
Jan  7 20:12:33 host sshd[16894]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 20:12:33 host sshd[16894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.219.171.213
Jan  7 20:12:34 host sshd[16891]: Failed password for invalid user user from 181.30.129.31 port 42942 ssh2
Jan  7 20:12:35 host sshd[16891]: Received disconnect from 181.30.129.31 port 42942:11: Bye Bye [preauth]
Jan  7 20:12:35 host sshd[16891]: Disconnected from 181.30.129.31 port 42942 [preauth]
Jan  7 20:12:35 host sshd[16894]: Failed password for invalid user redmine from 61.219.171.213 port 42574 ssh2
Jan  7 20:12:35 host sshd[16894]: Received disconnect from 61.219.171.213 port 42574:11: Bye Bye [preauth]
Jan  7 20:12:35 host sshd[16894]: Disconnected from 61.219.171.213 port 42574 [preauth]
Jan  7 20:13:51 host sshd[17021]: Invalid user ubuntu from 164.90.191.216 port 44612
Jan  7 20:13:51 host sshd[17021]: input_userauth_request: invalid user ubuntu [preauth]
Jan  7 20:13:51 host sshd[17021]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 20:13:51 host sshd[17021]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.90.191.216
Jan  7 20:13:52 host sshd[17021]: Failed password for invalid user ubuntu from 164.90.191.216 port 44612 ssh2
Jan  7 20:13:52 host sshd[17021]: Received disconnect from 164.90.191.216 port 44612:11: Bye Bye [preauth]
Jan  7 20:13:52 host sshd[17021]: Disconnected from 164.90.191.216 port 44612 [preauth]
Jan  7 20:15:13 host sshd[17293]: Invalid user postmaster from 96.78.175.42 port 56420
Jan  7 20:15:13 host sshd[17293]: input_userauth_request: invalid user postmaster [preauth]
Jan  7 20:15:13 host sshd[17293]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 20:15:13 host sshd[17293]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.78.175.42
Jan  7 20:15:15 host sshd[17293]: Failed password for invalid user postmaster from 96.78.175.42 port 56420 ssh2
Jan  7 20:15:15 host sshd[17293]: Received disconnect from 96.78.175.42 port 56420:11: Bye Bye [preauth]
Jan  7 20:15:15 host sshd[17293]: Disconnected from 96.78.175.42 port 56420 [preauth]
Jan  7 20:15:19 host sshd[17299]: Invalid user docker from 151.93.146.217 port 39622
Jan  7 20:15:19 host sshd[17299]: input_userauth_request: invalid user docker [preauth]
Jan  7 20:15:19 host sshd[17299]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 20:15:19 host sshd[17299]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.93.146.217
Jan  7 20:15:21 host sshd[17299]: Failed password for invalid user docker from 151.93.146.217 port 39622 ssh2
Jan  7 20:15:21 host sshd[17299]: Received disconnect from 151.93.146.217 port 39622:11: Bye Bye [preauth]
Jan  7 20:15:21 host sshd[17299]: Disconnected from 151.93.146.217 port 39622 [preauth]
Jan  7 20:15:55 host sshd[17395]: User root from 200.90.8.90 not allowed because not listed in AllowUsers
Jan  7 20:15:55 host sshd[17395]: input_userauth_request: invalid user root [preauth]
Jan  7 20:15:55 host unix_chkpwd[17398]: password check failed for user (root)
Jan  7 20:15:55 host sshd[17395]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.90.8.90  user=root
Jan  7 20:15:55 host sshd[17395]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 20:15:56 host sshd[17395]: Failed password for invalid user root from 200.90.8.90 port 41788 ssh2
Jan  7 20:15:57 host sshd[17395]: Received disconnect from 200.90.8.90 port 41788:11: Bye Bye [preauth]
Jan  7 20:15:57 host sshd[17395]: Disconnected from 200.90.8.90 port 41788 [preauth]
Jan  7 20:16:06 host sshd[17461]: Invalid user ne from 61.219.171.213 port 56758
Jan  7 20:16:06 host sshd[17461]: input_userauth_request: invalid user ne [preauth]
Jan  7 20:16:06 host sshd[17461]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 20:16:06 host sshd[17461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.219.171.213
Jan  7 20:16:07 host sshd[17464]: Invalid user redmine from 113.161.74.133 port 52860
Jan  7 20:16:07 host sshd[17464]: input_userauth_request: invalid user redmine [preauth]
Jan  7 20:16:07 host sshd[17464]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 20:16:07 host sshd[17464]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.161.74.133
Jan  7 20:16:09 host sshd[17461]: Failed password for invalid user ne from 61.219.171.213 port 56758 ssh2
Jan  7 20:16:09 host sshd[17461]: Received disconnect from 61.219.171.213 port 56758:11: Bye Bye [preauth]
Jan  7 20:16:09 host sshd[17461]: Disconnected from 61.219.171.213 port 56758 [preauth]
Jan  7 20:16:09 host sshd[17464]: Failed password for invalid user redmine from 113.161.74.133 port 52860 ssh2
Jan  7 20:16:09 host sshd[17464]: Received disconnect from 113.161.74.133 port 52860:11: Bye Bye [preauth]
Jan  7 20:16:09 host sshd[17464]: Disconnected from 113.161.74.133 port 52860 [preauth]
Jan  7 20:16:12 host sshd[17469]: Invalid user redmine from 51.210.254.243 port 36432
Jan  7 20:16:12 host sshd[17469]: input_userauth_request: invalid user redmine [preauth]
Jan  7 20:16:12 host sshd[17469]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 20:16:12 host sshd[17469]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.210.254.243
Jan  7 20:16:14 host sshd[17469]: Failed password for invalid user redmine from 51.210.254.243 port 36432 ssh2
Jan  7 20:16:14 host sshd[17469]: Received disconnect from 51.210.254.243 port 36432:11: Bye Bye [preauth]
Jan  7 20:16:14 host sshd[17469]: Disconnected from 51.210.254.243 port 36432 [preauth]
Jan  7 20:16:38 host sshd[17595]: Invalid user zu from 164.90.191.216 port 50946
Jan  7 20:16:38 host sshd[17595]: input_userauth_request: invalid user zu [preauth]
Jan  7 20:16:38 host sshd[17595]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 20:16:38 host sshd[17595]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.90.191.216
Jan  7 20:16:38 host sshd[17598]: User root from 96.78.175.42 not allowed because not listed in AllowUsers
Jan  7 20:16:38 host sshd[17598]: input_userauth_request: invalid user root [preauth]
Jan  7 20:16:38 host unix_chkpwd[17602]: password check failed for user (root)
Jan  7 20:16:38 host sshd[17598]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.78.175.42  user=root
Jan  7 20:16:38 host sshd[17598]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 20:16:40 host sshd[17595]: Failed password for invalid user zu from 164.90.191.216 port 50946 ssh2
Jan  7 20:16:40 host sshd[17595]: Received disconnect from 164.90.191.216 port 50946:11: Bye Bye [preauth]
Jan  7 20:16:40 host sshd[17595]: Disconnected from 164.90.191.216 port 50946 [preauth]
Jan  7 20:16:40 host sshd[17598]: Failed password for invalid user root from 96.78.175.42 port 39236 ssh2
Jan  7 20:16:40 host sshd[17598]: Received disconnect from 96.78.175.42 port 39236:11: Bye Bye [preauth]
Jan  7 20:16:40 host sshd[17598]: Disconnected from 96.78.175.42 port 39236 [preauth]
Jan  7 20:17:00 host sshd[17667]: Invalid user docker from 181.30.129.31 port 58126
Jan  7 20:17:00 host sshd[17667]: input_userauth_request: invalid user docker [preauth]
Jan  7 20:17:00 host sshd[17667]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 20:17:00 host sshd[17667]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.30.129.31
Jan  7 20:17:02 host sshd[17667]: Failed password for invalid user docker from 181.30.129.31 port 58126 ssh2
Jan  7 20:17:03 host sshd[17667]: Received disconnect from 181.30.129.31 port 58126:11: Bye Bye [preauth]
Jan  7 20:17:03 host sshd[17667]: Disconnected from 181.30.129.31 port 58126 [preauth]
Jan  7 20:17:24 host sshd[17704]: User root from 61.219.171.213 not allowed because not listed in AllowUsers
Jan  7 20:17:24 host sshd[17704]: input_userauth_request: invalid user root [preauth]
Jan  7 20:17:24 host unix_chkpwd[17706]: password check failed for user (root)
Jan  7 20:17:24 host sshd[17704]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.219.171.213  user=root
Jan  7 20:17:24 host sshd[17704]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 20:17:27 host sshd[17704]: Failed password for invalid user root from 61.219.171.213 port 55934 ssh2
Jan  7 20:17:38 host sshd[17774]: Invalid user ne from 113.161.74.133 port 50154
Jan  7 20:17:38 host sshd[17774]: input_userauth_request: invalid user ne [preauth]
Jan  7 20:17:38 host sshd[17774]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 20:17:38 host sshd[17774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.161.74.133
Jan  7 20:17:40 host sshd[17774]: Failed password for invalid user ne from 113.161.74.133 port 50154 ssh2
Jan  7 20:17:40 host sshd[17774]: Received disconnect from 113.161.74.133 port 50154:11: Bye Bye [preauth]
Jan  7 20:17:40 host sshd[17774]: Disconnected from 113.161.74.133 port 50154 [preauth]
Jan  7 20:17:40 host sshd[17777]: User root from 164.90.191.216 not allowed because not listed in AllowUsers
Jan  7 20:17:40 host sshd[17777]: input_userauth_request: invalid user root [preauth]
Jan  7 20:17:40 host unix_chkpwd[17780]: password check failed for user (root)
Jan  7 20:17:40 host sshd[17777]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.90.191.216  user=root
Jan  7 20:17:40 host sshd[17777]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 20:17:42 host sshd[17777]: Failed password for invalid user root from 164.90.191.216 port 45582 ssh2
Jan  7 20:17:51 host sshd[17821]: User root from 43.153.55.63 not allowed because not listed in AllowUsers
Jan  7 20:17:51 host sshd[17821]: input_userauth_request: invalid user root [preauth]
Jan  7 20:17:51 host unix_chkpwd[17824]: password check failed for user (root)
Jan  7 20:17:51 host sshd[17821]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.55.63  user=root
Jan  7 20:17:51 host sshd[17821]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 20:17:54 host sshd[17821]: Failed password for invalid user root from 43.153.55.63 port 36768 ssh2
Jan  7 20:17:54 host sshd[17821]: Received disconnect from 43.153.55.63 port 36768:11: Bye Bye [preauth]
Jan  7 20:17:54 host sshd[17821]: Disconnected from 43.153.55.63 port 36768 [preauth]
Jan  7 20:18:20 host sshd[17895]: Invalid user test1 from 181.30.129.31 port 52976
Jan  7 20:18:20 host sshd[17895]: input_userauth_request: invalid user test1 [preauth]
Jan  7 20:18:20 host sshd[17895]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 20:18:20 host sshd[17895]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.30.129.31
Jan  7 20:18:22 host sshd[17895]: Failed password for invalid user test1 from 181.30.129.31 port 52976 ssh2
Jan  7 20:19:07 host sshd[18042]: User root from 113.161.74.133 not allowed because not listed in AllowUsers
Jan  7 20:19:07 host sshd[18042]: input_userauth_request: invalid user root [preauth]
Jan  7 20:19:08 host unix_chkpwd[18045]: password check failed for user (root)
Jan  7 20:19:08 host sshd[18042]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.161.74.133  user=root
Jan  7 20:19:08 host sshd[18042]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 20:19:09 host sshd[18042]: Failed password for invalid user root from 113.161.74.133 port 61980 ssh2
Jan  7 20:19:10 host sshd[18042]: Received disconnect from 113.161.74.133 port 61980:11: Bye Bye [preauth]
Jan  7 20:19:10 host sshd[18042]: Disconnected from 113.161.74.133 port 61980 [preauth]
Jan  7 20:21:33 host sshd[18452]: Bad protocol version identification 'MGLNDD_167.71.234.10_22' from 107.170.252.18 port 45168
Jan  7 20:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  7 20:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 20:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 20:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  7 20:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 20:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 20:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  7 20:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 20:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 20:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  7 20:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 20:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 20:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  7 20:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 20:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 20:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  7 20:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 20:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 20:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  7 20:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 20:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 20:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  7 20:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 20:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 20:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  7 20:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 20:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 20:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  7 20:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 20:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 20:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  7 20:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 20:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 20:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  7 20:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 20:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 20:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  7 20:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 20:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 20:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=straightcurve user-2=wwwletsstalkfood user-3=wwwevmhonda user-4=bonifacegroup user-5=mrsclean user-6=wwwnexidigital user-7=kottayamcalldriv user-8=phmetals user-9=palco123 user-10=gifterman user-11=wwwkapin user-12=woodpeck user-13=wwwkmaorg user-14=remysagr user-15=disposeat user-16=pmcresources user-17=shalinijames user-18=wwwtestugo user-19=vfmassets user-20=wwwpmcresource user-21=ugotscom user-22=wwwresourcehunte user-23=keralaholi user-24=wwwrmswll user-25=travelboniface user-26=wwwkaretakers user-27=cochintaxi user-28=laundryboniface user-29=a2zgroup user-30=dartsimp feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  7 20:21:55 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  7 20:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 20:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 20:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  7 20:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 20:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 20:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-dpNunzRSwAcYTr9d.~
Jan  7 20:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 20:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 20:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-dpNunzRSwAcYTr9d.~'
Jan  7 20:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 20:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 20:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-dpNunzRSwAcYTr9d.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  7 20:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 20:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 20:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  7 20:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 20:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 20:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  7 20:21:55 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 20:21:55 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 20:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  7 20:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 20:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 20:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  7 20:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 20:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 20:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  7 20:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 20:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 20:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  7 20:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 20:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 20:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  7 20:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 20:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 20:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  7 20:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  7 20:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  7 20:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  7 20:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  7 20:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  7 20:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  7 20:22:01 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  7 20:22:03 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  7 20:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  7 20:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 20:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 20:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  7 20:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 20:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 20:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  7 20:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 20:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 20:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  7 20:22:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 20:22:10 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 20:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  7 20:22:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 20:22:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 20:31:08 host sshd[19872]: Invalid user karrin from 147.182.247.29 port 41880
Jan  7 20:31:08 host sshd[19872]: input_userauth_request: invalid user karrin [preauth]
Jan  7 20:31:08 host sshd[19872]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 20:31:08 host sshd[19872]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.182.247.29
Jan  7 20:31:10 host sshd[19872]: Failed password for invalid user karrin from 147.182.247.29 port 41880 ssh2
Jan  7 20:31:10 host sshd[19872]: Received disconnect from 147.182.247.29 port 41880:11: Bye Bye [preauth]
Jan  7 20:31:10 host sshd[19872]: Disconnected from 147.182.247.29 port 41880 [preauth]
Jan  7 20:32:59 host sshd[20195]: Invalid user adamina from 147.182.247.29 port 44758
Jan  7 20:32:59 host sshd[20195]: input_userauth_request: invalid user adamina [preauth]
Jan  7 20:32:59 host sshd[20195]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 20:32:59 host sshd[20195]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.182.247.29
Jan  7 20:33:01 host sshd[20195]: Failed password for invalid user adamina from 147.182.247.29 port 44758 ssh2
Jan  7 20:33:01 host sshd[20195]: Received disconnect from 147.182.247.29 port 44758:11: Bye Bye [preauth]
Jan  7 20:33:01 host sshd[20195]: Disconnected from 147.182.247.29 port 44758 [preauth]
Jan  7 20:34:09 host sshd[20324]: Invalid user ziang from 147.182.247.29 port 44134
Jan  7 20:34:09 host sshd[20324]: input_userauth_request: invalid user ziang [preauth]
Jan  7 20:34:09 host sshd[20324]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 20:34:09 host sshd[20324]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.182.247.29
Jan  7 20:34:11 host sshd[20324]: Failed password for invalid user ziang from 147.182.247.29 port 44134 ssh2
Jan  7 20:34:12 host sshd[20324]: Received disconnect from 147.182.247.29 port 44134:11: Bye Bye [preauth]
Jan  7 20:34:12 host sshd[20324]: Disconnected from 147.182.247.29 port 44134 [preauth]
Jan  7 20:55:31 host sshd[23109]: Invalid user localuser from 161.35.26.171 port 41486
Jan  7 20:55:31 host sshd[23109]: input_userauth_request: invalid user localuser [preauth]
Jan  7 20:55:31 host sshd[23109]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 20:55:31 host sshd[23109]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.26.171
Jan  7 20:55:33 host sshd[23109]: Failed password for invalid user localuser from 161.35.26.171 port 41486 ssh2
Jan  7 20:55:33 host sshd[23109]: Received disconnect from 161.35.26.171 port 41486:11: Bye Bye [preauth]
Jan  7 20:55:33 host sshd[23109]: Disconnected from 161.35.26.171 port 41486 [preauth]
Jan  7 20:58:10 host sshd[23532]: Invalid user tomcat2 from 161.35.26.171 port 46338
Jan  7 20:58:10 host sshd[23532]: input_userauth_request: invalid user tomcat2 [preauth]
Jan  7 20:58:10 host sshd[23532]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 20:58:10 host sshd[23532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.26.171
Jan  7 20:58:13 host sshd[23532]: Failed password for invalid user tomcat2 from 161.35.26.171 port 46338 ssh2
Jan  7 20:58:13 host sshd[23532]: Received disconnect from 161.35.26.171 port 46338:11: Bye Bye [preauth]
Jan  7 20:58:13 host sshd[23532]: Disconnected from 161.35.26.171 port 46338 [preauth]
Jan  7 20:59:13 host sshd[23631]: Invalid user wusifan from 161.35.26.171 port 40912
Jan  7 20:59:13 host sshd[23631]: input_userauth_request: invalid user wusifan [preauth]
Jan  7 20:59:13 host sshd[23631]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 20:59:13 host sshd[23631]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.26.171
Jan  7 20:59:14 host sshd[23631]: Failed password for invalid user wusifan from 161.35.26.171 port 40912 ssh2
Jan  7 20:59:14 host sshd[23631]: Received disconnect from 161.35.26.171 port 40912:11: Bye Bye [preauth]
Jan  7 20:59:14 host sshd[23631]: Disconnected from 161.35.26.171 port 40912 [preauth]
Jan  7 20:59:58 host sshd[23734]: Invalid user nagios from 195.226.194.142 port 55410
Jan  7 20:59:58 host sshd[23734]: input_userauth_request: invalid user nagios [preauth]
Jan  7 20:59:58 host sshd[23734]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 20:59:58 host sshd[23734]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.142
Jan  7 20:59:59 host sshd[23734]: Failed password for invalid user nagios from 195.226.194.142 port 55410 ssh2
Jan  7 21:00:00 host sshd[23734]: Received disconnect from 195.226.194.142 port 55410:11: Bye Bye [preauth]
Jan  7 21:00:00 host sshd[23734]: Disconnected from 195.226.194.142 port 55410 [preauth]
Jan  7 21:02:56 host sshd[24213]: Invalid user ax from 194.110.203.109 port 47930
Jan  7 21:02:56 host sshd[24213]: input_userauth_request: invalid user ax [preauth]
Jan  7 21:02:56 host sshd[24213]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 21:02:56 host sshd[24213]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109
Jan  7 21:02:58 host sshd[24213]: Failed password for invalid user ax from 194.110.203.109 port 47930 ssh2
Jan  7 21:03:01 host sshd[24213]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 21:03:04 host sshd[24213]: Failed password for invalid user ax from 194.110.203.109 port 47930 ssh2
Jan  7 21:03:07 host sshd[24213]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 21:03:09 host sshd[24213]: Failed password for invalid user ax from 194.110.203.109 port 47930 ssh2
Jan  7 21:03:12 host sshd[24213]: Connection closed by 194.110.203.109 port 47930 [preauth]
Jan  7 21:03:12 host sshd[24213]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109
Jan  7 21:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  7 21:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 21:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 21:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  7 21:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 21:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 21:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  7 21:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 21:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 21:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  7 21:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 21:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 21:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  7 21:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 21:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 21:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  7 21:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 21:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 21:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  7 21:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 21:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 21:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  7 21:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 21:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 21:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  7 21:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 21:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 21:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  7 21:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 21:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 21:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  7 21:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 21:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 21:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  7 21:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 21:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 21:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  7 21:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 21:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 21:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkaretakers user-2=cochintaxi user-3=laundryboniface user-4=dartsimp user-5=a2zgroup user-6=wwwpmcresource user-7=ugotscom user-8=wwwrmswll user-9=wwwresourcehunte user-10=keralaholi user-11=travelboniface user-12=wwwkapin user-13=woodpeck user-14=wwwkmaorg user-15=disposeat user-16=remysagr user-17=pmcresources user-18=wwwtestugo user-19=shalinijames user-20=vfmassets user-21=straightcurve user-22=wwwletsstalkfood user-23=wwwevmhonda user-24=bonifacegroup user-25=wwwnexidigital user-26=mrsclean user-27=kottayamcalldriv user-28=phmetals user-29=gifterman user-30=palco123 feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  7 21:21:55 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  7 21:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 21:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 21:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  7 21:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 21:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 21:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-yCWILgsJuQXO5UEy.~
Jan  7 21:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 21:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 21:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-yCWILgsJuQXO5UEy.~'
Jan  7 21:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 21:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 21:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-yCWILgsJuQXO5UEy.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  7 21:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 21:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 21:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  7 21:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 21:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 21:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  7 21:21:56 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 21:21:56 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 21:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  7 21:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 21:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 21:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  7 21:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 21:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 21:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  7 21:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 21:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 21:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  7 21:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 21:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 21:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  7 21:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 21:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 21:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  7 21:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  7 21:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  7 21:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  7 21:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  7 21:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  7 21:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  7 21:22:01 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  7 21:22:02 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  7 21:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  7 21:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 21:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 21:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  7 21:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 21:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 21:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  7 21:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 21:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 21:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  7 21:22:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 21:22:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 21:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  7 21:22:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 21:22:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 21:29:53 host sshd[27887]: Invalid user zabbix from 195.226.194.242 port 20872
Jan  7 21:29:53 host sshd[27887]: input_userauth_request: invalid user zabbix [preauth]
Jan  7 21:29:54 host sshd[27887]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 21:29:54 host sshd[27887]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.242
Jan  7 21:29:56 host sshd[27887]: Failed password for invalid user zabbix from 195.226.194.242 port 20872 ssh2
Jan  7 21:29:56 host sshd[27887]: Received disconnect from 195.226.194.242 port 20872:11: Bye Bye [preauth]
Jan  7 21:29:56 host sshd[27887]: Disconnected from 195.226.194.242 port 20872 [preauth]
Jan  7 21:30:28 host sshd[28079]: Invalid user soksuser from 51.68.94.192 port 55532
Jan  7 21:30:28 host sshd[28079]: input_userauth_request: invalid user soksuser [preauth]
Jan  7 21:30:28 host sshd[28079]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 21:30:28 host sshd[28079]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.94.192
Jan  7 21:30:29 host sshd[28079]: Failed password for invalid user soksuser from 51.68.94.192 port 55532 ssh2
Jan  7 21:30:30 host sshd[28079]: Received disconnect from 51.68.94.192 port 55532:11: Bye Bye [preauth]
Jan  7 21:30:30 host sshd[28079]: Disconnected from 51.68.94.192 port 55532 [preauth]
Jan  7 21:31:33 host sshd[28190]: Invalid user hyl from 142.93.225.189 port 45186
Jan  7 21:31:33 host sshd[28190]: input_userauth_request: invalid user hyl [preauth]
Jan  7 21:31:33 host sshd[28190]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 21:31:33 host sshd[28190]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.225.189
Jan  7 21:31:34 host sshd[28190]: Failed password for invalid user hyl from 142.93.225.189 port 45186 ssh2
Jan  7 21:31:35 host sshd[28190]: Received disconnect from 142.93.225.189 port 45186:11: Bye Bye [preauth]
Jan  7 21:31:35 host sshd[28190]: Disconnected from 142.93.225.189 port 45186 [preauth]
Jan  7 21:31:58 host sshd[28226]: Invalid user ipc from 203.199.243.12 port 41858
Jan  7 21:31:58 host sshd[28226]: input_userauth_request: invalid user ipc [preauth]
Jan  7 21:31:58 host sshd[28226]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 21:31:58 host sshd[28226]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.199.243.12
Jan  7 21:32:00 host sshd[28226]: Failed password for invalid user ipc from 203.199.243.12 port 41858 ssh2
Jan  7 21:32:00 host sshd[28226]: Received disconnect from 203.199.243.12 port 41858:11: Bye Bye [preauth]
Jan  7 21:32:00 host sshd[28226]: Disconnected from 203.199.243.12 port 41858 [preauth]
Jan  7 21:32:02 host sshd[28237]: Invalid user puneet from 45.232.73.83 port 32798
Jan  7 21:32:02 host sshd[28237]: input_userauth_request: invalid user puneet [preauth]
Jan  7 21:32:02 host sshd[28237]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 21:32:02 host sshd[28237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.232.73.83
Jan  7 21:32:04 host sshd[28237]: Failed password for invalid user puneet from 45.232.73.83 port 32798 ssh2
Jan  7 21:32:04 host sshd[28237]: Received disconnect from 45.232.73.83 port 32798:11: Bye Bye [preauth]
Jan  7 21:32:04 host sshd[28237]: Disconnected from 45.232.73.83 port 32798 [preauth]
Jan  7 21:34:51 host sshd[28581]: Invalid user olga from 218.253.66.74 port 60308
Jan  7 21:34:51 host sshd[28581]: input_userauth_request: invalid user olga [preauth]
Jan  7 21:34:51 host sshd[28581]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 21:34:51 host sshd[28581]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.253.66.74
Jan  7 21:34:51 host sshd[28578]: Invalid user player from 167.99.137.201 port 55528
Jan  7 21:34:51 host sshd[28578]: input_userauth_request: invalid user player [preauth]
Jan  7 21:34:51 host sshd[28578]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 21:34:51 host sshd[28578]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.137.201
Jan  7 21:34:53 host sshd[28581]: Failed password for invalid user olga from 218.253.66.74 port 60308 ssh2
Jan  7 21:34:53 host sshd[28578]: Failed password for invalid user player from 167.99.137.201 port 55528 ssh2
Jan  7 21:34:53 host sshd[28581]: Received disconnect from 218.253.66.74 port 60308:11: Bye Bye [preauth]
Jan  7 21:34:53 host sshd[28581]: Disconnected from 218.253.66.74 port 60308 [preauth]
Jan  7 21:34:53 host sshd[28578]: Received disconnect from 167.99.137.201 port 55528:11: Bye Bye [preauth]
Jan  7 21:34:53 host sshd[28578]: Disconnected from 167.99.137.201 port 55528 [preauth]
Jan  7 21:35:25 host sshd[28665]: Invalid user neusoft from 181.191.206.234 port 33154
Jan  7 21:35:25 host sshd[28665]: input_userauth_request: invalid user neusoft [preauth]
Jan  7 21:35:25 host sshd[28665]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 21:35:25 host sshd[28665]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.191.206.234
Jan  7 21:35:27 host sshd[28665]: Failed password for invalid user neusoft from 181.191.206.234 port 33154 ssh2
Jan  7 21:35:28 host sshd[28665]: Received disconnect from 181.191.206.234 port 33154:11: Bye Bye [preauth]
Jan  7 21:35:28 host sshd[28665]: Disconnected from 181.191.206.234 port 33154 [preauth]
Jan  7 21:35:30 host sshd[28694]: Invalid user sshtest from 213.108.200.11 port 49782
Jan  7 21:35:30 host sshd[28694]: input_userauth_request: invalid user sshtest [preauth]
Jan  7 21:35:30 host sshd[28694]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 21:35:30 host sshd[28694]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.108.200.11
Jan  7 21:35:33 host sshd[28694]: Failed password for invalid user sshtest from 213.108.200.11 port 49782 ssh2
Jan  7 21:35:33 host sshd[28694]: Received disconnect from 213.108.200.11 port 49782:11: Bye Bye [preauth]
Jan  7 21:35:33 host sshd[28694]: Disconnected from 213.108.200.11 port 49782 [preauth]
Jan  7 21:35:35 host sshd[28768]: Invalid user ai from 20.124.255.250 port 44258
Jan  7 21:35:35 host sshd[28768]: input_userauth_request: invalid user ai [preauth]
Jan  7 21:35:35 host sshd[28768]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 21:35:35 host sshd[28768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.124.255.250
Jan  7 21:35:35 host sshd[28778]: Invalid user boris from 198.50.173.145 port 47312
Jan  7 21:35:35 host sshd[28778]: input_userauth_request: invalid user boris [preauth]
Jan  7 21:35:35 host sshd[28778]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 21:35:35 host sshd[28778]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.50.173.145
Jan  7 21:35:37 host sshd[28768]: Failed password for invalid user ai from 20.124.255.250 port 44258 ssh2
Jan  7 21:35:38 host sshd[28768]: Received disconnect from 20.124.255.250 port 44258:11: Bye Bye [preauth]
Jan  7 21:35:38 host sshd[28768]: Disconnected from 20.124.255.250 port 44258 [preauth]
Jan  7 21:35:38 host sshd[28778]: Failed password for invalid user boris from 198.50.173.145 port 47312 ssh2
Jan  7 21:35:38 host sshd[28778]: Received disconnect from 198.50.173.145 port 47312:11: Bye Bye [preauth]
Jan  7 21:35:38 host sshd[28778]: Disconnected from 198.50.173.145 port 47312 [preauth]
Jan  7 21:35:39 host sshd[28817]: Invalid user sys from 45.163.144.2 port 55186
Jan  7 21:35:39 host sshd[28817]: input_userauth_request: invalid user sys [preauth]
Jan  7 21:35:40 host sshd[28817]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 21:35:40 host sshd[28817]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.163.144.2
Jan  7 21:35:42 host sshd[28817]: Failed password for invalid user sys from 45.163.144.2 port 55186 ssh2
Jan  7 21:35:42 host sshd[28817]: Received disconnect from 45.163.144.2 port 55186:11: Bye Bye [preauth]
Jan  7 21:35:42 host sshd[28817]: Disconnected from 45.163.144.2 port 55186 [preauth]
Jan  7 21:36:39 host sshd[28931]: Invalid user uno from 45.232.73.83 port 50420
Jan  7 21:36:39 host sshd[28931]: input_userauth_request: invalid user uno [preauth]
Jan  7 21:36:39 host sshd[28931]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 21:36:39 host sshd[28931]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.232.73.83
Jan  7 21:36:41 host sshd[28931]: Failed password for invalid user uno from 45.232.73.83 port 50420 ssh2
Jan  7 21:36:42 host sshd[28931]: Received disconnect from 45.232.73.83 port 50420:11: Bye Bye [preauth]
Jan  7 21:36:42 host sshd[28931]: Disconnected from 45.232.73.83 port 50420 [preauth]
Jan  7 21:36:44 host sshd[28940]: Invalid user eki from 142.93.225.189 port 43878
Jan  7 21:36:44 host sshd[28940]: input_userauth_request: invalid user eki [preauth]
Jan  7 21:36:44 host sshd[28940]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 21:36:44 host sshd[28940]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.225.189
Jan  7 21:36:46 host sshd[28940]: Failed password for invalid user eki from 142.93.225.189 port 43878 ssh2
Jan  7 21:36:47 host sshd[28940]: Received disconnect from 142.93.225.189 port 43878:11: Bye Bye [preauth]
Jan  7 21:36:47 host sshd[28940]: Disconnected from 142.93.225.189 port 43878 [preauth]
Jan  7 21:37:06 host sshd[28980]: Invalid user mesut from 51.68.94.192 port 33434
Jan  7 21:37:06 host sshd[28980]: input_userauth_request: invalid user mesut [preauth]
Jan  7 21:37:06 host sshd[28980]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 21:37:06 host sshd[28980]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.94.192
Jan  7 21:37:07 host sshd[28980]: Failed password for invalid user mesut from 51.68.94.192 port 33434 ssh2
Jan  7 21:37:08 host sshd[28980]: Received disconnect from 51.68.94.192 port 33434:11: Bye Bye [preauth]
Jan  7 21:37:08 host sshd[28980]: Disconnected from 51.68.94.192 port 33434 [preauth]
Jan  7 21:37:10 host sshd[28986]: Invalid user neusoft from 198.50.173.145 port 49474
Jan  7 21:37:10 host sshd[28986]: input_userauth_request: invalid user neusoft [preauth]
Jan  7 21:37:10 host sshd[28986]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 21:37:10 host sshd[28986]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.50.173.145
Jan  7 21:37:13 host sshd[28986]: Failed password for invalid user neusoft from 198.50.173.145 port 49474 ssh2
Jan  7 21:37:13 host sshd[28986]: Received disconnect from 198.50.173.145 port 49474:11: Bye Bye [preauth]
Jan  7 21:37:13 host sshd[28986]: Disconnected from 198.50.173.145 port 49474 [preauth]
Jan  7 21:37:50 host sshd[29062]: Invalid user olga from 45.232.73.83 port 37598
Jan  7 21:37:50 host sshd[29062]: input_userauth_request: invalid user olga [preauth]
Jan  7 21:37:50 host sshd[29062]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 21:37:50 host sshd[29062]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.232.73.83
Jan  7 21:37:50 host sshd[29065]: Invalid user tk from 167.99.137.201 port 33166
Jan  7 21:37:50 host sshd[29065]: input_userauth_request: invalid user tk [preauth]
Jan  7 21:37:50 host sshd[29065]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 21:37:50 host sshd[29065]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.137.201
Jan  7 21:37:51 host sshd[29062]: Failed password for invalid user olga from 45.232.73.83 port 37598 ssh2
Jan  7 21:37:52 host sshd[29062]: Received disconnect from 45.232.73.83 port 37598:11: Bye Bye [preauth]
Jan  7 21:37:52 host sshd[29062]: Disconnected from 45.232.73.83 port 37598 [preauth]
Jan  7 21:37:52 host sshd[29065]: Failed password for invalid user tk from 167.99.137.201 port 33166 ssh2
Jan  7 21:37:52 host sshd[29065]: Received disconnect from 167.99.137.201 port 33166:11: Bye Bye [preauth]
Jan  7 21:37:52 host sshd[29065]: Disconnected from 167.99.137.201 port 33166 [preauth]
Jan  7 21:37:54 host sshd[29070]: Invalid user rouser from 142.93.225.189 port 42882
Jan  7 21:37:54 host sshd[29070]: input_userauth_request: invalid user rouser [preauth]
Jan  7 21:37:54 host sshd[29070]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 21:37:54 host sshd[29070]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.225.189
Jan  7 21:37:56 host sshd[29070]: Failed password for invalid user rouser from 142.93.225.189 port 42882 ssh2
Jan  7 21:37:56 host sshd[29070]: Received disconnect from 142.93.225.189 port 42882:11: Bye Bye [preauth]
Jan  7 21:37:56 host sshd[29070]: Disconnected from 142.93.225.189 port 42882 [preauth]
Jan  7 21:38:00 host sshd[29107]: Invalid user gilad from 45.163.144.2 port 60066
Jan  7 21:38:00 host sshd[29107]: input_userauth_request: invalid user gilad [preauth]
Jan  7 21:38:00 host sshd[29107]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 21:38:00 host sshd[29107]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.163.144.2
Jan  7 21:38:02 host sshd[29107]: Failed password for invalid user gilad from 45.163.144.2 port 60066 ssh2
Jan  7 21:38:02 host sshd[29107]: Received disconnect from 45.163.144.2 port 60066:11: Bye Bye [preauth]
Jan  7 21:38:02 host sshd[29107]: Disconnected from 45.163.144.2 port 60066 [preauth]
Jan  7 21:38:06 host sshd[29160]: Invalid user eki from 51.68.94.192 port 56458
Jan  7 21:38:06 host sshd[29160]: input_userauth_request: invalid user eki [preauth]
Jan  7 21:38:06 host sshd[29160]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 21:38:06 host sshd[29160]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.94.192
Jan  7 21:38:09 host sshd[29160]: Failed password for invalid user eki from 51.68.94.192 port 56458 ssh2
Jan  7 21:38:09 host sshd[29160]: Received disconnect from 51.68.94.192 port 56458:11: Bye Bye [preauth]
Jan  7 21:38:09 host sshd[29160]: Disconnected from 51.68.94.192 port 56458 [preauth]
Jan  7 21:38:16 host sshd[29202]: Invalid user xys from 198.50.173.145 port 48836
Jan  7 21:38:16 host sshd[29202]: input_userauth_request: invalid user xys [preauth]
Jan  7 21:38:16 host sshd[29202]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 21:38:16 host sshd[29202]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.50.173.145
Jan  7 21:38:18 host sshd[29202]: Failed password for invalid user xys from 198.50.173.145 port 48836 ssh2
Jan  7 21:38:18 host sshd[29202]: Received disconnect from 198.50.173.145 port 48836:11: Bye Bye [preauth]
Jan  7 21:38:18 host sshd[29202]: Disconnected from 198.50.173.145 port 48836 [preauth]
Jan  7 21:38:23 host sshd[29253]: Invalid user ga from 203.199.243.12 port 38940
Jan  7 21:38:23 host sshd[29253]: input_userauth_request: invalid user ga [preauth]
Jan  7 21:38:23 host sshd[29253]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 21:38:23 host sshd[29253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.199.243.12
Jan  7 21:38:23 host sshd[29251]: Invalid user xuhao from 20.124.255.250 port 21902
Jan  7 21:38:23 host sshd[29251]: input_userauth_request: invalid user xuhao [preauth]
Jan  7 21:38:23 host sshd[29251]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 21:38:23 host sshd[29251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.124.255.250
Jan  7 21:38:23 host sshd[29255]: Invalid user neusoft from 213.108.200.11 port 58692
Jan  7 21:38:23 host sshd[29255]: input_userauth_request: invalid user neusoft [preauth]
Jan  7 21:38:23 host sshd[29255]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 21:38:23 host sshd[29255]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.108.200.11
Jan  7 21:38:25 host sshd[29253]: Failed password for invalid user ga from 203.199.243.12 port 38940 ssh2
Jan  7 21:38:25 host sshd[29253]: Received disconnect from 203.199.243.12 port 38940:11: Bye Bye [preauth]
Jan  7 21:38:25 host sshd[29253]: Disconnected from 203.199.243.12 port 38940 [preauth]
Jan  7 21:38:25 host sshd[29251]: Failed password for invalid user xuhao from 20.124.255.250 port 21902 ssh2
Jan  7 21:38:25 host sshd[29251]: Received disconnect from 20.124.255.250 port 21902:11: Bye Bye [preauth]
Jan  7 21:38:25 host sshd[29251]: Disconnected from 20.124.255.250 port 21902 [preauth]
Jan  7 21:38:25 host sshd[29255]: Failed password for invalid user neusoft from 213.108.200.11 port 58692 ssh2
Jan  7 21:38:25 host sshd[29255]: Received disconnect from 213.108.200.11 port 58692:11: Bye Bye [preauth]
Jan  7 21:38:25 host sshd[29255]: Disconnected from 213.108.200.11 port 58692 [preauth]
Jan  7 21:38:31 host sshd[29285]: Invalid user mani from 181.191.206.234 port 38780
Jan  7 21:38:31 host sshd[29285]: input_userauth_request: invalid user mani [preauth]
Jan  7 21:38:31 host sshd[29285]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 21:38:31 host sshd[29285]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.191.206.234
Jan  7 21:38:33 host sshd[29285]: Failed password for invalid user mani from 181.191.206.234 port 38780 ssh2
Jan  7 21:38:33 host sshd[29285]: Received disconnect from 181.191.206.234 port 38780:11: Bye Bye [preauth]
Jan  7 21:38:33 host sshd[29285]: Disconnected from 181.191.206.234 port 38780 [preauth]
Jan  7 21:38:48 host sshd[29307]: Invalid user reporter from 167.99.137.201 port 33530
Jan  7 21:38:48 host sshd[29307]: input_userauth_request: invalid user reporter [preauth]
Jan  7 21:38:48 host sshd[29307]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 21:38:48 host sshd[29307]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.137.201
Jan  7 21:38:50 host sshd[29307]: Failed password for invalid user reporter from 167.99.137.201 port 33530 ssh2
Jan  7 21:39:25 host sshd[29408]: Invalid user liz from 20.124.255.250 port 45056
Jan  7 21:39:25 host sshd[29408]: input_userauth_request: invalid user liz [preauth]
Jan  7 21:39:25 host sshd[29408]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 21:39:25 host sshd[29408]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.124.255.250
Jan  7 21:39:27 host sshd[29408]: Failed password for invalid user liz from 20.124.255.250 port 45056 ssh2
Jan  7 21:39:27 host sshd[29408]: Received disconnect from 20.124.255.250 port 45056:11: Bye Bye [preauth]
Jan  7 21:39:27 host sshd[29408]: Disconnected from 20.124.255.250 port 45056 [preauth]
Jan  7 21:39:28 host sshd[29435]: Invalid user financeiro from 218.253.66.74 port 44078
Jan  7 21:39:28 host sshd[29435]: input_userauth_request: invalid user financeiro [preauth]
Jan  7 21:39:28 host sshd[29435]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 21:39:28 host sshd[29435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.253.66.74
Jan  7 21:39:30 host sshd[29435]: Failed password for invalid user financeiro from 218.253.66.74 port 44078 ssh2
Jan  7 21:39:30 host sshd[29435]: Received disconnect from 218.253.66.74 port 44078:11: Bye Bye [preauth]
Jan  7 21:39:30 host sshd[29435]: Disconnected from 218.253.66.74 port 44078 [preauth]
Jan  7 21:39:30 host sshd[29441]: Invalid user soksuser from 213.108.200.11 port 53402
Jan  7 21:39:30 host sshd[29441]: input_userauth_request: invalid user soksuser [preauth]
Jan  7 21:39:30 host sshd[29441]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 21:39:30 host sshd[29441]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.108.200.11
Jan  7 21:39:32 host sshd[29441]: Failed password for invalid user soksuser from 213.108.200.11 port 53402 ssh2
Jan  7 21:39:33 host sshd[29441]: Received disconnect from 213.108.200.11 port 53402:11: Bye Bye [preauth]
Jan  7 21:39:33 host sshd[29441]: Disconnected from 213.108.200.11 port 53402 [preauth]
Jan  7 21:39:37 host sshd[29511]: Invalid user hyl from 45.163.144.2 port 59108
Jan  7 21:39:37 host sshd[29511]: input_userauth_request: invalid user hyl [preauth]
Jan  7 21:39:37 host sshd[29511]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 21:39:37 host sshd[29511]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.163.144.2
Jan  7 21:39:39 host sshd[29511]: Failed password for invalid user hyl from 45.163.144.2 port 59108 ssh2
Jan  7 21:39:39 host sshd[29511]: Received disconnect from 45.163.144.2 port 59108:11: Bye Bye [preauth]
Jan  7 21:39:39 host sshd[29511]: Disconnected from 45.163.144.2 port 59108 [preauth]
Jan  7 21:39:48 host sshd[29554]: Invalid user eki from 181.191.206.234 port 32944
Jan  7 21:39:48 host sshd[29554]: input_userauth_request: invalid user eki [preauth]
Jan  7 21:39:48 host sshd[29554]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 21:39:48 host sshd[29554]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.191.206.234
Jan  7 21:39:50 host sshd[29554]: Failed password for invalid user eki from 181.191.206.234 port 32944 ssh2
Jan  7 21:39:56 host sshd[29594]: Invalid user tiantian from 203.199.243.12 port 33696
Jan  7 21:39:56 host sshd[29594]: input_userauth_request: invalid user tiantian [preauth]
Jan  7 21:39:56 host sshd[29594]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 21:39:56 host sshd[29594]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.199.243.12
Jan  7 21:39:58 host sshd[29594]: Failed password for invalid user tiantian from 203.199.243.12 port 33696 ssh2
Jan  7 21:39:58 host sshd[29594]: Received disconnect from 203.199.243.12 port 33696:11: Bye Bye [preauth]
Jan  7 21:39:58 host sshd[29594]: Disconnected from 203.199.243.12 port 33696 [preauth]
Jan  7 21:41:11 host sshd[29875]: Invalid user valli from 218.253.66.74 port 38070
Jan  7 21:41:11 host sshd[29875]: input_userauth_request: invalid user valli [preauth]
Jan  7 21:41:11 host sshd[29875]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 21:41:11 host sshd[29875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.253.66.74
Jan  7 21:41:13 host sshd[29875]: Failed password for invalid user valli from 218.253.66.74 port 38070 ssh2
Jan  7 21:41:13 host sshd[29875]: Received disconnect from 218.253.66.74 port 38070:11: Bye Bye [preauth]
Jan  7 21:41:13 host sshd[29875]: Disconnected from 218.253.66.74 port 38070 [preauth]
Jan  7 21:45:27 host sshd[30434]: Did not receive identification string from 167.71.166.243 port 37248
Jan  7 21:47:14 host sshd[30700]: Did not receive identification string from 87.236.176.35 port 36097
Jan  7 21:47:15 host sshd[30704]: Connection closed by 87.236.176.35 port 43819 [preauth]
Jan  7 21:47:35 host sshd[30749]: Connection closed by 167.71.166.243 port 36452 [preauth]
Jan  7 21:58:04 host sshd[32120]: User root from 195.226.194.142 not allowed because not listed in AllowUsers
Jan  7 21:58:04 host sshd[32120]: input_userauth_request: invalid user root [preauth]
Jan  7 21:58:05 host unix_chkpwd[32123]: password check failed for user (root)
Jan  7 21:58:05 host sshd[32120]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.142  user=root
Jan  7 21:58:05 host sshd[32120]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 21:58:07 host sshd[32120]: Failed password for invalid user root from 195.226.194.142 port 63146 ssh2
Jan  7 21:58:07 host sshd[32120]: Received disconnect from 195.226.194.142 port 63146:11: Bye Bye [preauth]
Jan  7 21:58:07 host sshd[32120]: Disconnected from 195.226.194.142 port 63146 [preauth]
Jan  7 22:03:23 host sshd[385]: Connection reset by 205.210.31.18 port 62618 [preauth]
Jan  7 22:16:15 host sshd[2127]: Invalid user zxl from 165.22.223.41 port 49084
Jan  7 22:16:15 host sshd[2127]: input_userauth_request: invalid user zxl [preauth]
Jan  7 22:16:15 host sshd[2127]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 22:16:15 host sshd[2127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.223.41
Jan  7 22:16:17 host sshd[2127]: Failed password for invalid user zxl from 165.22.223.41 port 49084 ssh2
Jan  7 22:16:17 host sshd[2127]: Received disconnect from 165.22.223.41 port 49084:11: Bye Bye [preauth]
Jan  7 22:16:17 host sshd[2127]: Disconnected from 165.22.223.41 port 49084 [preauth]
Jan  7 22:17:05 host sshd[2224]: Invalid user den from 164.92.81.10 port 38318
Jan  7 22:17:05 host sshd[2224]: input_userauth_request: invalid user den [preauth]
Jan  7 22:17:05 host sshd[2224]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 22:17:05 host sshd[2224]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.81.10
Jan  7 22:17:08 host sshd[2224]: Failed password for invalid user den from 164.92.81.10 port 38318 ssh2
Jan  7 22:17:08 host sshd[2224]: Received disconnect from 164.92.81.10 port 38318:11: Bye Bye [preauth]
Jan  7 22:17:08 host sshd[2224]: Disconnected from 164.92.81.10 port 38318 [preauth]
Jan  7 22:17:22 host sshd[2251]: Invalid user xor from 223.177.186.113 port 52678
Jan  7 22:17:22 host sshd[2251]: input_userauth_request: invalid user xor [preauth]
Jan  7 22:17:22 host sshd[2251]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 22:17:22 host sshd[2251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.177.186.113
Jan  7 22:17:23 host sshd[2251]: Failed password for invalid user xor from 223.177.186.113 port 52678 ssh2
Jan  7 22:17:24 host sshd[2251]: Received disconnect from 223.177.186.113 port 52678:11: Bye Bye [preauth]
Jan  7 22:17:24 host sshd[2251]: Disconnected from 223.177.186.113 port 52678 [preauth]
Jan  7 22:17:27 host sshd[2259]: Invalid user wth from 212.29.234.241 port 55968
Jan  7 22:17:27 host sshd[2259]: input_userauth_request: invalid user wth [preauth]
Jan  7 22:17:27 host sshd[2259]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 22:17:27 host sshd[2259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.29.234.241
Jan  7 22:17:30 host sshd[2259]: Failed password for invalid user wth from 212.29.234.241 port 55968 ssh2
Jan  7 22:17:30 host sshd[2259]: Received disconnect from 212.29.234.241 port 55968:11: Bye Bye [preauth]
Jan  7 22:17:30 host sshd[2259]: Disconnected from 212.29.234.241 port 55968 [preauth]
Jan  7 22:18:09 host sshd[2368]: Invalid user vapor from 51.250.13.75 port 40002
Jan  7 22:18:09 host sshd[2368]: input_userauth_request: invalid user vapor [preauth]
Jan  7 22:18:09 host sshd[2368]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 22:18:09 host sshd[2368]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.250.13.75
Jan  7 22:18:11 host sshd[2368]: Failed password for invalid user vapor from 51.250.13.75 port 40002 ssh2
Jan  7 22:18:11 host sshd[2368]: Received disconnect from 51.250.13.75 port 40002:11: Bye Bye [preauth]
Jan  7 22:18:11 host sshd[2368]: Disconnected from 51.250.13.75 port 40002 [preauth]
Jan  7 22:18:25 host sshd[2463]: Invalid user ajmal from 40.70.0.187 port 49528
Jan  7 22:18:25 host sshd[2463]: input_userauth_request: invalid user ajmal [preauth]
Jan  7 22:18:25 host sshd[2463]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 22:18:25 host sshd[2463]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.70.0.187
Jan  7 22:18:27 host sshd[2463]: Failed password for invalid user ajmal from 40.70.0.187 port 49528 ssh2
Jan  7 22:18:27 host sshd[2463]: Received disconnect from 40.70.0.187 port 49528:11: Bye Bye [preauth]
Jan  7 22:18:27 host sshd[2463]: Disconnected from 40.70.0.187 port 49528 [preauth]
Jan  7 22:19:39 host sshd[2595]: Invalid user ftpsecure from 144.217.243.126 port 35160
Jan  7 22:19:39 host sshd[2595]: input_userauth_request: invalid user ftpsecure [preauth]
Jan  7 22:19:39 host sshd[2595]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 22:19:39 host sshd[2595]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.243.126
Jan  7 22:19:40 host sshd[2595]: Failed password for invalid user ftpsecure from 144.217.243.126 port 35160 ssh2
Jan  7 22:19:41 host sshd[2595]: Received disconnect from 144.217.243.126 port 35160:11: Bye Bye [preauth]
Jan  7 22:19:41 host sshd[2595]: Disconnected from 144.217.243.126 port 35160 [preauth]
Jan  7 22:20:53 host sshd[2763]: Invalid user lab5 from 104.236.78.19 port 43446
Jan  7 22:20:53 host sshd[2763]: input_userauth_request: invalid user lab5 [preauth]
Jan  7 22:20:53 host sshd[2763]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 22:20:53 host sshd[2763]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.78.19
Jan  7 22:20:55 host sshd[2763]: Failed password for invalid user lab5 from 104.236.78.19 port 43446 ssh2
Jan  7 22:20:56 host sshd[2763]: Received disconnect from 104.236.78.19 port 43446:11: Bye Bye [preauth]
Jan  7 22:20:56 host sshd[2763]: Disconnected from 104.236.78.19 port 43446 [preauth]
Jan  7 22:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  7 22:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 22:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 22:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  7 22:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 22:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 22:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  7 22:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 22:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 22:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  7 22:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 22:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 22:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  7 22:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 22:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 22:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  7 22:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 22:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 22:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  7 22:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 22:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 22:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  7 22:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 22:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 22:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  7 22:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 22:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 22:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  7 22:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 22:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 22:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  7 22:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 22:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 22:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  7 22:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 22:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 22:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  7 22:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 22:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 22:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkaretakers user-2=cochintaxi user-3=dartsimp user-4=a2zgroup user-5=laundryboniface user-6=wwwpmcresource user-7=travelboniface user-8=wwwrmswll user-9=wwwresourcehunte user-10=keralaholi user-11=ugotscom user-12=wwwkmaorg user-13=remysagr user-14=disposeat user-15=wwwkapin user-16=woodpeck user-17=vfmassets user-18=wwwtestugo user-19=shalinijames user-20=pmcresources user-21=bonifacegroup user-22=wwwevmhonda user-23=straightcurve user-24=wwwletsstalkfood user-25=gifterman user-26=palco123 user-27=kottayamcalldriv user-28=phmetals user-29=wwwnexidigital user-30=mrsclean feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  7 22:21:55 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  7 22:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 22:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 22:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  7 22:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 22:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 22:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-JrqGyOVf81TuQ7nI.~
Jan  7 22:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 22:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 22:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-JrqGyOVf81TuQ7nI.~'
Jan  7 22:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 22:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 22:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-JrqGyOVf81TuQ7nI.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  7 22:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 22:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 22:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  7 22:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 22:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 22:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  7 22:21:55 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 22:21:55 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 22:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  7 22:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 22:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 22:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  7 22:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 22:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 22:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  7 22:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 22:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 22:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  7 22:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 22:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 22:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  7 22:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 22:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 22:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  7 22:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  7 22:21:59 host sshd[3026]: Invalid user techadmin from 79.3.19.34 port 52714
Jan  7 22:21:59 host sshd[3026]: input_userauth_request: invalid user techadmin [preauth]
Jan  7 22:21:59 host sshd[3026]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 22:21:59 host sshd[3026]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.3.19.34
Jan  7 22:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  7 22:22:01 host sshd[3026]: Failed password for invalid user techadmin from 79.3.19.34 port 52714 ssh2
Jan  7 22:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  7 22:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  7 22:22:01 host sshd[3026]: Received disconnect from 79.3.19.34 port 52714:11: Bye Bye [preauth]
Jan  7 22:22:01 host sshd[3026]: Disconnected from 79.3.19.34 port 52714 [preauth]
Jan  7 22:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  7 22:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  7 22:22:03 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  7 22:22:05 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  7 22:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  7 22:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 22:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 22:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  7 22:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 22:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 22:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  7 22:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 22:22:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 22:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  7 22:22:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 22:22:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 22:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  7 22:22:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 22:22:17 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 22:22:25 host sshd[3147]: Invalid user den from 40.70.0.187 port 36516
Jan  7 22:22:25 host sshd[3147]: input_userauth_request: invalid user den [preauth]
Jan  7 22:22:25 host sshd[3147]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 22:22:25 host sshd[3147]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.70.0.187
Jan  7 22:22:27 host sshd[3147]: Failed password for invalid user den from 40.70.0.187 port 36516 ssh2
Jan  7 22:22:27 host sshd[3147]: Received disconnect from 40.70.0.187 port 36516:11: Bye Bye [preauth]
Jan  7 22:22:27 host sshd[3147]: Disconnected from 40.70.0.187 port 36516 [preauth]
Jan  7 22:22:30 host sshd[3176]: Invalid user zkh from 144.217.243.126 port 59550
Jan  7 22:22:30 host sshd[3176]: input_userauth_request: invalid user zkh [preauth]
Jan  7 22:22:30 host sshd[3176]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 22:22:30 host sshd[3176]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.243.126
Jan  7 22:22:32 host sshd[3176]: Failed password for invalid user zkh from 144.217.243.126 port 59550 ssh2
Jan  7 22:22:32 host sshd[3176]: Received disconnect from 144.217.243.126 port 59550:11: Bye Bye [preauth]
Jan  7 22:22:32 host sshd[3176]: Disconnected from 144.217.243.126 port 59550 [preauth]
Jan  7 22:22:54 host sshd[3200]: Invalid user yclin from 104.236.78.19 port 47784
Jan  7 22:22:54 host sshd[3200]: input_userauth_request: invalid user yclin [preauth]
Jan  7 22:22:54 host sshd[3200]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 22:22:54 host sshd[3200]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.78.19
Jan  7 22:22:56 host sshd[3200]: Failed password for invalid user yclin from 104.236.78.19 port 47784 ssh2
Jan  7 22:22:56 host sshd[3200]: Received disconnect from 104.236.78.19 port 47784:11: Bye Bye [preauth]
Jan  7 22:22:56 host sshd[3200]: Disconnected from 104.236.78.19 port 47784 [preauth]
Jan  7 22:23:03 host sshd[3230]: Invalid user ceo from 164.92.81.10 port 33534
Jan  7 22:23:03 host sshd[3230]: input_userauth_request: invalid user ceo [preauth]
Jan  7 22:23:03 host sshd[3230]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 22:23:03 host sshd[3230]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.81.10
Jan  7 22:23:05 host sshd[3230]: Failed password for invalid user ceo from 164.92.81.10 port 33534 ssh2
Jan  7 22:23:05 host sshd[3230]: Received disconnect from 164.92.81.10 port 33534:11: Bye Bye [preauth]
Jan  7 22:23:05 host sshd[3230]: Disconnected from 164.92.81.10 port 33534 [preauth]
Jan  7 22:23:08 host sshd[3239]: Invalid user gcp from 165.22.223.41 port 59804
Jan  7 22:23:08 host sshd[3239]: input_userauth_request: invalid user gcp [preauth]
Jan  7 22:23:08 host sshd[3239]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 22:23:08 host sshd[3239]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.223.41
Jan  7 22:23:10 host sshd[3239]: Failed password for invalid user gcp from 165.22.223.41 port 59804 ssh2
Jan  7 22:23:10 host sshd[3239]: Received disconnect from 165.22.223.41 port 59804:11: Bye Bye [preauth]
Jan  7 22:23:10 host sshd[3239]: Disconnected from 165.22.223.41 port 59804 [preauth]
Jan  7 22:23:26 host sshd[3361]: Invalid user ceo from 51.250.13.75 port 33860
Jan  7 22:23:26 host sshd[3361]: input_userauth_request: invalid user ceo [preauth]
Jan  7 22:23:26 host sshd[3361]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 22:23:26 host sshd[3361]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.250.13.75
Jan  7 22:23:28 host sshd[3361]: Failed password for invalid user ceo from 51.250.13.75 port 33860 ssh2
Jan  7 22:23:28 host sshd[3361]: Received disconnect from 51.250.13.75 port 33860:11: Bye Bye [preauth]
Jan  7 22:23:28 host sshd[3361]: Disconnected from 51.250.13.75 port 33860 [preauth]
Jan  7 22:23:31 host sshd[3391]: Invalid user wzc from 40.70.0.187 port 43752
Jan  7 22:23:31 host sshd[3391]: input_userauth_request: invalid user wzc [preauth]
Jan  7 22:23:31 host sshd[3391]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 22:23:31 host sshd[3391]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.70.0.187
Jan  7 22:23:33 host sshd[3391]: Failed password for invalid user wzc from 40.70.0.187 port 43752 ssh2
Jan  7 22:23:33 host sshd[3391]: Received disconnect from 40.70.0.187 port 43752:11: Bye Bye [preauth]
Jan  7 22:23:33 host sshd[3391]: Disconnected from 40.70.0.187 port 43752 [preauth]
Jan  7 22:23:34 host sshd[3399]: Invalid user gretchen from 212.29.234.241 port 53504
Jan  7 22:23:34 host sshd[3399]: input_userauth_request: invalid user gretchen [preauth]
Jan  7 22:23:34 host sshd[3399]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 22:23:34 host sshd[3399]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.29.234.241
Jan  7 22:23:35 host sshd[3399]: Failed password for invalid user gretchen from 212.29.234.241 port 53504 ssh2
Jan  7 22:23:36 host sshd[3399]: Received disconnect from 212.29.234.241 port 53504:11: Bye Bye [preauth]
Jan  7 22:23:36 host sshd[3399]: Disconnected from 212.29.234.241 port 53504 [preauth]
Jan  7 22:23:37 host sshd[3404]: Invalid user yclin from 144.217.243.126 port 39414
Jan  7 22:23:37 host sshd[3404]: input_userauth_request: invalid user yclin [preauth]
Jan  7 22:23:37 host sshd[3404]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 22:23:37 host sshd[3404]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.243.126
Jan  7 22:23:39 host sshd[3404]: Failed password for invalid user yclin from 144.217.243.126 port 39414 ssh2
Jan  7 22:23:39 host sshd[3404]: Received disconnect from 144.217.243.126 port 39414:11: Bye Bye [preauth]
Jan  7 22:23:39 host sshd[3404]: Disconnected from 144.217.243.126 port 39414 [preauth]
Jan  7 22:23:40 host sshd[3452]: Invalid user wth from 223.177.186.113 port 51928
Jan  7 22:23:40 host sshd[3452]: input_userauth_request: invalid user wth [preauth]
Jan  7 22:23:40 host sshd[3452]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 22:23:40 host sshd[3452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.177.186.113
Jan  7 22:23:42 host sshd[3452]: Failed password for invalid user wth from 223.177.186.113 port 51928 ssh2
Jan  7 22:23:42 host sshd[3452]: Received disconnect from 223.177.186.113 port 51928:11: Bye Bye [preauth]
Jan  7 22:23:42 host sshd[3452]: Disconnected from 223.177.186.113 port 51928 [preauth]
Jan  7 22:23:56 host sshd[3506]: Invalid user mmk from 104.236.78.19 port 58370
Jan  7 22:23:56 host sshd[3506]: input_userauth_request: invalid user mmk [preauth]
Jan  7 22:23:56 host sshd[3506]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 22:23:56 host sshd[3506]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.78.19
Jan  7 22:23:58 host sshd[3506]: Failed password for invalid user mmk from 104.236.78.19 port 58370 ssh2
Jan  7 22:23:58 host sshd[3506]: Received disconnect from 104.236.78.19 port 58370:11: Bye Bye [preauth]
Jan  7 22:23:58 host sshd[3506]: Disconnected from 104.236.78.19 port 58370 [preauth]
Jan  7 22:24:09 host sshd[3568]: Invalid user gretchen from 164.92.81.10 port 50576
Jan  7 22:24:09 host sshd[3568]: input_userauth_request: invalid user gretchen [preauth]
Jan  7 22:24:09 host sshd[3568]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 22:24:09 host sshd[3568]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.81.10
Jan  7 22:24:11 host sshd[3568]: Failed password for invalid user gretchen from 164.92.81.10 port 50576 ssh2
Jan  7 22:24:11 host sshd[3568]: Received disconnect from 164.92.81.10 port 50576:11: Bye Bye [preauth]
Jan  7 22:24:11 host sshd[3568]: Disconnected from 164.92.81.10 port 50576 [preauth]
Jan  7 22:24:34 host sshd[3656]: Invalid user frederic from 51.250.13.75 port 56940
Jan  7 22:24:34 host sshd[3656]: input_userauth_request: invalid user frederic [preauth]
Jan  7 22:24:34 host sshd[3656]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 22:24:34 host sshd[3656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.250.13.75
Jan  7 22:24:36 host sshd[3664]: Invalid user application from 165.22.223.41 port 49220
Jan  7 22:24:36 host sshd[3664]: input_userauth_request: invalid user application [preauth]
Jan  7 22:24:36 host sshd[3664]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 22:24:36 host sshd[3664]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.223.41
Jan  7 22:24:36 host sshd[3656]: Failed password for invalid user frederic from 51.250.13.75 port 56940 ssh2
Jan  7 22:24:36 host sshd[3656]: Received disconnect from 51.250.13.75 port 56940:11: Bye Bye [preauth]
Jan  7 22:24:36 host sshd[3656]: Disconnected from 51.250.13.75 port 56940 [preauth]
Jan  7 22:24:38 host sshd[3664]: Failed password for invalid user application from 165.22.223.41 port 49220 ssh2
Jan  7 22:24:39 host sshd[3729]: Invalid user atualiza from 212.29.234.241 port 49620
Jan  7 22:24:39 host sshd[3729]: input_userauth_request: invalid user atualiza [preauth]
Jan  7 22:24:39 host sshd[3729]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 22:24:39 host sshd[3729]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.29.234.241
Jan  7 22:24:41 host sshd[3729]: Failed password for invalid user atualiza from 212.29.234.241 port 49620 ssh2
Jan  7 22:24:41 host sshd[3729]: Received disconnect from 212.29.234.241 port 49620:11: Bye Bye [preauth]
Jan  7 22:24:41 host sshd[3729]: Disconnected from 212.29.234.241 port 49620 [preauth]
Jan  7 22:25:00 host sshd[3790]: Invalid user xt from 223.177.186.113 port 46834
Jan  7 22:25:00 host sshd[3790]: input_userauth_request: invalid user xt [preauth]
Jan  7 22:25:00 host sshd[3790]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 22:25:00 host sshd[3790]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.177.186.113
Jan  7 22:25:02 host sshd[3790]: Failed password for invalid user xt from 223.177.186.113 port 46834 ssh2
Jan  7 22:26:15 host sshd[4019]: Did not receive identification string from 167.71.166.243 port 49828
Jan  7 22:28:38 host sshd[4410]: Invalid user ansible from 195.226.194.242 port 43734
Jan  7 22:28:38 host sshd[4410]: input_userauth_request: invalid user ansible [preauth]
Jan  7 22:28:38 host sshd[4410]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 22:28:38 host sshd[4410]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.242
Jan  7 22:28:40 host sshd[4410]: Failed password for invalid user ansible from 195.226.194.242 port 43734 ssh2
Jan  7 22:28:40 host sshd[4410]: Received disconnect from 195.226.194.242 port 43734:11: Bye Bye [preauth]
Jan  7 22:28:40 host sshd[4410]: Disconnected from 195.226.194.242 port 43734 [preauth]
Jan  7 22:29:24 host sshd[4482]: Invalid user library from 223.197.186.7 port 57556
Jan  7 22:29:24 host sshd[4482]: input_userauth_request: invalid user library [preauth]
Jan  7 22:29:24 host sshd[4482]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 22:29:24 host sshd[4482]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.197.186.7
Jan  7 22:29:26 host sshd[4482]: Failed password for invalid user library from 223.197.186.7 port 57556 ssh2
Jan  7 22:29:26 host sshd[4482]: Received disconnect from 223.197.186.7 port 57556:11: Bye Bye [preauth]
Jan  7 22:29:26 host sshd[4482]: Disconnected from 223.197.186.7 port 57556 [preauth]
Jan  7 22:29:26 host sshd[4487]: User root from 181.188.195.18 not allowed because not listed in AllowUsers
Jan  7 22:29:26 host sshd[4487]: input_userauth_request: invalid user root [preauth]
Jan  7 22:29:27 host unix_chkpwd[4491]: password check failed for user (root)
Jan  7 22:29:27 host sshd[4487]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.188.195.18  user=root
Jan  7 22:29:27 host sshd[4487]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 22:29:27 host sshd[4485]: User root from 189.35.82.41 not allowed because not listed in AllowUsers
Jan  7 22:29:27 host sshd[4485]: input_userauth_request: invalid user root [preauth]
Jan  7 22:29:27 host unix_chkpwd[4512]: password check failed for user (root)
Jan  7 22:29:27 host sshd[4485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.35.82.41  user=root
Jan  7 22:29:27 host sshd[4485]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 22:29:29 host sshd[4487]: Failed password for invalid user root from 181.188.195.18 port 53180 ssh2
Jan  7 22:29:29 host sshd[4485]: Failed password for invalid user root from 189.35.82.41 port 63752 ssh2
Jan  7 22:29:29 host sshd[4487]: Received disconnect from 181.188.195.18 port 53180:11: Bye Bye [preauth]
Jan  7 22:29:29 host sshd[4487]: Disconnected from 181.188.195.18 port 53180 [preauth]
Jan  7 22:29:29 host sshd[4485]: Received disconnect from 189.35.82.41 port 63752:11: Bye Bye [preauth]
Jan  7 22:29:29 host sshd[4485]: Disconnected from 189.35.82.41 port 63752 [preauth]
Jan  7 22:29:30 host sshd[4515]: User root from 23.94.0.113 not allowed because not listed in AllowUsers
Jan  7 22:29:30 host sshd[4515]: input_userauth_request: invalid user root [preauth]
Jan  7 22:29:30 host unix_chkpwd[4518]: password check failed for user (root)
Jan  7 22:29:30 host sshd[4515]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.94.0.113  user=root
Jan  7 22:29:30 host sshd[4515]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 22:29:32 host sshd[4515]: Failed password for invalid user root from 23.94.0.113 port 42894 ssh2
Jan  7 22:29:32 host sshd[4515]: Received disconnect from 23.94.0.113 port 42894:11: Bye Bye [preauth]
Jan  7 22:29:32 host sshd[4515]: Disconnected from 23.94.0.113 port 42894 [preauth]
Jan  7 22:29:49 host sshd[4537]: User root from 43.156.40.46 not allowed because not listed in AllowUsers
Jan  7 22:29:49 host sshd[4537]: input_userauth_request: invalid user root [preauth]
Jan  7 22:29:49 host unix_chkpwd[4539]: password check failed for user (root)
Jan  7 22:29:49 host sshd[4537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.40.46  user=root
Jan  7 22:29:49 host sshd[4537]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 22:29:51 host sshd[4537]: Failed password for invalid user root from 43.156.40.46 port 44056 ssh2
Jan  7 22:29:51 host sshd[4537]: Received disconnect from 43.156.40.46 port 44056:11: Bye Bye [preauth]
Jan  7 22:29:51 host sshd[4537]: Disconnected from 43.156.40.46 port 44056 [preauth]
Jan  7 22:30:20 host sshd[4599]: Invalid user bpadmin from 158.69.82.130 port 47818
Jan  7 22:30:20 host sshd[4599]: input_userauth_request: invalid user bpadmin [preauth]
Jan  7 22:30:20 host sshd[4599]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 22:30:20 host sshd[4599]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.82.130
Jan  7 22:30:22 host sshd[4599]: Failed password for invalid user bpadmin from 158.69.82.130 port 47818 ssh2
Jan  7 22:30:23 host sshd[4599]: Received disconnect from 158.69.82.130 port 47818:11: Bye Bye [preauth]
Jan  7 22:30:23 host sshd[4599]: Disconnected from 158.69.82.130 port 47818 [preauth]
Jan  7 22:30:31 host sshd[4635]: User root from 157.245.105.16 not allowed because not listed in AllowUsers
Jan  7 22:30:31 host sshd[4635]: input_userauth_request: invalid user root [preauth]
Jan  7 22:30:31 host unix_chkpwd[4637]: password check failed for user (root)
Jan  7 22:30:31 host sshd[4635]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.105.16  user=root
Jan  7 22:30:31 host sshd[4635]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 22:30:33 host sshd[4635]: Failed password for invalid user root from 157.245.105.16 port 45766 ssh2
Jan  7 22:30:33 host sshd[4635]: Received disconnect from 157.245.105.16 port 45766:11: Bye Bye [preauth]
Jan  7 22:30:33 host sshd[4635]: Disconnected from 157.245.105.16 port 45766 [preauth]
Jan  7 22:31:12 host sshd[4700]: User root from 41.174.126.94 not allowed because not listed in AllowUsers
Jan  7 22:31:12 host sshd[4700]: input_userauth_request: invalid user root [preauth]
Jan  7 22:31:12 host unix_chkpwd[4703]: password check failed for user (root)
Jan  7 22:31:12 host sshd[4700]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.174.126.94  user=root
Jan  7 22:31:12 host sshd[4700]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 22:31:13 host sshd[4700]: Failed password for invalid user root from 41.174.126.94 port 42646 ssh2
Jan  7 22:31:14 host sshd[4700]: Received disconnect from 41.174.126.94 port 42646:11: Bye Bye [preauth]
Jan  7 22:31:14 host sshd[4700]: Disconnected from 41.174.126.94 port 42646 [preauth]
Jan  7 22:31:42 host sshd[4763]: Invalid user mridul from 79.3.19.34 port 49432
Jan  7 22:31:42 host sshd[4763]: input_userauth_request: invalid user mridul [preauth]
Jan  7 22:31:42 host sshd[4763]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 22:31:42 host sshd[4763]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.3.19.34
Jan  7 22:31:44 host sshd[4763]: Failed password for invalid user mridul from 79.3.19.34 port 49432 ssh2
Jan  7 22:31:45 host sshd[4763]: Received disconnect from 79.3.19.34 port 49432:11: Bye Bye [preauth]
Jan  7 22:31:45 host sshd[4763]: Disconnected from 79.3.19.34 port 49432 [preauth]
Jan  7 22:32:48 host sshd[4918]: User root from 43.156.54.76 not allowed because not listed in AllowUsers
Jan  7 22:32:48 host sshd[4918]: input_userauth_request: invalid user root [preauth]
Jan  7 22:32:49 host unix_chkpwd[4920]: password check failed for user (root)
Jan  7 22:32:49 host sshd[4918]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.54.76  user=root
Jan  7 22:32:49 host sshd[4918]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 22:32:50 host sshd[4918]: Failed password for invalid user root from 43.156.54.76 port 54434 ssh2
Jan  7 22:32:50 host sshd[4918]: Received disconnect from 43.156.54.76 port 54434:11: Bye Bye [preauth]
Jan  7 22:32:50 host sshd[4918]: Disconnected from 43.156.54.76 port 54434 [preauth]
Jan  7 22:32:55 host sshd[4925]: User root from 164.92.148.64 not allowed because not listed in AllowUsers
Jan  7 22:32:55 host sshd[4925]: input_userauth_request: invalid user root [preauth]
Jan  7 22:32:55 host unix_chkpwd[4929]: password check failed for user (root)
Jan  7 22:32:55 host sshd[4925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.148.64  user=root
Jan  7 22:32:55 host sshd[4925]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 22:32:57 host sshd[4925]: Failed password for invalid user root from 164.92.148.64 port 60076 ssh2
Jan  7 22:32:58 host sshd[4925]: Received disconnect from 164.92.148.64 port 60076:11: Bye Bye [preauth]
Jan  7 22:32:58 host sshd[4925]: Disconnected from 164.92.148.64 port 60076 [preauth]
Jan  7 22:33:32 host sshd[5066]: Invalid user user1 from 74.94.234.151 port 40572
Jan  7 22:33:32 host sshd[5066]: input_userauth_request: invalid user user1 [preauth]
Jan  7 22:33:32 host sshd[5066]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 22:33:32 host sshd[5066]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.94.234.151
Jan  7 22:33:35 host sshd[5066]: Failed password for invalid user user1 from 74.94.234.151 port 40572 ssh2
Jan  7 22:33:35 host sshd[5066]: Received disconnect from 74.94.234.151 port 40572:11: Bye Bye [preauth]
Jan  7 22:33:35 host sshd[5066]: Disconnected from 74.94.234.151 port 40572 [preauth]
Jan  7 22:33:54 host sshd[5132]: Did not receive identification string from 92.255.85.115 port 27436
Jan  7 22:34:32 host sshd[5206]: User root from 23.94.0.113 not allowed because not listed in AllowUsers
Jan  7 22:34:32 host sshd[5206]: input_userauth_request: invalid user root [preauth]
Jan  7 22:34:32 host unix_chkpwd[5210]: password check failed for user (root)
Jan  7 22:34:32 host sshd[5206]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.94.0.113  user=root
Jan  7 22:34:32 host sshd[5206]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 22:34:34 host sshd[5206]: Failed password for invalid user root from 23.94.0.113 port 40402 ssh2
Jan  7 22:34:35 host sshd[5206]: Received disconnect from 23.94.0.113 port 40402:11: Bye Bye [preauth]
Jan  7 22:34:35 host sshd[5206]: Disconnected from 23.94.0.113 port 40402 [preauth]
Jan  7 22:34:47 host sshd[5260]: User root from 43.153.58.238 not allowed because not listed in AllowUsers
Jan  7 22:34:47 host sshd[5260]: input_userauth_request: invalid user root [preauth]
Jan  7 22:34:47 host unix_chkpwd[5263]: password check failed for user (root)
Jan  7 22:34:47 host sshd[5260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.58.238  user=root
Jan  7 22:34:47 host sshd[5260]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 22:34:47 host sshd[5258]: User root from 181.188.195.18 not allowed because not listed in AllowUsers
Jan  7 22:34:47 host sshd[5258]: input_userauth_request: invalid user root [preauth]
Jan  7 22:34:47 host unix_chkpwd[5265]: password check failed for user (root)
Jan  7 22:34:47 host sshd[5258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.188.195.18  user=root
Jan  7 22:34:47 host sshd[5258]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 22:34:48 host sshd[5254]: Connection closed by 79.3.19.34 port 48918 [preauth]
Jan  7 22:34:49 host sshd[5260]: Failed password for invalid user root from 43.153.58.238 port 47070 ssh2
Jan  7 22:34:49 host sshd[5260]: Received disconnect from 43.153.58.238 port 47070:11: Bye Bye [preauth]
Jan  7 22:34:49 host sshd[5260]: Disconnected from 43.153.58.238 port 47070 [preauth]
Jan  7 22:34:49 host sshd[5258]: Failed password for invalid user root from 181.188.195.18 port 33192 ssh2
Jan  7 22:34:50 host sshd[5258]: Received disconnect from 181.188.195.18 port 33192:11: Bye Bye [preauth]
Jan  7 22:34:50 host sshd[5258]: Disconnected from 181.188.195.18 port 33192 [preauth]
Jan  7 22:34:57 host sshd[5303]: Invalid user ubuntu from 157.245.105.16 port 33496
Jan  7 22:34:57 host sshd[5303]: input_userauth_request: invalid user ubuntu [preauth]
Jan  7 22:34:57 host sshd[5303]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 22:34:57 host sshd[5303]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.105.16
Jan  7 22:34:59 host sshd[5303]: Failed password for invalid user ubuntu from 157.245.105.16 port 33496 ssh2
Jan  7 22:34:59 host sshd[5303]: Received disconnect from 157.245.105.16 port 33496:11: Bye Bye [preauth]
Jan  7 22:34:59 host sshd[5303]: Disconnected from 157.245.105.16 port 33496 [preauth]
Jan  7 22:35:12 host sshd[5386]: User root from 161.18.228.75 not allowed because not listed in AllowUsers
Jan  7 22:35:12 host sshd[5386]: input_userauth_request: invalid user root [preauth]
Jan  7 22:35:12 host unix_chkpwd[5393]: password check failed for user (root)
Jan  7 22:35:12 host sshd[5386]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.18.228.75  user=root
Jan  7 22:35:12 host sshd[5386]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 22:35:13 host sshd[5386]: Failed password for invalid user root from 161.18.228.75 port 39220 ssh2
Jan  7 22:35:13 host sshd[5386]: Received disconnect from 161.18.228.75 port 39220:11: Bye Bye [preauth]
Jan  7 22:35:13 host sshd[5386]: Disconnected from 161.18.228.75 port 39220 [preauth]
Jan  7 22:35:16 host sshd[5397]: User root from 223.197.186.7 not allowed because not listed in AllowUsers
Jan  7 22:35:16 host sshd[5397]: input_userauth_request: invalid user root [preauth]
Jan  7 22:35:16 host unix_chkpwd[5399]: password check failed for user (root)
Jan  7 22:35:16 host sshd[5397]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.197.186.7  user=root
Jan  7 22:35:16 host sshd[5397]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 22:35:19 host sshd[5397]: Failed password for invalid user root from 223.197.186.7 port 57728 ssh2
Jan  7 22:35:19 host sshd[5397]: Received disconnect from 223.197.186.7 port 57728:11: Bye Bye [preauth]
Jan  7 22:35:19 host sshd[5397]: Disconnected from 223.197.186.7 port 57728 [preauth]
Jan  7 22:35:30 host sshd[5464]: Invalid user ubuntu from 158.69.82.130 port 41160
Jan  7 22:35:30 host sshd[5464]: input_userauth_request: invalid user ubuntu [preauth]
Jan  7 22:35:30 host sshd[5464]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 22:35:30 host sshd[5464]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.82.130
Jan  7 22:35:31 host sshd[5464]: Failed password for invalid user ubuntu from 158.69.82.130 port 41160 ssh2
Jan  7 22:35:32 host sshd[5464]: Received disconnect from 158.69.82.130 port 41160:11: Bye Bye [preauth]
Jan  7 22:35:32 host sshd[5464]: Disconnected from 158.69.82.130 port 41160 [preauth]
Jan  7 22:35:51 host sshd[5510]: User root from 43.156.40.46 not allowed because not listed in AllowUsers
Jan  7 22:35:51 host sshd[5510]: input_userauth_request: invalid user root [preauth]
Jan  7 22:35:51 host unix_chkpwd[5512]: password check failed for user (root)
Jan  7 22:35:51 host sshd[5510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.40.46  user=root
Jan  7 22:35:51 host sshd[5510]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 22:35:54 host sshd[5510]: Failed password for invalid user root from 43.156.40.46 port 42742 ssh2
Jan  7 22:35:57 host sshd[5560]: User root from 43.156.54.76 not allowed because not listed in AllowUsers
Jan  7 22:35:57 host sshd[5560]: input_userauth_request: invalid user root [preauth]
Jan  7 22:35:57 host unix_chkpwd[5562]: password check failed for user (root)
Jan  7 22:35:57 host sshd[5560]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.54.76  user=root
Jan  7 22:35:57 host sshd[5560]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 22:35:59 host sshd[5560]: Failed password for invalid user root from 43.156.54.76 port 37820 ssh2
Jan  7 22:35:59 host sshd[5560]: Received disconnect from 43.156.54.76 port 37820:11: Bye Bye [preauth]
Jan  7 22:35:59 host sshd[5560]: Disconnected from 43.156.54.76 port 37820 [preauth]
Jan  7 22:36:10 host sshd[5632]: User root from 164.92.148.64 not allowed because not listed in AllowUsers
Jan  7 22:36:10 host sshd[5632]: input_userauth_request: invalid user root [preauth]
Jan  7 22:36:10 host unix_chkpwd[5638]: password check failed for user (root)
Jan  7 22:36:10 host sshd[5632]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.148.64  user=root
Jan  7 22:36:10 host sshd[5632]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 22:36:12 host sshd[5632]: Failed password for invalid user root from 164.92.148.64 port 56658 ssh2
Jan  7 22:36:18 host sshd[5676]: User root from 189.35.82.41 not allowed because not listed in AllowUsers
Jan  7 22:36:18 host sshd[5676]: input_userauth_request: invalid user root [preauth]
Jan  7 22:36:18 host unix_chkpwd[5681]: password check failed for user (root)
Jan  7 22:36:18 host sshd[5676]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.35.82.41  user=root
Jan  7 22:36:18 host sshd[5676]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 22:36:19 host sshd[5682]: Invalid user edna from 43.153.58.238 port 44844
Jan  7 22:36:19 host sshd[5682]: input_userauth_request: invalid user edna [preauth]
Jan  7 22:36:19 host sshd[5682]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 22:36:19 host sshd[5682]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.58.238
Jan  7 22:36:19 host sshd[5676]: Failed password for invalid user root from 189.35.82.41 port 2822 ssh2
Jan  7 22:36:20 host sshd[5676]: Received disconnect from 189.35.82.41 port 2822:11: Bye Bye [preauth]
Jan  7 22:36:20 host sshd[5676]: Disconnected from 189.35.82.41 port 2822 [preauth]
Jan  7 22:36:21 host sshd[5682]: Failed password for invalid user edna from 43.153.58.238 port 44844 ssh2
Jan  7 22:36:21 host sshd[5682]: Received disconnect from 43.153.58.238 port 44844:11: Bye Bye [preauth]
Jan  7 22:36:21 host sshd[5682]: Disconnected from 43.153.58.238 port 44844 [preauth]
Jan  7 22:36:32 host sshd[5773]: Invalid user training from 158.69.82.130 port 35528
Jan  7 22:36:32 host sshd[5773]: input_userauth_request: invalid user training [preauth]
Jan  7 22:36:32 host sshd[5773]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 22:36:32 host sshd[5773]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.82.130
Jan  7 22:36:34 host sshd[5773]: Failed password for invalid user training from 158.69.82.130 port 35528 ssh2
Jan  7 22:36:34 host sshd[5773]: Received disconnect from 158.69.82.130 port 35528:11: Bye Bye [preauth]
Jan  7 22:36:34 host sshd[5773]: Disconnected from 158.69.82.130 port 35528 [preauth]
Jan  7 22:36:35 host sshd[5778]: Invalid user vps from 74.94.234.151 port 52574
Jan  7 22:36:35 host sshd[5778]: input_userauth_request: invalid user vps [preauth]
Jan  7 22:36:35 host sshd[5778]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 22:36:35 host sshd[5778]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.94.234.151
Jan  7 22:36:36 host sshd[5780]: Invalid user ubuntu from 41.174.126.94 port 51092
Jan  7 22:36:36 host sshd[5780]: input_userauth_request: invalid user ubuntu [preauth]
Jan  7 22:36:36 host sshd[5780]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 22:36:36 host sshd[5780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.174.126.94
Jan  7 22:36:37 host sshd[5778]: Failed password for invalid user vps from 74.94.234.151 port 52574 ssh2
Jan  7 22:36:37 host sshd[5778]: Received disconnect from 74.94.234.151 port 52574:11: Bye Bye [preauth]
Jan  7 22:36:37 host sshd[5778]: Disconnected from 74.94.234.151 port 52574 [preauth]
Jan  7 22:36:38 host sshd[5780]: Failed password for invalid user ubuntu from 41.174.126.94 port 51092 ssh2
Jan  7 22:36:38 host sshd[5780]: Received disconnect from 41.174.126.94 port 51092:11: Bye Bye [preauth]
Jan  7 22:36:38 host sshd[5780]: Disconnected from 41.174.126.94 port 51092 [preauth]
Jan  7 22:36:41 host sshd[5818]: User root from 161.18.228.75 not allowed because not listed in AllowUsers
Jan  7 22:36:41 host sshd[5818]: input_userauth_request: invalid user root [preauth]
Jan  7 22:36:41 host unix_chkpwd[5821]: password check failed for user (root)
Jan  7 22:36:41 host sshd[5818]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.18.228.75  user=root
Jan  7 22:36:41 host sshd[5818]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 22:36:44 host sshd[5818]: Failed password for invalid user root from 161.18.228.75 port 35550 ssh2
Jan  7 22:37:42 host sshd[5983]: Invalid user yclin from 79.3.19.34 port 49301
Jan  7 22:37:42 host sshd[5983]: input_userauth_request: invalid user yclin [preauth]
Jan  7 22:37:42 host sshd[5983]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 22:37:42 host sshd[5983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.3.19.34
Jan  7 22:37:44 host sshd[5983]: Failed password for invalid user yclin from 79.3.19.34 port 49301 ssh2
Jan  7 22:37:45 host sshd[5983]: Received disconnect from 79.3.19.34 port 49301:11: Bye Bye [preauth]
Jan  7 22:37:45 host sshd[5983]: Disconnected from 79.3.19.34 port 49301 [preauth]
Jan  7 22:37:48 host sshd[5996]: User root from 74.94.234.151 not allowed because not listed in AllowUsers
Jan  7 22:37:48 host sshd[5996]: input_userauth_request: invalid user root [preauth]
Jan  7 22:37:48 host unix_chkpwd[6023]: password check failed for user (root)
Jan  7 22:37:48 host sshd[5996]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.94.234.151  user=root
Jan  7 22:37:48 host sshd[5996]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  7 22:37:50 host sshd[5996]: Failed password for invalid user root from 74.94.234.151 port 51738 ssh2
Jan  7 22:37:50 host sshd[5996]: Received disconnect from 74.94.234.151 port 51738:11: Bye Bye [preauth]
Jan  7 22:37:50 host sshd[5996]: Disconnected from 74.94.234.151 port 51738 [preauth]
Jan  7 22:59:22 host sshd[8970]: Invalid user vpn from 195.226.194.242 port 45828
Jan  7 22:59:22 host sshd[8970]: input_userauth_request: invalid user vpn [preauth]
Jan  7 22:59:22 host sshd[8970]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 22:59:22 host sshd[8970]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.242
Jan  7 22:59:24 host sshd[8970]: Failed password for invalid user vpn from 195.226.194.242 port 45828 ssh2
Jan  7 22:59:24 host sshd[8970]: Received disconnect from 195.226.194.242 port 45828:11: Bye Bye [preauth]
Jan  7 22:59:24 host sshd[8970]: Disconnected from 195.226.194.242 port 45828 [preauth]
Jan  7 23:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  7 23:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 23:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 23:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  7 23:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 23:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 23:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  7 23:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 23:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 23:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  7 23:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 23:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 23:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  7 23:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 23:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 23:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  7 23:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 23:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 23:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  7 23:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 23:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 23:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  7 23:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 23:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 23:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  7 23:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 23:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 23:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  7 23:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 23:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 23:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  7 23:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 23:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 23:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  7 23:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 23:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 23:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  7 23:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 23:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 23:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=bonifacegroup user-2=wwwevmhonda user-3=straightcurve user-4=wwwletsstalkfood user-5=gifterman user-6=palco123 user-7=kottayamcalldriv user-8=phmetals user-9=mrsclean user-10=wwwnexidigital user-11=wwwkmaorg user-12=disposeat user-13=remysagr user-14=woodpeck user-15=wwwkapin user-16=vfmassets user-17=wwwtestugo user-18=shalinijames user-19=pmcresources user-20=wwwpmcresource user-21=travelboniface user-22=wwwrmswll user-23=wwwresourcehunte user-24=keralaholi user-25=ugotscom user-26=wwwkaretakers user-27=cochintaxi user-28=dartsimp user-29=a2zgroup user-30=laundryboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  7 23:21:55 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  7 23:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 23:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 23:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  7 23:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 23:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 23:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ijs6ijZC0UofFtit.~
Jan  7 23:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 23:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 23:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ijs6ijZC0UofFtit.~'
Jan  7 23:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 23:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 23:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ijs6ijZC0UofFtit.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  7 23:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 23:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 23:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  7 23:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 23:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 23:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  7 23:21:55 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 23:21:55 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 23:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  7 23:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 23:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 23:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  7 23:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 23:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 23:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  7 23:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 23:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 23:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  7 23:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 23:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 23:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  7 23:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  7 23:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  7 23:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  7 23:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  7 23:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  7 23:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  7 23:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  7 23:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  7 23:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  7 23:22:00 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  7 23:22:02 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  7 23:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  7 23:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 23:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 23:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  7 23:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 23:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 23:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  7 23:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  7 23:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  7 23:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  7 23:22:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 23:22:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 23:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  7 23:22:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  7 23:22:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  7 23:22:10 host sshd[12318]: Invalid user ay from 194.110.203.109 port 60002
Jan  7 23:22:10 host sshd[12318]: input_userauth_request: invalid user ay [preauth]
Jan  7 23:22:10 host sshd[12318]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 23:22:10 host sshd[12318]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109
Jan  7 23:22:12 host sshd[12318]: Failed password for invalid user ay from 194.110.203.109 port 60002 ssh2
Jan  7 23:22:15 host sshd[12318]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 23:22:17 host sshd[12318]: Failed password for invalid user ay from 194.110.203.109 port 60002 ssh2
Jan  7 23:22:20 host sshd[12318]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 23:22:22 host sshd[12318]: Failed password for invalid user ay from 194.110.203.109 port 60002 ssh2
Jan  7 23:22:25 host sshd[12318]: Connection closed by 194.110.203.109 port 60002 [preauth]
Jan  7 23:22:25 host sshd[12318]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109
Jan  7 23:23:44 host sshd[12578]: Connection closed by 162.142.125.220 port 48134 [preauth]
Jan  7 23:39:34 host sshd[14892]: Invalid user bzrx1098ui from 92.255.85.115 port 37268
Jan  7 23:39:34 host sshd[14892]: input_userauth_request: invalid user bzrx1098ui [preauth]
Jan  7 23:39:34 host sshd[14892]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 23:39:34 host sshd[14892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.255.85.115
Jan  7 23:39:35 host sshd[14892]: Failed password for invalid user bzrx1098ui from 92.255.85.115 port 37268 ssh2
Jan  7 23:39:36 host sshd[14892]: Connection reset by 92.255.85.115 port 37268 [preauth]
Jan  7 23:46:54 host sshd[16053]: Invalid user kuoyichen from 209.126.2.250 port 53452
Jan  7 23:46:54 host sshd[16053]: input_userauth_request: invalid user kuoyichen [preauth]
Jan  7 23:46:54 host sshd[16053]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 23:46:54 host sshd[16053]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.126.2.250
Jan  7 23:46:56 host sshd[16053]: Failed password for invalid user kuoyichen from 209.126.2.250 port 53452 ssh2
Jan  7 23:46:56 host sshd[16053]: Received disconnect from 209.126.2.250 port 53452:11: Bye Bye [preauth]
Jan  7 23:46:56 host sshd[16053]: Disconnected from 209.126.2.250 port 53452 [preauth]
Jan  7 23:48:39 host sshd[16333]: Invalid user zhaoweifeng from 79.187.133.142 port 59026
Jan  7 23:48:39 host sshd[16333]: input_userauth_request: invalid user zhaoweifeng [preauth]
Jan  7 23:48:39 host sshd[16333]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 23:48:39 host sshd[16333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.187.133.142
Jan  7 23:48:41 host sshd[16333]: Failed password for invalid user zhaoweifeng from 79.187.133.142 port 59026 ssh2
Jan  7 23:48:41 host sshd[16333]: Received disconnect from 79.187.133.142 port 59026:11: Bye Bye [preauth]
Jan  7 23:48:41 host sshd[16333]: Disconnected from 79.187.133.142 port 59026 [preauth]
Jan  7 23:53:21 host sshd[17089]: Invalid user felicity from 209.126.2.250 port 49014
Jan  7 23:53:21 host sshd[17089]: input_userauth_request: invalid user felicity [preauth]
Jan  7 23:53:21 host sshd[17089]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 23:53:21 host sshd[17089]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.126.2.250
Jan  7 23:53:23 host sshd[17089]: Failed password for invalid user felicity from 209.126.2.250 port 49014 ssh2
Jan  7 23:53:23 host sshd[17089]: Received disconnect from 209.126.2.250 port 49014:11: Bye Bye [preauth]
Jan  7 23:53:23 host sshd[17089]: Disconnected from 209.126.2.250 port 49014 [preauth]
Jan  7 23:54:20 host sshd[17190]: Invalid user vitales from 79.187.133.142 port 52122
Jan  7 23:54:20 host sshd[17190]: input_userauth_request: invalid user vitales [preauth]
Jan  7 23:54:20 host sshd[17190]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 23:54:20 host sshd[17190]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.187.133.142
Jan  7 23:54:23 host sshd[17190]: Failed password for invalid user vitales from 79.187.133.142 port 52122 ssh2
Jan  7 23:54:23 host sshd[17190]: Received disconnect from 79.187.133.142 port 52122:11: Bye Bye [preauth]
Jan  7 23:54:23 host sshd[17190]: Disconnected from 79.187.133.142 port 52122 [preauth]
Jan  7 23:54:23 host sshd[17194]: Invalid user kuoyichen from 137.63.162.126 port 45342
Jan  7 23:54:23 host sshd[17194]: input_userauth_request: invalid user kuoyichen [preauth]
Jan  7 23:54:23 host sshd[17194]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 23:54:23 host sshd[17194]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.63.162.126
Jan  7 23:54:26 host sshd[17194]: Failed password for invalid user kuoyichen from 137.63.162.126 port 45342 ssh2
Jan  7 23:54:26 host sshd[17194]: Received disconnect from 137.63.162.126 port 45342:11: Bye Bye [preauth]
Jan  7 23:54:26 host sshd[17194]: Disconnected from 137.63.162.126 port 45342 [preauth]
Jan  7 23:54:32 host sshd[17229]: Invalid user admin from 92.255.85.115 port 14461
Jan  7 23:54:32 host sshd[17229]: input_userauth_request: invalid user admin [preauth]
Jan  7 23:54:32 host sshd[17229]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 23:54:32 host sshd[17229]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.255.85.115
Jan  7 23:54:34 host sshd[17229]: Failed password for invalid user admin from 92.255.85.115 port 14461 ssh2
Jan  7 23:54:34 host sshd[17229]: Connection reset by 92.255.85.115 port 14461 [preauth]
Jan  7 23:54:37 host sshd[17237]: Invalid user openkm from 209.126.2.250 port 38938
Jan  7 23:54:37 host sshd[17237]: input_userauth_request: invalid user openkm [preauth]
Jan  7 23:54:38 host sshd[17237]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 23:54:38 host sshd[17237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.126.2.250
Jan  7 23:54:40 host sshd[17237]: Failed password for invalid user openkm from 209.126.2.250 port 38938 ssh2
Jan  7 23:54:40 host sshd[17237]: Received disconnect from 209.126.2.250 port 38938:11: Bye Bye [preauth]
Jan  7 23:54:40 host sshd[17237]: Disconnected from 209.126.2.250 port 38938 [preauth]
Jan  7 23:55:37 host sshd[17408]: Invalid user mukesh from 79.187.133.142 port 46714
Jan  7 23:55:37 host sshd[17408]: input_userauth_request: invalid user mukesh [preauth]
Jan  7 23:55:37 host sshd[17408]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 23:55:37 host sshd[17408]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.187.133.142
Jan  7 23:55:39 host sshd[17408]: Failed password for invalid user mukesh from 79.187.133.142 port 46714 ssh2
Jan  7 23:55:39 host sshd[17408]: Received disconnect from 79.187.133.142 port 46714:11: Bye Bye [preauth]
Jan  7 23:55:39 host sshd[17408]: Disconnected from 79.187.133.142 port 46714 [preauth]
Jan  7 23:57:01 host sshd[17672]: Invalid user vq from 137.63.162.126 port 39566
Jan  7 23:57:01 host sshd[17672]: input_userauth_request: invalid user vq [preauth]
Jan  7 23:57:01 host sshd[17672]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 23:57:01 host sshd[17672]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.63.162.126
Jan  7 23:57:03 host sshd[17672]: Failed password for invalid user vq from 137.63.162.126 port 39566 ssh2
Jan  7 23:57:03 host sshd[17672]: Received disconnect from 137.63.162.126 port 39566:11: Bye Bye [preauth]
Jan  7 23:57:03 host sshd[17672]: Disconnected from 137.63.162.126 port 39566 [preauth]
Jan  7 23:58:52 host sshd[17931]: Invalid user lixiang2 from 137.63.162.126 port 54140
Jan  7 23:58:52 host sshd[17931]: input_userauth_request: invalid user lixiang2 [preauth]
Jan  7 23:58:52 host sshd[17931]: pam_unix(sshd:auth): check pass; user unknown
Jan  7 23:58:52 host sshd[17931]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.63.162.126
Jan  7 23:58:54 host sshd[17931]: Failed password for invalid user lixiang2 from 137.63.162.126 port 54140 ssh2
Jan  8 00:03:04 host sshd[18597]: User root from 61.146.48.118 not allowed because not listed in AllowUsers
Jan  8 00:03:04 host sshd[18597]: input_userauth_request: invalid user root [preauth]
Jan  8 00:03:04 host unix_chkpwd[18606]: password check failed for user (root)
Jan  8 00:03:04 host sshd[18597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.146.48.118  user=root
Jan  8 00:03:04 host sshd[18597]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 00:03:07 host sshd[18597]: Failed password for invalid user root from 61.146.48.118 port 50881 ssh2
Jan  8 00:03:07 host unix_chkpwd[18610]: password check failed for user (root)
Jan  8 00:03:07 host sshd[18597]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 00:03:09 host sshd[18597]: Failed password for invalid user root from 61.146.48.118 port 50881 ssh2
Jan  8 00:03:09 host unix_chkpwd[18613]: password check failed for user (root)
Jan  8 00:03:09 host sshd[18597]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 00:03:11 host sshd[18597]: Failed password for invalid user root from 61.146.48.118 port 50881 ssh2
Jan  8 00:03:12 host unix_chkpwd[18616]: password check failed for user (root)
Jan  8 00:03:12 host sshd[18597]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 00:03:13 host sshd[18597]: Failed password for invalid user root from 61.146.48.118 port 50881 ssh2
Jan  8 00:07:57 host sshd[19166]: Invalid user support from 92.255.85.115 port 7806
Jan  8 00:07:57 host sshd[19166]: input_userauth_request: invalid user support [preauth]
Jan  8 00:07:57 host sshd[19166]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 00:07:57 host sshd[19166]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.255.85.115
Jan  8 00:07:59 host sshd[19166]: Failed password for invalid user support from 92.255.85.115 port 7806 ssh2
Jan  8 00:07:59 host sshd[19166]: Connection reset by 92.255.85.115 port 7806 [preauth]
Jan  8 00:11:56 host sshd[19721]: Invalid user vj from 74.119.192.86 port 55260
Jan  8 00:11:56 host sshd[19721]: input_userauth_request: invalid user vj [preauth]
Jan  8 00:11:56 host sshd[19721]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 00:11:56 host sshd[19721]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.119.192.86
Jan  8 00:11:58 host sshd[19721]: Failed password for invalid user vj from 74.119.192.86 port 55260 ssh2
Jan  8 00:11:59 host sshd[19721]: Received disconnect from 74.119.192.86 port 55260:11: Bye Bye [preauth]
Jan  8 00:11:59 host sshd[19721]: Disconnected from 74.119.192.86 port 55260 [preauth]
Jan  8 00:12:19 host sshd[19769]: Connection closed by 172.104.11.34 port 39400 [preauth]
Jan  8 00:12:21 host sshd[19773]: Connection closed by 172.104.11.34 port 39414 [preauth]
Jan  8 00:12:23 host sshd[19776]: Connection closed by 172.104.11.34 port 39424 [preauth]
Jan  8 00:15:35 host sshd[20704]: Invalid user prtg from 185.233.36.187 port 33208
Jan  8 00:15:35 host sshd[20704]: input_userauth_request: invalid user prtg [preauth]
Jan  8 00:15:35 host sshd[20704]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 00:15:35 host sshd[20704]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.233.36.187
Jan  8 00:15:37 host sshd[20704]: Failed password for invalid user prtg from 185.233.36.187 port 33208 ssh2
Jan  8 00:15:38 host sshd[20704]: Received disconnect from 185.233.36.187 port 33208:11: Bye Bye [preauth]
Jan  8 00:15:38 host sshd[20704]: Disconnected from 185.233.36.187 port 33208 [preauth]
Jan  8 00:16:36 host sshd[21293]: Invalid user zunwen from 74.119.192.86 port 45862
Jan  8 00:16:36 host sshd[21293]: input_userauth_request: invalid user zunwen [preauth]
Jan  8 00:16:36 host sshd[21293]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 00:16:36 host sshd[21293]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.119.192.86
Jan  8 00:16:38 host sshd[21293]: Failed password for invalid user zunwen from 74.119.192.86 port 45862 ssh2
Jan  8 00:16:38 host sshd[21293]: Received disconnect from 74.119.192.86 port 45862:11: Bye Bye [preauth]
Jan  8 00:16:38 host sshd[21293]: Disconnected from 74.119.192.86 port 45862 [preauth]
Jan  8 00:17:07 host sshd[21371]: Invalid user ftest from 185.233.36.187 port 43000
Jan  8 00:17:07 host sshd[21371]: input_userauth_request: invalid user ftest [preauth]
Jan  8 00:17:07 host sshd[21371]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 00:17:07 host sshd[21371]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.233.36.187
Jan  8 00:17:09 host sshd[21371]: Failed password for invalid user ftest from 185.233.36.187 port 43000 ssh2
Jan  8 00:17:09 host sshd[21371]: Received disconnect from 185.233.36.187 port 43000:11: Bye Bye [preauth]
Jan  8 00:17:09 host sshd[21371]: Disconnected from 185.233.36.187 port 43000 [preauth]
Jan  8 00:17:54 host sshd[21481]: Invalid user felix from 74.119.192.86 port 41284
Jan  8 00:17:54 host sshd[21481]: input_userauth_request: invalid user felix [preauth]
Jan  8 00:17:54 host sshd[21481]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 00:17:54 host sshd[21481]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.119.192.86
Jan  8 00:17:56 host sshd[21481]: Failed password for invalid user felix from 74.119.192.86 port 41284 ssh2
Jan  8 00:17:56 host sshd[21481]: Received disconnect from 74.119.192.86 port 41284:11: Bye Bye [preauth]
Jan  8 00:17:56 host sshd[21481]: Disconnected from 74.119.192.86 port 41284 [preauth]
Jan  8 00:18:12 host sshd[21549]: Invalid user dockeradmin from 185.233.36.187 port 59098
Jan  8 00:18:12 host sshd[21549]: input_userauth_request: invalid user dockeradmin [preauth]
Jan  8 00:18:12 host sshd[21549]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 00:18:12 host sshd[21549]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.233.36.187
Jan  8 00:18:14 host sshd[21549]: Failed password for invalid user dockeradmin from 185.233.36.187 port 59098 ssh2
Jan  8 00:21:23 host sshd[21957]: Invalid user user from 92.255.85.115 port 9628
Jan  8 00:21:23 host sshd[21957]: input_userauth_request: invalid user user [preauth]
Jan  8 00:21:23 host sshd[21957]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 00:21:23 host sshd[21957]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.255.85.115
Jan  8 00:21:25 host sshd[21957]: Failed password for invalid user user from 92.255.85.115 port 9628 ssh2
Jan  8 00:21:26 host sshd[21957]: Connection reset by 92.255.85.115 port 9628 [preauth]
Jan  8 00:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  8 00:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 00:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 00:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  8 00:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 00:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 00:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  8 00:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 00:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 00:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  8 00:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 00:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 00:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  8 00:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 00:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 00:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  8 00:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 00:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 00:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  8 00:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 00:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 00:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  8 00:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 00:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 00:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  8 00:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 00:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 00:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  8 00:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 00:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 00:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  8 00:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 00:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 00:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  8 00:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 00:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 00:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  8 00:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 00:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 00:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=cochintaxi user-2=wwwkaretakers user-3=dartsimp user-4=a2zgroup user-5=laundryboniface user-6=wwwpmcresource user-7=travelboniface user-8=wwwrmswll user-9=wwwresourcehunte user-10=keralaholi user-11=ugotscom user-12=wwwkmaorg user-13=disposeat user-14=remysagr user-15=wwwkapin user-16=woodpeck user-17=vfmassets user-18=wwwtestugo user-19=shalinijames user-20=pmcresources user-21=bonifacegroup user-22=wwwevmhonda user-23=wwwletsstalkfood user-24=straightcurve user-25=gifterman user-26=palco123 user-27=kottayamcalldriv user-28=phmetals user-29=wwwnexidigital user-30=mrsclean feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  8 00:21:55 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  8 00:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 00:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 00:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  8 00:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 00:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 00:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-5jaIG7zFX9R6JZG6.~
Jan  8 00:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 00:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 00:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-5jaIG7zFX9R6JZG6.~'
Jan  8 00:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 00:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 00:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-5jaIG7zFX9R6JZG6.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  8 00:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 00:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 00:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  8 00:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 00:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 00:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  8 00:21:56 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 00:21:56 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 00:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  8 00:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 00:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 00:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  8 00:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 00:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 00:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  8 00:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 00:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 00:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  8 00:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 00:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 00:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  8 00:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 00:21:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 00:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  8 00:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  8 00:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  8 00:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  8 00:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  8 00:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  8 00:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  8 00:22:01 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  8 00:22:03 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  8 00:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  8 00:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 00:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 00:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  8 00:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 00:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 00:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  8 00:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 00:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 00:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  8 00:22:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 00:22:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 00:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  8 00:22:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 00:22:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 00:29:49 host sshd[23398]: Invalid user rescue from 195.226.194.242 port 54386
Jan  8 00:29:49 host sshd[23398]: input_userauth_request: invalid user rescue [preauth]
Jan  8 00:29:49 host sshd[23398]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 00:29:49 host sshd[23398]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.242
Jan  8 00:29:51 host sshd[23398]: Failed password for invalid user rescue from 195.226.194.242 port 54386 ssh2
Jan  8 00:29:52 host sshd[23398]: Received disconnect from 195.226.194.242 port 54386:11: Bye Bye [preauth]
Jan  8 00:29:52 host sshd[23398]: Disconnected from 195.226.194.242 port 54386 [preauth]
Jan  8 00:34:54 host sshd[24182]: User root from 92.255.85.115 not allowed because not listed in AllowUsers
Jan  8 00:34:54 host sshd[24182]: input_userauth_request: invalid user root [preauth]
Jan  8 00:34:55 host unix_chkpwd[24187]: password check failed for user (root)
Jan  8 00:34:55 host sshd[24182]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.255.85.115  user=root
Jan  8 00:34:55 host sshd[24182]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 00:34:56 host sshd[24182]: Failed password for invalid user root from 92.255.85.115 port 52100 ssh2
Jan  8 00:34:56 host sshd[24182]: Connection reset by 92.255.85.115 port 52100 [preauth]
Jan  8 00:55:07 host sshd[27204]: Invalid user benjamin from 107.189.30.59 port 33728
Jan  8 00:55:07 host sshd[27204]: input_userauth_request: invalid user benjamin [preauth]
Jan  8 00:55:07 host sshd[27204]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 00:55:07 host sshd[27204]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59
Jan  8 00:55:09 host sshd[27204]: Failed password for invalid user benjamin from 107.189.30.59 port 33728 ssh2
Jan  8 00:55:10 host sshd[27204]: Connection closed by 107.189.30.59 port 33728 [preauth]
Jan  8 00:55:38 host sshd[27268]: User root from 45.95.169.105 not allowed because not listed in AllowUsers
Jan  8 00:55:38 host sshd[27268]: input_userauth_request: invalid user root [preauth]
Jan  8 00:55:38 host unix_chkpwd[27271]: password check failed for user (root)
Jan  8 00:55:38 host sshd[27268]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.95.169.105  user=root
Jan  8 00:55:38 host sshd[27268]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 00:55:40 host sshd[27268]: Failed password for invalid user root from 45.95.169.105 port 51130 ssh2
Jan  8 00:55:40 host sshd[27268]: Received disconnect from 45.95.169.105 port 51130:11: Bye Bye [preauth]
Jan  8 00:55:40 host sshd[27268]: Disconnected from 45.95.169.105 port 51130 [preauth]
Jan  8 00:55:42 host sshd[27276]: Invalid user admin from 45.95.169.105 port 41532
Jan  8 00:55:42 host sshd[27276]: input_userauth_request: invalid user admin [preauth]
Jan  8 00:55:42 host sshd[27276]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 00:55:42 host sshd[27276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.95.169.105
Jan  8 00:55:44 host sshd[27276]: Failed password for invalid user admin from 45.95.169.105 port 41532 ssh2
Jan  8 00:55:44 host sshd[27276]: Received disconnect from 45.95.169.105 port 41532:11: Bye Bye [preauth]
Jan  8 00:55:44 host sshd[27276]: Disconnected from 45.95.169.105 port 41532 [preauth]
Jan  8 00:55:46 host sshd[27282]: Invalid user admin from 45.95.169.105 port 59836
Jan  8 00:55:46 host sshd[27282]: input_userauth_request: invalid user admin [preauth]
Jan  8 00:55:46 host sshd[27282]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 00:55:46 host sshd[27282]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.95.169.105
Jan  8 00:55:48 host sshd[27282]: Failed password for invalid user admin from 45.95.169.105 port 59836 ssh2
Jan  8 00:55:48 host sshd[27282]: Received disconnect from 45.95.169.105 port 59836:11: Bye Bye [preauth]
Jan  8 00:55:48 host sshd[27282]: Disconnected from 45.95.169.105 port 59836 [preauth]
Jan  8 00:57:50 host sshd[27690]: User sshd from 195.226.194.242 not allowed because not listed in AllowUsers
Jan  8 00:57:50 host sshd[27690]: input_userauth_request: invalid user sshd [preauth]
Jan  8 00:57:51 host unix_chkpwd[27693]: password check failed for user (sshd)
Jan  8 00:57:51 host sshd[27690]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.242  user=sshd
Jan  8 00:57:51 host sshd[27690]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "sshd"
Jan  8 00:57:52 host sshd[27690]: Failed password for invalid user sshd from 195.226.194.242 port 18520 ssh2
Jan  8 00:57:52 host sshd[27690]: Received disconnect from 195.226.194.242 port 18520:11: Bye Bye [preauth]
Jan  8 00:57:52 host sshd[27690]: Disconnected from 195.226.194.242 port 18520 [preauth]
Jan  8 01:09:38 host sshd[29542]: User root from 209.141.55.27 not allowed because not listed in AllowUsers
Jan  8 01:09:38 host sshd[29542]: input_userauth_request: invalid user root [preauth]
Jan  8 01:09:38 host unix_chkpwd[29545]: password check failed for user (root)
Jan  8 01:09:38 host sshd[29542]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.55.27  user=root
Jan  8 01:09:38 host sshd[29542]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 01:09:40 host sshd[29542]: Failed password for invalid user root from 209.141.55.27 port 40288 ssh2
Jan  8 01:09:41 host sshd[29542]: Received disconnect from 209.141.55.27 port 40288:11: Normal Shutdown, Thank you for playing [preauth]
Jan  8 01:09:41 host sshd[29542]: Disconnected from 209.141.55.27 port 40288 [preauth]
Jan  8 01:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  8 01:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 01:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 01:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  8 01:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 01:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 01:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  8 01:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 01:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 01:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  8 01:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 01:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 01:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  8 01:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 01:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 01:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  8 01:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 01:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 01:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  8 01:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 01:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 01:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  8 01:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 01:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 01:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  8 01:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 01:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 01:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  8 01:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 01:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 01:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  8 01:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 01:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 01:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  8 01:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 01:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 01:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  8 01:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 01:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 01:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwnexidigital user-2=mrsclean user-3=palco123 user-4=gifterman user-5=phmetals user-6=kottayamcalldriv user-7=straightcurve user-8=wwwletsstalkfood user-9=bonifacegroup user-10=wwwevmhonda user-11=pmcresources user-12=vfmassets user-13=shalinijames user-14=wwwtestugo user-15=wwwkapin user-16=woodpeck user-17=disposeat user-18=wwwkmaorg user-19=remysagr user-20=wwwresourcehunte user-21=keralaholi user-22=wwwrmswll user-23=ugotscom user-24=travelboniface user-25=wwwpmcresource user-26=laundryboniface user-27=a2zgroup user-28=dartsimp user-29=wwwkaretakers user-30=cochintaxi feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  8 01:21:54 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  8 01:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 01:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 01:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  8 01:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 01:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 01:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-hNskKm22WM7l75me.~
Jan  8 01:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 01:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 01:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-hNskKm22WM7l75me.~'
Jan  8 01:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 01:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 01:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-hNskKm22WM7l75me.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  8 01:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 01:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 01:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  8 01:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 01:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 01:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  8 01:21:55 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 01:21:55 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 01:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  8 01:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 01:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 01:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  8 01:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 01:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 01:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  8 01:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 01:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 01:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  8 01:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 01:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 01:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  8 01:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 01:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 01:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  8 01:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  8 01:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  8 01:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  8 01:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  8 01:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  8 01:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  8 01:22:05 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  8 01:22:10 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  8 01:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  8 01:22:10 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 01:22:11 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 01:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  8 01:22:11 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 01:22:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 01:22:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  8 01:22:12 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 01:22:17 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 01:22:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  8 01:22:17 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 01:22:18 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 01:22:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  8 01:22:18 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 01:22:20 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 01:24:32 host sshd[31897]: Connection closed by 192.241.198.9 port 52408 [preauth]
Jan  8 01:34:07 host sshd[826]: Invalid user az from 194.110.203.109 port 32900
Jan  8 01:34:07 host sshd[826]: input_userauth_request: invalid user az [preauth]
Jan  8 01:34:07 host sshd[826]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 01:34:07 host sshd[826]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109
Jan  8 01:34:09 host sshd[826]: Failed password for invalid user az from 194.110.203.109 port 32900 ssh2
Jan  8 01:34:13 host sshd[826]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 01:34:14 host sshd[826]: Failed password for invalid user az from 194.110.203.109 port 32900 ssh2
Jan  8 01:34:17 host sshd[826]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 01:34:19 host sshd[826]: Failed password for invalid user az from 194.110.203.109 port 32900 ssh2
Jan  8 01:34:22 host sshd[826]: Connection closed by 194.110.203.109 port 32900 [preauth]
Jan  8 01:34:22 host sshd[826]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109
Jan  8 01:39:47 host sshd[1602]: Invalid user vsm from 51.38.231.112 port 43646
Jan  8 01:39:47 host sshd[1602]: input_userauth_request: invalid user vsm [preauth]
Jan  8 01:39:47 host sshd[1602]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 01:39:47 host sshd[1602]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.231.112
Jan  8 01:39:49 host sshd[1602]: Failed password for invalid user vsm from 51.38.231.112 port 43646 ssh2
Jan  8 01:39:49 host sshd[1602]: Received disconnect from 51.38.231.112 port 43646:11: Bye Bye [preauth]
Jan  8 01:39:49 host sshd[1602]: Disconnected from 51.38.231.112 port 43646 [preauth]
Jan  8 01:40:12 host sshd[1665]: Invalid user manju from 43.157.7.25 port 33406
Jan  8 01:40:12 host sshd[1665]: input_userauth_request: invalid user manju [preauth]
Jan  8 01:40:12 host sshd[1665]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 01:40:12 host sshd[1665]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.157.7.25
Jan  8 01:40:15 host sshd[1665]: Failed password for invalid user manju from 43.157.7.25 port 33406 ssh2
Jan  8 01:40:15 host sshd[1665]: Received disconnect from 43.157.7.25 port 33406:11: Bye Bye [preauth]
Jan  8 01:40:15 host sshd[1665]: Disconnected from 43.157.7.25 port 33406 [preauth]
Jan  8 01:40:16 host sshd[1670]: Invalid user manju from 49.247.46.44 port 11078
Jan  8 01:40:16 host sshd[1670]: input_userauth_request: invalid user manju [preauth]
Jan  8 01:40:16 host sshd[1670]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 01:40:16 host sshd[1670]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.247.46.44
Jan  8 01:40:17 host sshd[1670]: Failed password for invalid user manju from 49.247.46.44 port 11078 ssh2
Jan  8 01:40:17 host sshd[1670]: Received disconnect from 49.247.46.44 port 11078:11: Bye Bye [preauth]
Jan  8 01:40:17 host sshd[1670]: Disconnected from 49.247.46.44 port 11078 [preauth]
Jan  8 01:40:25 host sshd[1680]: Invalid user devops from 192.99.70.166 port 58140
Jan  8 01:40:25 host sshd[1680]: input_userauth_request: invalid user devops [preauth]
Jan  8 01:40:25 host sshd[1680]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 01:40:25 host sshd[1680]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.70.166
Jan  8 01:40:27 host sshd[1680]: Failed password for invalid user devops from 192.99.70.166 port 58140 ssh2
Jan  8 01:40:27 host sshd[1680]: Received disconnect from 192.99.70.166 port 58140:11: Bye Bye [preauth]
Jan  8 01:40:27 host sshd[1680]: Disconnected from 192.99.70.166 port 58140 [preauth]
Jan  8 01:40:30 host sshd[1709]: Invalid user wyw from 192.241.171.230 port 55632
Jan  8 01:40:30 host sshd[1709]: input_userauth_request: invalid user wyw [preauth]
Jan  8 01:40:30 host sshd[1709]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 01:40:30 host sshd[1709]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.171.230
Jan  8 01:40:33 host sshd[1709]: Failed password for invalid user wyw from 192.241.171.230 port 55632 ssh2
Jan  8 01:40:33 host sshd[1709]: Received disconnect from 192.241.171.230 port 55632:11: Bye Bye [preauth]
Jan  8 01:40:33 host sshd[1709]: Disconnected from 192.241.171.230 port 55632 [preauth]
Jan  8 01:41:41 host sshd[1888]: Invalid user purple from 207.138.39.234 port 38070
Jan  8 01:41:41 host sshd[1888]: input_userauth_request: invalid user purple [preauth]
Jan  8 01:41:41 host sshd[1888]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 01:41:41 host sshd[1888]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.138.39.234
Jan  8 01:41:44 host sshd[1888]: Failed password for invalid user purple from 207.138.39.234 port 38070 ssh2
Jan  8 01:41:44 host sshd[1888]: Received disconnect from 207.138.39.234 port 38070:11: Bye Bye [preauth]
Jan  8 01:41:44 host sshd[1888]: Disconnected from 207.138.39.234 port 38070 [preauth]
Jan  8 01:41:57 host sshd[1904]: Invalid user vsm from 144.217.173.156 port 35120
Jan  8 01:41:57 host sshd[1904]: input_userauth_request: invalid user vsm [preauth]
Jan  8 01:41:57 host sshd[1904]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 01:41:57 host sshd[1904]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.173.156
Jan  8 01:41:59 host sshd[1904]: Failed password for invalid user vsm from 144.217.173.156 port 35120 ssh2
Jan  8 01:41:59 host sshd[1904]: Received disconnect from 144.217.173.156 port 35120:11: Bye Bye [preauth]
Jan  8 01:41:59 host sshd[1904]: Disconnected from 144.217.173.156 port 35120 [preauth]
Jan  8 01:42:24 host sshd[1950]: Invalid user ivanova from 90.68.121.105 port 33662
Jan  8 01:42:24 host sshd[1950]: input_userauth_request: invalid user ivanova [preauth]
Jan  8 01:42:24 host sshd[1950]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 01:42:24 host sshd[1950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=90.68.121.105
Jan  8 01:42:26 host sshd[1950]: Failed password for invalid user ivanova from 90.68.121.105 port 33662 ssh2
Jan  8 01:42:27 host sshd[1950]: Received disconnect from 90.68.121.105 port 33662:11: Bye Bye [preauth]
Jan  8 01:42:27 host sshd[1950]: Disconnected from 90.68.121.105 port 33662 [preauth]
Jan  8 01:42:50 host sshd[2000]: Invalid user xiaoguo from 138.197.141.89 port 44674
Jan  8 01:42:50 host sshd[2000]: input_userauth_request: invalid user xiaoguo [preauth]
Jan  8 01:42:50 host sshd[2000]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 01:42:50 host sshd[2000]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.141.89
Jan  8 01:42:52 host sshd[2000]: Failed password for invalid user xiaoguo from 138.197.141.89 port 44674 ssh2
Jan  8 01:42:53 host sshd[2000]: Received disconnect from 138.197.141.89 port 44674:11: Bye Bye [preauth]
Jan  8 01:42:53 host sshd[2000]: Disconnected from 138.197.141.89 port 44674 [preauth]
Jan  8 01:43:00 host sshd[2021]: Invalid user vsm from 70.37.75.157 port 34304
Jan  8 01:43:00 host sshd[2021]: input_userauth_request: invalid user vsm [preauth]
Jan  8 01:43:00 host sshd[2021]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 01:43:00 host sshd[2021]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.37.75.157
Jan  8 01:43:02 host sshd[2021]: Failed password for invalid user vsm from 70.37.75.157 port 34304 ssh2
Jan  8 01:43:02 host sshd[2021]: Received disconnect from 70.37.75.157 port 34304:11: Bye Bye [preauth]
Jan  8 01:43:02 host sshd[2021]: Disconnected from 70.37.75.157 port 34304 [preauth]
Jan  8 01:43:46 host sshd[2324]: Invalid user manju from 41.93.33.2 port 37792
Jan  8 01:43:46 host sshd[2324]: input_userauth_request: invalid user manju [preauth]
Jan  8 01:43:46 host sshd[2324]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 01:43:46 host sshd[2324]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.93.33.2
Jan  8 01:43:48 host sshd[2324]: Failed password for invalid user manju from 41.93.33.2 port 37792 ssh2
Jan  8 01:43:48 host sshd[2324]: Received disconnect from 41.93.33.2 port 37792:11: Bye Bye [preauth]
Jan  8 01:43:48 host sshd[2324]: Disconnected from 41.93.33.2 port 37792 [preauth]
Jan  8 01:44:10 host sshd[2432]: Invalid user devops from 3.108.244.24 port 50018
Jan  8 01:44:10 host sshd[2432]: input_userauth_request: invalid user devops [preauth]
Jan  8 01:44:10 host sshd[2432]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 01:44:10 host sshd[2432]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=3.108.244.24
Jan  8 01:44:12 host sshd[2432]: Failed password for invalid user devops from 3.108.244.24 port 50018 ssh2
Jan  8 01:44:12 host sshd[2432]: Received disconnect from 3.108.244.24 port 50018:11: Bye Bye [preauth]
Jan  8 01:44:12 host sshd[2432]: Disconnected from 3.108.244.24 port 50018 [preauth]
Jan  8 01:44:59 host sshd[2618]: Invalid user ivanova from 192.241.171.230 port 49806
Jan  8 01:44:59 host sshd[2618]: input_userauth_request: invalid user ivanova [preauth]
Jan  8 01:44:59 host sshd[2618]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 01:44:59 host sshd[2618]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.171.230
Jan  8 01:45:01 host sshd[2618]: Failed password for invalid user ivanova from 192.241.171.230 port 49806 ssh2
Jan  8 01:45:01 host sshd[2618]: Received disconnect from 192.241.171.230 port 49806:11: Bye Bye [preauth]
Jan  8 01:45:01 host sshd[2618]: Disconnected from 192.241.171.230 port 49806 [preauth]
Jan  8 01:45:10 host sshd[2681]: Invalid user wyw from 192.99.70.166 port 41478
Jan  8 01:45:10 host sshd[2681]: input_userauth_request: invalid user wyw [preauth]
Jan  8 01:45:10 host sshd[2681]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 01:45:10 host sshd[2681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.70.166
Jan  8 01:45:12 host sshd[2681]: Failed password for invalid user wyw from 192.99.70.166 port 41478 ssh2
Jan  8 01:45:12 host sshd[2681]: Received disconnect from 192.99.70.166 port 41478:11: Bye Bye [preauth]
Jan  8 01:45:12 host sshd[2681]: Disconnected from 192.99.70.166 port 41478 [preauth]
Jan  8 01:45:15 host sshd[2699]: Invalid user devops from 43.157.7.25 port 59364
Jan  8 01:45:15 host sshd[2699]: input_userauth_request: invalid user devops [preauth]
Jan  8 01:45:15 host sshd[2699]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 01:45:15 host sshd[2699]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.157.7.25
Jan  8 01:45:17 host sshd[2706]: Invalid user vsm from 49.247.46.44 port 14749
Jan  8 01:45:17 host sshd[2706]: input_userauth_request: invalid user vsm [preauth]
Jan  8 01:45:17 host sshd[2706]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 01:45:17 host sshd[2706]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.247.46.44
Jan  8 01:45:17 host sshd[2699]: Failed password for invalid user devops from 43.157.7.25 port 59364 ssh2
Jan  8 01:45:17 host sshd[2699]: Received disconnect from 43.157.7.25 port 59364:11: Bye Bye [preauth]
Jan  8 01:45:17 host sshd[2699]: Disconnected from 43.157.7.25 port 59364 [preauth]
Jan  8 01:45:19 host sshd[2706]: Failed password for invalid user vsm from 49.247.46.44 port 14749 ssh2
Jan  8 01:45:19 host sshd[2706]: Received disconnect from 49.247.46.44 port 14749:11: Bye Bye [preauth]
Jan  8 01:45:19 host sshd[2706]: Disconnected from 49.247.46.44 port 14749 [preauth]
Jan  8 01:45:35 host sshd[2800]: Invalid user devops from 51.38.231.112 port 43210
Jan  8 01:45:35 host sshd[2800]: input_userauth_request: invalid user devops [preauth]
Jan  8 01:45:35 host sshd[2800]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 01:45:35 host sshd[2800]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.231.112
Jan  8 01:45:38 host sshd[2800]: Failed password for invalid user devops from 51.38.231.112 port 43210 ssh2
Jan  8 01:45:38 host sshd[2800]: Received disconnect from 51.38.231.112 port 43210:11: Bye Bye [preauth]
Jan  8 01:45:38 host sshd[2800]: Disconnected from 51.38.231.112 port 43210 [preauth]
Jan  8 01:45:45 host sshd[2846]: Invalid user baldo from 90.68.121.105 port 37804
Jan  8 01:45:45 host sshd[2846]: input_userauth_request: invalid user baldo [preauth]
Jan  8 01:45:45 host sshd[2846]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 01:45:45 host sshd[2846]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=90.68.121.105
Jan  8 01:45:45 host sshd[2858]: Invalid user qiyuesuo from 3.108.244.24 port 43046
Jan  8 01:45:45 host sshd[2858]: input_userauth_request: invalid user qiyuesuo [preauth]
Jan  8 01:45:45 host sshd[2858]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 01:45:45 host sshd[2858]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=3.108.244.24
Jan  8 01:45:47 host sshd[2846]: Failed password for invalid user baldo from 90.68.121.105 port 37804 ssh2
Jan  8 01:45:47 host sshd[2858]: Failed password for invalid user qiyuesuo from 3.108.244.24 port 43046 ssh2
Jan  8 01:45:47 host sshd[2858]: Received disconnect from 3.108.244.24 port 43046:11: Bye Bye [preauth]
Jan  8 01:45:47 host sshd[2858]: Disconnected from 3.108.244.24 port 43046 [preauth]
Jan  8 01:45:47 host sshd[2846]: Received disconnect from 90.68.121.105 port 37804:11: Bye Bye [preauth]
Jan  8 01:45:47 host sshd[2846]: Disconnected from 90.68.121.105 port 37804 [preauth]
Jan  8 01:46:05 host sshd[2925]: Invalid user baldo from 192.241.171.230 port 49260
Jan  8 01:46:05 host sshd[2925]: input_userauth_request: invalid user baldo [preauth]
Jan  8 01:46:05 host sshd[2925]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 01:46:05 host sshd[2925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.171.230
Jan  8 01:46:06 host sshd[2925]: Failed password for invalid user baldo from 192.241.171.230 port 49260 ssh2
Jan  8 01:46:09 host sshd[2962]: Invalid user vsm from 41.93.33.2 port 45870
Jan  8 01:46:09 host sshd[2962]: input_userauth_request: invalid user vsm [preauth]
Jan  8 01:46:09 host sshd[2962]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 01:46:09 host sshd[2962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.93.33.2
Jan  8 01:46:10 host sshd[2967]: Invalid user roseanne from 207.138.39.234 port 36228
Jan  8 01:46:10 host sshd[2967]: input_userauth_request: invalid user roseanne [preauth]
Jan  8 01:46:10 host sshd[2967]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 01:46:10 host sshd[2967]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.138.39.234
Jan  8 01:46:10 host sshd[2962]: Failed password for invalid user vsm from 41.93.33.2 port 45870 ssh2
Jan  8 01:46:11 host sshd[2962]: Received disconnect from 41.93.33.2 port 45870:11: Bye Bye [preauth]
Jan  8 01:46:11 host sshd[2962]: Disconnected from 41.93.33.2 port 45870 [preauth]
Jan  8 01:46:11 host sshd[2975]: Invalid user baldo from 144.217.173.156 port 38990
Jan  8 01:46:11 host sshd[2975]: input_userauth_request: invalid user baldo [preauth]
Jan  8 01:46:11 host sshd[2975]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 01:46:11 host sshd[2975]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.173.156
Jan  8 01:46:12 host sshd[2969]: Invalid user vsm from 138.197.141.89 port 57636
Jan  8 01:46:12 host sshd[2969]: input_userauth_request: invalid user vsm [preauth]
Jan  8 01:46:12 host sshd[2969]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 01:46:12 host sshd[2969]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.141.89
Jan  8 01:46:12 host sshd[2967]: Failed password for invalid user roseanne from 207.138.39.234 port 36228 ssh2
Jan  8 01:46:13 host sshd[2967]: Received disconnect from 207.138.39.234 port 36228:11: Bye Bye [preauth]
Jan  8 01:46:13 host sshd[2967]: Disconnected from 207.138.39.234 port 36228 [preauth]
Jan  8 01:46:14 host sshd[2975]: Failed password for invalid user baldo from 144.217.173.156 port 38990 ssh2
Jan  8 01:46:14 host sshd[2975]: Received disconnect from 144.217.173.156 port 38990:11: Bye Bye [preauth]
Jan  8 01:46:14 host sshd[2975]: Disconnected from 144.217.173.156 port 38990 [preauth]
Jan  8 01:46:14 host sshd[2969]: Failed password for invalid user vsm from 138.197.141.89 port 57636 ssh2
Jan  8 01:46:14 host sshd[2969]: Received disconnect from 138.197.141.89 port 57636:11: Bye Bye [preauth]
Jan  8 01:46:14 host sshd[2969]: Disconnected from 138.197.141.89 port 57636 [preauth]
Jan  8 01:46:16 host sshd[2992]: Invalid user vsm from 192.99.70.166 port 33708
Jan  8 01:46:16 host sshd[2992]: input_userauth_request: invalid user vsm [preauth]
Jan  8 01:46:16 host sshd[2992]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 01:46:16 host sshd[2992]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.70.166
Jan  8 01:46:18 host sshd[2992]: Failed password for invalid user vsm from 192.99.70.166 port 33708 ssh2
Jan  8 01:46:18 host sshd[2992]: Received disconnect from 192.99.70.166 port 33708:11: Bye Bye [preauth]
Jan  8 01:46:18 host sshd[2992]: Disconnected from 192.99.70.166 port 33708 [preauth]
Jan  8 01:46:21 host sshd[2999]: Invalid user vsm from 43.157.7.25 port 58454
Jan  8 01:46:21 host sshd[2999]: input_userauth_request: invalid user vsm [preauth]
Jan  8 01:46:21 host sshd[2999]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 01:46:21 host sshd[2999]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.157.7.25
Jan  8 01:46:23 host sshd[2999]: Failed password for invalid user vsm from 43.157.7.25 port 58454 ssh2
Jan  8 01:46:23 host sshd[2999]: Received disconnect from 43.157.7.25 port 58454:11: Bye Bye [preauth]
Jan  8 01:46:23 host sshd[2999]: Disconnected from 43.157.7.25 port 58454 [preauth]
Jan  8 01:46:37 host sshd[3113]: Invalid user xiaoguo from 51.38.231.112 port 38304
Jan  8 01:46:37 host sshd[3113]: input_userauth_request: invalid user xiaoguo [preauth]
Jan  8 01:46:37 host sshd[3113]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 01:46:37 host sshd[3113]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.231.112
Jan  8 01:46:39 host sshd[3113]: Failed password for invalid user xiaoguo from 51.38.231.112 port 38304 ssh2
Jan  8 01:46:39 host sshd[3113]: Received disconnect from 51.38.231.112 port 38304:11: Bye Bye [preauth]
Jan  8 01:46:39 host sshd[3113]: Disconnected from 51.38.231.112 port 38304 [preauth]
Jan  8 01:46:45 host sshd[3177]: Invalid user wyw from 49.247.46.44 port 33849
Jan  8 01:46:45 host sshd[3177]: input_userauth_request: invalid user wyw [preauth]
Jan  8 01:46:45 host sshd[3177]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 01:46:45 host sshd[3177]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.247.46.44
Jan  8 01:46:47 host sshd[3177]: Failed password for invalid user wyw from 49.247.46.44 port 33849 ssh2
Jan  8 01:46:48 host sshd[3177]: Received disconnect from 49.247.46.44 port 33849:11: Bye Bye [preauth]
Jan  8 01:46:48 host sshd[3177]: Disconnected from 49.247.46.44 port 33849 [preauth]
Jan  8 01:46:59 host sshd[3246]: Invalid user gay from 3.108.244.24 port 37746
Jan  8 01:46:59 host sshd[3246]: input_userauth_request: invalid user gay [preauth]
Jan  8 01:46:59 host sshd[3246]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 01:46:59 host sshd[3246]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=3.108.244.24
Jan  8 01:47:01 host sshd[3249]: Invalid user wyw from 90.68.121.105 port 48310
Jan  8 01:47:01 host sshd[3249]: input_userauth_request: invalid user wyw [preauth]
Jan  8 01:47:01 host sshd[3249]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 01:47:01 host sshd[3249]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=90.68.121.105
Jan  8 01:47:01 host sshd[3246]: Failed password for invalid user gay from 3.108.244.24 port 37746 ssh2
Jan  8 01:47:03 host sshd[3249]: Failed password for invalid user wyw from 90.68.121.105 port 48310 ssh2
Jan  8 01:47:03 host sshd[3249]: Received disconnect from 90.68.121.105 port 48310:11: Bye Bye [preauth]
Jan  8 01:47:03 host sshd[3249]: Disconnected from 90.68.121.105 port 48310 [preauth]
Jan  8 01:47:17 host sshd[3364]: Invalid user devops from 144.217.173.156 port 60396
Jan  8 01:47:17 host sshd[3364]: input_userauth_request: invalid user devops [preauth]
Jan  8 01:47:17 host sshd[3364]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 01:47:17 host sshd[3364]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.173.156
Jan  8 01:47:17 host sshd[3361]: Invalid user ivanova from 70.37.75.157 port 51654
Jan  8 01:47:17 host sshd[3361]: input_userauth_request: invalid user ivanova [preauth]
Jan  8 01:47:17 host sshd[3361]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 01:47:17 host sshd[3361]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.37.75.157
Jan  8 01:47:19 host sshd[3364]: Failed password for invalid user devops from 144.217.173.156 port 60396 ssh2
Jan  8 01:47:19 host sshd[3364]: Received disconnect from 144.217.173.156 port 60396:11: Bye Bye [preauth]
Jan  8 01:47:19 host sshd[3364]: Disconnected from 144.217.173.156 port 60396 [preauth]
Jan  8 01:47:19 host sshd[3361]: Failed password for invalid user ivanova from 70.37.75.157 port 51654 ssh2
Jan  8 01:47:19 host sshd[3361]: Received disconnect from 70.37.75.157 port 51654:11: Bye Bye [preauth]
Jan  8 01:47:19 host sshd[3361]: Disconnected from 70.37.75.157 port 51654 [preauth]
Jan  8 01:47:38 host sshd[3476]: Invalid user wyw from 41.93.33.2 port 51626
Jan  8 01:47:38 host sshd[3476]: input_userauth_request: invalid user wyw [preauth]
Jan  8 01:47:38 host sshd[3476]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 01:47:38 host sshd[3476]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.93.33.2
Jan  8 01:47:40 host sshd[3476]: Failed password for invalid user wyw from 41.93.33.2 port 51626 ssh2
Jan  8 01:47:40 host sshd[3480]: Invalid user wyw from 138.197.141.89 port 56902
Jan  8 01:47:40 host sshd[3480]: input_userauth_request: invalid user wyw [preauth]
Jan  8 01:47:40 host sshd[3480]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 01:47:40 host sshd[3480]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.141.89
Jan  8 01:47:40 host sshd[3476]: Received disconnect from 41.93.33.2 port 51626:11: Bye Bye [preauth]
Jan  8 01:47:40 host sshd[3476]: Disconnected from 41.93.33.2 port 51626 [preauth]
Jan  8 01:47:42 host sshd[3480]: Failed password for invalid user wyw from 138.197.141.89 port 56902 ssh2
Jan  8 01:47:55 host sshd[3567]: Invalid user kruger from 207.138.39.234 port 43372
Jan  8 01:47:55 host sshd[3567]: input_userauth_request: invalid user kruger [preauth]
Jan  8 01:47:55 host sshd[3567]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 01:47:55 host sshd[3567]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.138.39.234
Jan  8 01:47:57 host sshd[3567]: Failed password for invalid user kruger from 207.138.39.234 port 43372 ssh2
Jan  8 01:47:58 host sshd[3567]: Received disconnect from 207.138.39.234 port 43372:11: Bye Bye [preauth]
Jan  8 01:47:58 host sshd[3567]: Disconnected from 207.138.39.234 port 43372 [preauth]
Jan  8 01:48:58 host sshd[3725]: Invalid user manju from 70.37.75.157 port 49870
Jan  8 01:48:58 host sshd[3725]: input_userauth_request: invalid user manju [preauth]
Jan  8 01:48:58 host sshd[3725]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 01:48:58 host sshd[3725]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.37.75.157
Jan  8 01:49:00 host sshd[3725]: Failed password for invalid user manju from 70.37.75.157 port 49870 ssh2
Jan  8 01:49:00 host sshd[3725]: Received disconnect from 70.37.75.157 port 49870:11: Bye Bye [preauth]
Jan  8 01:49:00 host sshd[3725]: Disconnected from 70.37.75.157 port 49870 [preauth]
Jan  8 01:50:24 host sshd[4046]: Invalid user hadoop from 51.143.96.123 port 54492
Jan  8 01:50:24 host sshd[4046]: input_userauth_request: invalid user hadoop [preauth]
Jan  8 01:50:24 host sshd[4046]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 01:50:24 host sshd[4046]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.143.96.123
Jan  8 01:50:26 host sshd[4046]: Failed password for invalid user hadoop from 51.143.96.123 port 54492 ssh2
Jan  8 01:50:27 host sshd[4046]: Received disconnect from 51.143.96.123 port 54492:11: Bye Bye [preauth]
Jan  8 01:50:27 host sshd[4046]: Disconnected from 51.143.96.123 port 54492 [preauth]
Jan  8 01:54:25 host sshd[4535]: Invalid user wangk from 51.143.96.123 port 44638
Jan  8 01:54:25 host sshd[4535]: input_userauth_request: invalid user wangk [preauth]
Jan  8 01:54:25 host sshd[4535]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 01:54:25 host sshd[4535]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.143.96.123
Jan  8 01:54:27 host sshd[4535]: Failed password for invalid user wangk from 51.143.96.123 port 44638 ssh2
Jan  8 01:54:27 host sshd[4535]: Received disconnect from 51.143.96.123 port 44638:11: Bye Bye [preauth]
Jan  8 01:54:27 host sshd[4535]: Disconnected from 51.143.96.123 port 44638 [preauth]
Jan  8 01:55:35 host sshd[4800]: Invalid user nagios from 51.143.96.123 port 44230
Jan  8 01:55:35 host sshd[4800]: input_userauth_request: invalid user nagios [preauth]
Jan  8 01:55:35 host sshd[4800]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 01:55:35 host sshd[4800]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.143.96.123
Jan  8 01:55:38 host sshd[4800]: Failed password for invalid user nagios from 51.143.96.123 port 44230 ssh2
Jan  8 01:56:44 host sshd[4983]: Invalid user mj from 116.203.235.145 port 38908
Jan  8 01:56:44 host sshd[4983]: input_userauth_request: invalid user mj [preauth]
Jan  8 01:56:44 host sshd[4983]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 01:56:44 host sshd[4983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.203.235.145
Jan  8 01:56:46 host sshd[4983]: Failed password for invalid user mj from 116.203.235.145 port 38908 ssh2
Jan  8 01:56:46 host sshd[4983]: Received disconnect from 116.203.235.145 port 38908:11: Bye Bye [preauth]
Jan  8 01:56:46 host sshd[4983]: Disconnected from 116.203.235.145 port 38908 [preauth]
Jan  8 01:56:51 host sshd[4993]: Invalid user kamil from 208.109.38.20 port 39176
Jan  8 01:56:51 host sshd[4993]: input_userauth_request: invalid user kamil [preauth]
Jan  8 01:56:51 host sshd[4993]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 01:56:51 host sshd[4993]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=208.109.38.20
Jan  8 01:56:53 host sshd[4993]: Failed password for invalid user kamil from 208.109.38.20 port 39176 ssh2
Jan  8 01:56:53 host sshd[4993]: Received disconnect from 208.109.38.20 port 39176:11: Bye Bye [preauth]
Jan  8 01:56:53 host sshd[4993]: Disconnected from 208.109.38.20 port 39176 [preauth]
Jan  8 01:57:18 host sshd[5059]: Invalid user quincy from 104.248.163.6 port 52766
Jan  8 01:57:18 host sshd[5059]: input_userauth_request: invalid user quincy [preauth]
Jan  8 01:57:18 host sshd[5059]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 01:57:18 host sshd[5059]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.163.6
Jan  8 01:57:20 host sshd[5059]: Failed password for invalid user quincy from 104.248.163.6 port 52766 ssh2
Jan  8 01:57:20 host sshd[5059]: Received disconnect from 104.248.163.6 port 52766:11: Bye Bye [preauth]
Jan  8 01:57:20 host sshd[5059]: Disconnected from 104.248.163.6 port 52766 [preauth]
Jan  8 01:57:25 host sshd[5077]: Invalid user tbd from 159.223.59.81 port 33234
Jan  8 01:57:25 host sshd[5077]: input_userauth_request: invalid user tbd [preauth]
Jan  8 01:57:25 host sshd[5077]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 01:57:25 host sshd[5077]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.223.59.81
Jan  8 01:57:26 host sshd[5077]: Failed password for invalid user tbd from 159.223.59.81 port 33234 ssh2
Jan  8 01:57:27 host sshd[5077]: Received disconnect from 159.223.59.81 port 33234:11: Bye Bye [preauth]
Jan  8 01:57:27 host sshd[5077]: Disconnected from 159.223.59.81 port 33234 [preauth]
Jan  8 01:57:42 host sshd[5126]: Invalid user virginia from 103.111.250.87 port 44440
Jan  8 01:57:42 host sshd[5126]: input_userauth_request: invalid user virginia [preauth]
Jan  8 01:57:42 host sshd[5126]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 01:57:42 host sshd[5126]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.111.250.87
Jan  8 01:57:45 host sshd[5126]: Failed password for invalid user virginia from 103.111.250.87 port 44440 ssh2
Jan  8 01:57:45 host sshd[5126]: Received disconnect from 103.111.250.87 port 44440:11: Bye Bye [preauth]
Jan  8 01:57:45 host sshd[5126]: Disconnected from 103.111.250.87 port 44440 [preauth]
Jan  8 01:58:14 host sshd[5192]: Invalid user owner from 165.232.158.187 port 39832
Jan  8 01:58:14 host sshd[5192]: input_userauth_request: invalid user owner [preauth]
Jan  8 01:58:14 host sshd[5192]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 01:58:14 host sshd[5192]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.158.187
Jan  8 01:58:15 host sshd[5192]: Failed password for invalid user owner from 165.232.158.187 port 39832 ssh2
Jan  8 01:58:16 host sshd[5192]: Received disconnect from 165.232.158.187 port 39832:11: Bye Bye [preauth]
Jan  8 01:58:16 host sshd[5192]: Disconnected from 165.232.158.187 port 39832 [preauth]
Jan  8 02:00:14 host sshd[5478]: Invalid user scp from 181.114.143.4 port 51908
Jan  8 02:00:14 host sshd[5478]: input_userauth_request: invalid user scp [preauth]
Jan  8 02:00:14 host sshd[5478]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 02:00:14 host sshd[5478]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.114.143.4
Jan  8 02:00:16 host sshd[5478]: Failed password for invalid user scp from 181.114.143.4 port 51908 ssh2
Jan  8 02:00:17 host sshd[5478]: Received disconnect from 181.114.143.4 port 51908:11: Bye Bye [preauth]
Jan  8 02:00:17 host sshd[5478]: Disconnected from 181.114.143.4 port 51908 [preauth]
Jan  8 02:01:44 host sshd[5818]: Invalid user naveen from 23.95.90.184 port 43430
Jan  8 02:01:44 host sshd[5818]: input_userauth_request: invalid user naveen [preauth]
Jan  8 02:01:44 host sshd[5818]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 02:01:44 host sshd[5818]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.95.90.184
Jan  8 02:01:46 host sshd[5818]: Failed password for invalid user naveen from 23.95.90.184 port 43430 ssh2
Jan  8 02:01:46 host sshd[5818]: Received disconnect from 23.95.90.184 port 43430:11: Bye Bye [preauth]
Jan  8 02:01:46 host sshd[5818]: Disconnected from 23.95.90.184 port 43430 [preauth]
Jan  8 02:01:51 host sshd[5825]: User root from 5.2.70.140 not allowed because not listed in AllowUsers
Jan  8 02:01:51 host sshd[5825]: input_userauth_request: invalid user root [preauth]
Jan  8 02:01:52 host sshd[5825]: Connection closed by 5.2.70.140 port 60714 [preauth]
Jan  8 02:01:55 host sshd[5834]: Invalid user ops from 165.232.158.187 port 48864
Jan  8 02:01:55 host sshd[5834]: input_userauth_request: invalid user ops [preauth]
Jan  8 02:01:55 host sshd[5834]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 02:01:55 host sshd[5834]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.158.187
Jan  8 02:01:56 host sshd[5837]: Invalid user usr01 from 104.248.163.6 port 48070
Jan  8 02:01:56 host sshd[5837]: input_userauth_request: invalid user usr01 [preauth]
Jan  8 02:01:56 host sshd[5837]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 02:01:56 host sshd[5837]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.163.6
Jan  8 02:01:57 host sshd[5834]: Failed password for invalid user ops from 165.232.158.187 port 48864 ssh2
Jan  8 02:01:57 host sshd[5834]: Received disconnect from 165.232.158.187 port 48864:11: Bye Bye [preauth]
Jan  8 02:01:57 host sshd[5834]: Disconnected from 165.232.158.187 port 48864 [preauth]
Jan  8 02:01:58 host sshd[5837]: Failed password for invalid user usr01 from 104.248.163.6 port 48070 ssh2
Jan  8 02:01:59 host sshd[5837]: Received disconnect from 104.248.163.6 port 48070:11: Bye Bye [preauth]
Jan  8 02:01:59 host sshd[5837]: Disconnected from 104.248.163.6 port 48070 [preauth]
Jan  8 02:02:01 host sshd[5842]: User root from 185.220.102.244 not allowed because not listed in AllowUsers
Jan  8 02:02:01 host sshd[5842]: input_userauth_request: invalid user root [preauth]
Jan  8 02:02:01 host unix_chkpwd[5855]: password check failed for user (root)
Jan  8 02:02:01 host sshd[5842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.102.244  user=root
Jan  8 02:02:01 host sshd[5842]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:02:04 host sshd[5842]: Failed password for invalid user root from 185.220.102.244 port 13466 ssh2
Jan  8 02:02:05 host unix_chkpwd[5863]: password check failed for user (root)
Jan  8 02:02:05 host sshd[5842]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:02:07 host sshd[5842]: Failed password for invalid user root from 185.220.102.244 port 13466 ssh2
Jan  8 02:02:07 host sshd[5867]: Invalid user scp from 116.203.235.145 port 32946
Jan  8 02:02:07 host sshd[5867]: input_userauth_request: invalid user scp [preauth]
Jan  8 02:02:07 host sshd[5867]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 02:02:07 host sshd[5867]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.203.235.145
Jan  8 02:02:09 host sshd[5867]: Failed password for invalid user scp from 116.203.235.145 port 32946 ssh2
Jan  8 02:02:09 host sshd[5867]: Received disconnect from 116.203.235.145 port 32946:11: Bye Bye [preauth]
Jan  8 02:02:09 host sshd[5867]: Disconnected from 116.203.235.145 port 32946 [preauth]
Jan  8 02:02:14 host sshd[5881]: Invalid user dcmtk from 208.109.38.20 port 55044
Jan  8 02:02:14 host sshd[5881]: input_userauth_request: invalid user dcmtk [preauth]
Jan  8 02:02:14 host sshd[5881]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 02:02:14 host sshd[5881]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=208.109.38.20
Jan  8 02:02:16 host sshd[5881]: Failed password for invalid user dcmtk from 208.109.38.20 port 55044 ssh2
Jan  8 02:02:17 host sshd[5881]: Received disconnect from 208.109.38.20 port 55044:11: Bye Bye [preauth]
Jan  8 02:02:17 host sshd[5881]: Disconnected from 208.109.38.20 port 55044 [preauth]
Jan  8 02:02:29 host sshd[5927]: Invalid user satoshi from 159.223.59.81 port 57610
Jan  8 02:02:29 host sshd[5927]: input_userauth_request: invalid user satoshi [preauth]
Jan  8 02:02:29 host sshd[5927]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 02:02:29 host sshd[5927]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.223.59.81
Jan  8 02:02:31 host sshd[5927]: Failed password for invalid user satoshi from 159.223.59.81 port 57610 ssh2
Jan  8 02:02:31 host sshd[5927]: Received disconnect from 159.223.59.81 port 57610:11: Bye Bye [preauth]
Jan  8 02:02:31 host sshd[5927]: Disconnected from 159.223.59.81 port 57610 [preauth]
Jan  8 02:02:43 host sshd[5842]: Connection closed by 185.220.102.244 port 13466 [preauth]
Jan  8 02:02:43 host sshd[5842]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.102.244  user=root
Jan  8 02:03:05 host sshd[6001]: Invalid user zhanggong from 104.248.163.6 port 47344
Jan  8 02:03:05 host sshd[6001]: input_userauth_request: invalid user zhanggong [preauth]
Jan  8 02:03:05 host sshd[6001]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 02:03:05 host sshd[6001]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.163.6
Jan  8 02:03:07 host sshd[6005]: Invalid user usr01 from 165.232.158.187 port 60798
Jan  8 02:03:07 host sshd[6005]: input_userauth_request: invalid user usr01 [preauth]
Jan  8 02:03:07 host sshd[6005]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 02:03:07 host sshd[6005]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.158.187
Jan  8 02:03:08 host sshd[6001]: Failed password for invalid user zhanggong from 104.248.163.6 port 47344 ssh2
Jan  8 02:03:08 host sshd[6005]: Failed password for invalid user usr01 from 165.232.158.187 port 60798 ssh2
Jan  8 02:03:08 host sshd[6005]: Received disconnect from 165.232.158.187 port 60798:11: Bye Bye [preauth]
Jan  8 02:03:08 host sshd[6005]: Disconnected from 165.232.158.187 port 60798 [preauth]
Jan  8 02:03:31 host sshd[6124]: Invalid user miranda from 208.109.38.20 port 48514
Jan  8 02:03:31 host sshd[6124]: input_userauth_request: invalid user miranda [preauth]
Jan  8 02:03:31 host sshd[6124]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 02:03:31 host sshd[6124]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=208.109.38.20
Jan  8 02:03:31 host sshd[6126]: Invalid user lishan from 181.114.143.4 port 60002
Jan  8 02:03:31 host sshd[6126]: input_userauth_request: invalid user lishan [preauth]
Jan  8 02:03:31 host sshd[6126]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 02:03:31 host sshd[6126]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.114.143.4
Jan  8 02:03:32 host sshd[6129]: Invalid user owner from 23.95.90.184 port 45634
Jan  8 02:03:32 host sshd[6129]: input_userauth_request: invalid user owner [preauth]
Jan  8 02:03:32 host sshd[6129]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 02:03:32 host sshd[6129]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.95.90.184
Jan  8 02:03:33 host sshd[6134]: Invalid user alain from 103.111.250.87 port 58284
Jan  8 02:03:33 host sshd[6134]: input_userauth_request: invalid user alain [preauth]
Jan  8 02:03:33 host sshd[6134]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 02:03:33 host sshd[6134]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.111.250.87
Jan  8 02:03:34 host sshd[6124]: Failed password for invalid user miranda from 208.109.38.20 port 48514 ssh2
Jan  8 02:03:34 host sshd[6129]: Failed password for invalid user owner from 23.95.90.184 port 45634 ssh2
Jan  8 02:03:34 host sshd[6126]: Failed password for invalid user lishan from 181.114.143.4 port 60002 ssh2
Jan  8 02:03:34 host sshd[6129]: Received disconnect from 23.95.90.184 port 45634:11: Bye Bye [preauth]
Jan  8 02:03:34 host sshd[6129]: Disconnected from 23.95.90.184 port 45634 [preauth]
Jan  8 02:03:34 host sshd[6124]: Received disconnect from 208.109.38.20 port 48514:11: Bye Bye [preauth]
Jan  8 02:03:34 host sshd[6124]: Disconnected from 208.109.38.20 port 48514 [preauth]
Jan  8 02:03:34 host sshd[6126]: Received disconnect from 181.114.143.4 port 60002:11: Bye Bye [preauth]
Jan  8 02:03:34 host sshd[6126]: Disconnected from 181.114.143.4 port 60002 [preauth]
Jan  8 02:03:35 host sshd[6134]: Failed password for invalid user alain from 103.111.250.87 port 58284 ssh2
Jan  8 02:03:35 host sshd[6134]: Received disconnect from 103.111.250.87 port 58284:11: Bye Bye [preauth]
Jan  8 02:03:35 host sshd[6134]: Disconnected from 103.111.250.87 port 58284 [preauth]
Jan  8 02:03:38 host sshd[6007]: Connection closed by 162.247.72.199 port 58392 [preauth]
Jan  8 02:04:02 host sshd[6249]: Invalid user lishan from 159.223.59.81 port 56826
Jan  8 02:04:02 host sshd[6249]: input_userauth_request: invalid user lishan [preauth]
Jan  8 02:04:02 host sshd[6249]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 02:04:02 host sshd[6249]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.223.59.81
Jan  8 02:04:03 host sshd[6249]: Failed password for invalid user lishan from 159.223.59.81 port 56826 ssh2
Jan  8 02:04:03 host sshd[6249]: Received disconnect from 159.223.59.81 port 56826:11: Bye Bye [preauth]
Jan  8 02:04:03 host sshd[6249]: Disconnected from 159.223.59.81 port 56826 [preauth]
Jan  8 02:04:14 host sshd[6177]: Connection closed by 162.247.74.217 port 39756 [preauth]
Jan  8 02:04:30 host sshd[6374]: Invalid user aclark from 116.203.235.145 port 51438
Jan  8 02:04:30 host sshd[6374]: input_userauth_request: invalid user aclark [preauth]
Jan  8 02:04:30 host sshd[6374]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 02:04:30 host sshd[6374]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.203.235.145
Jan  8 02:04:33 host sshd[6374]: Failed password for invalid user aclark from 116.203.235.145 port 51438 ssh2
Jan  8 02:04:38 host sshd[6329]: User root from 205.185.117.149 not allowed because not listed in AllowUsers
Jan  8 02:04:38 host sshd[6329]: input_userauth_request: invalid user root [preauth]
Jan  8 02:04:38 host unix_chkpwd[6425]: password check failed for user (root)
Jan  8 02:04:38 host sshd[6329]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.117.149  user=root
Jan  8 02:04:38 host sshd[6329]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:04:39 host sshd[6329]: Failed password for invalid user root from 205.185.117.149 port 18841 ssh2
Jan  8 02:04:41 host unix_chkpwd[6433]: password check failed for user (root)
Jan  8 02:04:41 host sshd[6329]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:04:44 host sshd[6329]: Failed password for invalid user root from 205.185.117.149 port 18841 ssh2
Jan  8 02:04:45 host unix_chkpwd[6444]: password check failed for user (root)
Jan  8 02:04:45 host sshd[6329]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:04:46 host sshd[6329]: Failed password for invalid user root from 205.185.117.149 port 18841 ssh2
Jan  8 02:04:47 host unix_chkpwd[6453]: password check failed for user (root)
Jan  8 02:04:47 host sshd[6329]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:04:48 host sshd[6451]: Invalid user satoshi from 23.95.90.184 port 45224
Jan  8 02:04:48 host sshd[6451]: input_userauth_request: invalid user satoshi [preauth]
Jan  8 02:04:48 host sshd[6451]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 02:04:48 host sshd[6451]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.95.90.184
Jan  8 02:04:49 host sshd[6329]: Failed password for invalid user root from 205.185.117.149 port 18841 ssh2
Jan  8 02:04:50 host sshd[6451]: Failed password for invalid user satoshi from 23.95.90.184 port 45224 ssh2
Jan  8 02:04:50 host unix_chkpwd[6464]: password check failed for user (root)
Jan  8 02:04:50 host sshd[6329]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:04:50 host sshd[6451]: Received disconnect from 23.95.90.184 port 45224:11: Bye Bye [preauth]
Jan  8 02:04:50 host sshd[6451]: Disconnected from 23.95.90.184 port 45224 [preauth]
Jan  8 02:04:52 host sshd[6329]: Failed password for invalid user root from 205.185.117.149 port 18841 ssh2
Jan  8 02:05:04 host sshd[6588]: Invalid user elite from 103.111.250.87 port 38208
Jan  8 02:05:04 host sshd[6588]: input_userauth_request: invalid user elite [preauth]
Jan  8 02:05:04 host sshd[6588]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 02:05:04 host sshd[6588]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.111.250.87
Jan  8 02:05:06 host sshd[6588]: Failed password for invalid user elite from 103.111.250.87 port 38208 ssh2
Jan  8 02:05:06 host sshd[6588]: Received disconnect from 103.111.250.87 port 38208:11: Bye Bye [preauth]
Jan  8 02:05:06 host sshd[6588]: Disconnected from 103.111.250.87 port 38208 [preauth]
Jan  8 02:05:24 host sshd[6675]: Invalid user wilfred from 181.114.143.4 port 53542
Jan  8 02:05:24 host sshd[6675]: input_userauth_request: invalid user wilfred [preauth]
Jan  8 02:05:24 host sshd[6675]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 02:05:24 host sshd[6675]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.114.143.4
Jan  8 02:05:27 host sshd[6675]: Failed password for invalid user wilfred from 181.114.143.4 port 53542 ssh2
Jan  8 02:06:05 host sshd[6802]: Connection closed by 83.97.20.84 port 9156 [preauth]
Jan  8 02:06:49 host sshd[6990]: User root from 45.139.122.241 not allowed because not listed in AllowUsers
Jan  8 02:06:49 host sshd[6990]: input_userauth_request: invalid user root [preauth]
Jan  8 02:06:49 host unix_chkpwd[7090]: password check failed for user (root)
Jan  8 02:06:49 host sshd[6990]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.139.122.241  user=root
Jan  8 02:06:49 host sshd[6990]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:06:51 host sshd[6990]: Failed password for invalid user root from 45.139.122.241 port 60516 ssh2
Jan  8 02:06:52 host unix_chkpwd[7095]: password check failed for user (root)
Jan  8 02:06:52 host sshd[6990]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:06:54 host sshd[6990]: Failed password for invalid user root from 45.139.122.241 port 60516 ssh2
Jan  8 02:06:54 host unix_chkpwd[7101]: password check failed for user (root)
Jan  8 02:06:54 host sshd[6990]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:06:56 host sshd[6990]: Failed password for invalid user root from 45.139.122.241 port 60516 ssh2
Jan  8 02:06:57 host unix_chkpwd[7127]: password check failed for user (root)
Jan  8 02:06:57 host sshd[6990]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:06:59 host sshd[6990]: Failed password for invalid user root from 45.139.122.241 port 60516 ssh2
Jan  8 02:08:16 host sshd[7330]: User root from 162.247.73.192 not allowed because not listed in AllowUsers
Jan  8 02:08:16 host sshd[7330]: input_userauth_request: invalid user root [preauth]
Jan  8 02:08:16 host unix_chkpwd[7397]: password check failed for user (root)
Jan  8 02:08:16 host sshd[7330]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.247.73.192  user=root
Jan  8 02:08:16 host sshd[7330]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:08:18 host sshd[7330]: Failed password for invalid user root from 162.247.73.192 port 51270 ssh2
Jan  8 02:08:22 host unix_chkpwd[7413]: password check failed for user (root)
Jan  8 02:08:22 host sshd[7330]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:08:24 host sshd[7330]: Failed password for invalid user root from 162.247.73.192 port 51270 ssh2
Jan  8 02:08:26 host unix_chkpwd[7441]: password check failed for user (root)
Jan  8 02:08:26 host sshd[7330]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:08:28 host sshd[7330]: Failed password for invalid user root from 162.247.73.192 port 51270 ssh2
Jan  8 02:08:29 host unix_chkpwd[7447]: password check failed for user (root)
Jan  8 02:08:29 host sshd[7330]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:08:32 host sshd[7330]: Failed password for invalid user root from 162.247.73.192 port 51270 ssh2
Jan  8 02:09:11 host sshd[7644]: User root from 185.129.61.6 not allowed because not listed in AllowUsers
Jan  8 02:09:11 host sshd[7644]: input_userauth_request: invalid user root [preauth]
Jan  8 02:09:11 host unix_chkpwd[7675]: password check failed for user (root)
Jan  8 02:09:11 host sshd[7644]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.129.61.6  user=root
Jan  8 02:09:11 host sshd[7644]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:09:14 host sshd[7644]: Failed password for invalid user root from 185.129.61.6 port 63263 ssh2
Jan  8 02:09:17 host unix_chkpwd[7693]: password check failed for user (root)
Jan  8 02:09:17 host sshd[7644]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:09:19 host sshd[7644]: Failed password for invalid user root from 185.129.61.6 port 63263 ssh2
Jan  8 02:09:31 host unix_chkpwd[7740]: password check failed for user (root)
Jan  8 02:09:31 host sshd[7644]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:09:33 host sshd[7644]: Failed password for invalid user root from 185.129.61.6 port 63263 ssh2
Jan  8 02:11:20 host sshd[7973]: Connection closed by 23.129.64.222 port 45940 [preauth]
Jan  8 02:11:21 host sshd[8121]: Connection closed by 94.102.61.20 port 38334 [preauth]
Jan  8 02:11:32 host sshd[8146]: User root from 162.247.74.206 not allowed because not listed in AllowUsers
Jan  8 02:11:32 host sshd[8146]: input_userauth_request: invalid user root [preauth]
Jan  8 02:11:32 host unix_chkpwd[8187]: password check failed for user (root)
Jan  8 02:11:32 host sshd[8146]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.247.74.206  user=root
Jan  8 02:11:32 host sshd[8146]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:11:34 host sshd[8146]: Failed password for invalid user root from 162.247.74.206 port 47292 ssh2
Jan  8 02:11:35 host unix_chkpwd[8193]: password check failed for user (root)
Jan  8 02:11:35 host sshd[8146]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:11:37 host sshd[8146]: Failed password for invalid user root from 162.247.74.206 port 47292 ssh2
Jan  8 02:11:39 host unix_chkpwd[8202]: password check failed for user (root)
Jan  8 02:11:39 host sshd[8146]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:11:40 host sshd[8146]: Failed password for invalid user root from 162.247.74.206 port 47292 ssh2
Jan  8 02:11:41 host unix_chkpwd[8206]: password check failed for user (root)
Jan  8 02:11:41 host sshd[8146]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:11:43 host sshd[8146]: Failed password for invalid user root from 162.247.74.206 port 47292 ssh2
Jan  8 02:12:39 host sshd[8319]: User root from 162.247.74.204 not allowed because not listed in AllowUsers
Jan  8 02:12:39 host sshd[8319]: input_userauth_request: invalid user root [preauth]
Jan  8 02:12:39 host unix_chkpwd[8377]: password check failed for user (root)
Jan  8 02:12:39 host sshd[8319]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.247.74.204  user=root
Jan  8 02:12:39 host sshd[8319]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:12:41 host sshd[8319]: Failed password for invalid user root from 162.247.74.204 port 43958 ssh2
Jan  8 02:12:44 host unix_chkpwd[8388]: password check failed for user (root)
Jan  8 02:12:44 host sshd[8319]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:12:45 host sshd[8319]: Failed password for invalid user root from 162.247.74.204 port 43958 ssh2
Jan  8 02:12:47 host unix_chkpwd[8393]: password check failed for user (root)
Jan  8 02:12:47 host sshd[8319]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:12:49 host sshd[8319]: Failed password for invalid user root from 162.247.74.204 port 43958 ssh2
Jan  8 02:12:52 host unix_chkpwd[8419]: password check failed for user (root)
Jan  8 02:12:52 host sshd[8319]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:12:53 host sshd[8319]: Failed password for invalid user root from 162.247.74.204 port 43958 ssh2
Jan  8 02:13:28 host sshd[8516]: User root from 185.220.102.253 not allowed because not listed in AllowUsers
Jan  8 02:13:28 host sshd[8516]: input_userauth_request: invalid user root [preauth]
Jan  8 02:13:28 host unix_chkpwd[8552]: password check failed for user (root)
Jan  8 02:13:28 host sshd[8516]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.102.253  user=root
Jan  8 02:13:28 host sshd[8516]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:13:30 host sshd[8516]: Failed password for invalid user root from 185.220.102.253 port 11208 ssh2
Jan  8 02:13:30 host unix_chkpwd[8558]: password check failed for user (root)
Jan  8 02:13:30 host sshd[8516]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:13:32 host sshd[8516]: Failed password for invalid user root from 185.220.102.253 port 11208 ssh2
Jan  8 02:13:33 host unix_chkpwd[8567]: password check failed for user (root)
Jan  8 02:13:33 host sshd[8516]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:13:34 host sshd[8516]: Failed password for invalid user root from 185.220.102.253 port 11208 ssh2
Jan  8 02:13:35 host unix_chkpwd[8574]: password check failed for user (root)
Jan  8 02:13:35 host sshd[8516]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:13:37 host sshd[8516]: Failed password for invalid user root from 185.220.102.253 port 11208 ssh2
Jan  8 02:14:26 host sshd[8717]: User root from 198.98.60.107 not allowed because not listed in AllowUsers
Jan  8 02:14:26 host sshd[8717]: input_userauth_request: invalid user root [preauth]
Jan  8 02:14:26 host unix_chkpwd[8739]: password check failed for user (root)
Jan  8 02:14:26 host sshd[8717]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.98.60.107  user=root
Jan  8 02:14:26 host sshd[8717]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:14:28 host sshd[8717]: Failed password for invalid user root from 198.98.60.107 port 51498 ssh2
Jan  8 02:14:30 host unix_chkpwd[8767]: password check failed for user (root)
Jan  8 02:14:30 host sshd[8717]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:14:32 host sshd[8717]: Failed password for invalid user root from 198.98.60.107 port 51498 ssh2
Jan  8 02:14:33 host unix_chkpwd[8772]: password check failed for user (root)
Jan  8 02:14:33 host sshd[8717]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:14:35 host sshd[8717]: Failed password for invalid user root from 198.98.60.107 port 51498 ssh2
Jan  8 02:14:37 host unix_chkpwd[8795]: password check failed for user (root)
Jan  8 02:14:37 host sshd[8717]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:14:39 host sshd[8717]: Failed password for invalid user root from 198.98.60.107 port 51498 ssh2
Jan  8 02:15:32 host sshd[8922]: User root from 5.255.103.135 not allowed because not listed in AllowUsers
Jan  8 02:15:32 host sshd[8922]: input_userauth_request: invalid user root [preauth]
Jan  8 02:15:32 host unix_chkpwd[8963]: password check failed for user (root)
Jan  8 02:15:32 host sshd[8922]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.255.103.135  user=root
Jan  8 02:15:32 host sshd[8922]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:15:34 host sshd[8922]: Failed password for invalid user root from 5.255.103.135 port 55276 ssh2
Jan  8 02:15:36 host unix_chkpwd[8971]: password check failed for user (root)
Jan  8 02:15:36 host sshd[8922]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:15:38 host sshd[8922]: Failed password for invalid user root from 5.255.103.135 port 55276 ssh2
Jan  8 02:15:39 host unix_chkpwd[8982]: password check failed for user (root)
Jan  8 02:15:39 host sshd[8922]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:15:42 host sshd[8922]: Failed password for invalid user root from 5.255.103.135 port 55276 ssh2
Jan  8 02:15:43 host unix_chkpwd[8994]: password check failed for user (root)
Jan  8 02:15:43 host sshd[8922]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:15:46 host sshd[8922]: Failed password for invalid user root from 5.255.103.135 port 55276 ssh2
Jan  8 02:15:48 host unix_chkpwd[9006]: password check failed for user (root)
Jan  8 02:15:48 host sshd[8922]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:15:50 host sshd[8922]: Failed password for invalid user root from 5.255.103.135 port 55276 ssh2
Jan  8 02:16:31 host sshd[9218]: User root from 185.220.102.249 not allowed because not listed in AllowUsers
Jan  8 02:16:31 host sshd[9218]: input_userauth_request: invalid user root [preauth]
Jan  8 02:16:31 host unix_chkpwd[9255]: password check failed for user (root)
Jan  8 02:16:31 host sshd[9218]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.102.249  user=root
Jan  8 02:16:31 host sshd[9218]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:16:32 host sshd[9218]: Failed password for invalid user root from 185.220.102.249 port 24928 ssh2
Jan  8 02:16:35 host unix_chkpwd[9262]: password check failed for user (root)
Jan  8 02:16:35 host sshd[9218]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:16:37 host sshd[9218]: Failed password for invalid user root from 185.220.102.249 port 24928 ssh2
Jan  8 02:16:38 host unix_chkpwd[9266]: password check failed for user (root)
Jan  8 02:16:38 host sshd[9218]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:16:40 host sshd[9218]: Failed password for invalid user root from 185.220.102.249 port 24928 ssh2
Jan  8 02:16:42 host unix_chkpwd[9279]: password check failed for user (root)
Jan  8 02:16:42 host sshd[9218]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:16:44 host sshd[9218]: Failed password for invalid user root from 185.220.102.249 port 24928 ssh2
Jan  8 02:17:24 host sshd[9378]: User root from 167.86.94.107 not allowed because not listed in AllowUsers
Jan  8 02:17:24 host sshd[9378]: input_userauth_request: invalid user root [preauth]
Jan  8 02:17:24 host unix_chkpwd[9396]: password check failed for user (root)
Jan  8 02:17:24 host sshd[9378]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.86.94.107  user=root
Jan  8 02:17:24 host sshd[9378]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:17:27 host sshd[9378]: Failed password for invalid user root from 167.86.94.107 port 46840 ssh2
Jan  8 02:17:29 host unix_chkpwd[9426]: password check failed for user (root)
Jan  8 02:17:29 host sshd[9378]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:17:31 host sshd[9378]: Failed password for invalid user root from 167.86.94.107 port 46840 ssh2
Jan  8 02:17:33 host unix_chkpwd[9432]: password check failed for user (root)
Jan  8 02:17:33 host sshd[9378]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:17:35 host sshd[9378]: Failed password for invalid user root from 167.86.94.107 port 46840 ssh2
Jan  8 02:17:36 host unix_chkpwd[9438]: password check failed for user (root)
Jan  8 02:17:36 host sshd[9378]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:17:38 host sshd[9378]: Failed password for invalid user root from 167.86.94.107 port 46840 ssh2
Jan  8 02:18:14 host sshd[9535]: User root from 179.43.159.196 not allowed because not listed in AllowUsers
Jan  8 02:18:14 host sshd[9535]: input_userauth_request: invalid user root [preauth]
Jan  8 02:18:14 host unix_chkpwd[9551]: password check failed for user (root)
Jan  8 02:18:14 host sshd[9535]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.43.159.196  user=root
Jan  8 02:18:14 host sshd[9535]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:18:15 host sshd[9535]: Failed password for invalid user root from 179.43.159.196 port 44952 ssh2
Jan  8 02:18:16 host unix_chkpwd[9556]: password check failed for user (root)
Jan  8 02:18:16 host sshd[9535]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:18:18 host sshd[9535]: Failed password for invalid user root from 179.43.159.196 port 44952 ssh2
Jan  8 02:18:22 host unix_chkpwd[9565]: password check failed for user (root)
Jan  8 02:18:22 host sshd[9535]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:18:24 host sshd[9535]: Failed password for invalid user root from 179.43.159.196 port 44952 ssh2
Jan  8 02:18:25 host unix_chkpwd[9569]: password check failed for user (root)
Jan  8 02:18:25 host sshd[9535]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:18:27 host sshd[9535]: Failed password for invalid user root from 179.43.159.196 port 44952 ssh2
Jan  8 02:19:11 host sshd[9697]: User root from 23.129.64.211 not allowed because not listed in AllowUsers
Jan  8 02:19:11 host sshd[9697]: input_userauth_request: invalid user root [preauth]
Jan  8 02:19:11 host unix_chkpwd[9707]: password check failed for user (root)
Jan  8 02:19:11 host sshd[9697]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.129.64.211  user=root
Jan  8 02:19:11 host sshd[9697]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:19:13 host sshd[9697]: Failed password for invalid user root from 23.129.64.211 port 23530 ssh2
Jan  8 02:19:14 host unix_chkpwd[9716]: password check failed for user (root)
Jan  8 02:19:14 host sshd[9697]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:19:16 host sshd[9697]: Failed password for invalid user root from 23.129.64.211 port 23530 ssh2
Jan  8 02:19:16 host unix_chkpwd[9718]: password check failed for user (root)
Jan  8 02:19:16 host sshd[9697]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:19:18 host sshd[9697]: Failed password for invalid user root from 23.129.64.211 port 23530 ssh2
Jan  8 02:19:19 host unix_chkpwd[9722]: password check failed for user (root)
Jan  8 02:19:19 host sshd[9697]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:19:21 host sshd[9697]: Failed password for invalid user root from 23.129.64.211 port 23530 ssh2
Jan  8 02:20:05 host sshd[9815]: User root from 185.220.103.9 not allowed because not listed in AllowUsers
Jan  8 02:20:05 host sshd[9815]: input_userauth_request: invalid user root [preauth]
Jan  8 02:20:05 host unix_chkpwd[9866]: password check failed for user (root)
Jan  8 02:20:05 host sshd[9815]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.103.9  user=root
Jan  8 02:20:05 host sshd[9815]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:20:07 host sshd[9815]: Failed password for invalid user root from 185.220.103.9 port 36334 ssh2
Jan  8 02:20:09 host unix_chkpwd[9878]: password check failed for user (root)
Jan  8 02:20:09 host sshd[9815]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:20:10 host sshd[9815]: Failed password for invalid user root from 185.220.103.9 port 36334 ssh2
Jan  8 02:20:12 host unix_chkpwd[9890]: password check failed for user (root)
Jan  8 02:20:12 host sshd[9815]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:20:15 host sshd[9815]: Failed password for invalid user root from 185.220.103.9 port 36334 ssh2
Jan  8 02:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  8 02:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  8 02:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  8 02:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  8 02:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  8 02:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  8 02:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  8 02:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  8 02:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  8 02:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  8 02:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  8 02:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  8 02:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  8 02:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=dartsimp user-2=a2zgroup user-3=laundryboniface user-4=wwwkaretakers user-5=cochintaxi user-6=travelboniface user-7=wwwrmswll user-8=wwwresourcehunte user-9=keralaholi user-10=ugotscom user-11=wwwpmcresource user-12=vfmassets user-13=wwwtestugo user-14=shalinijames user-15=pmcresources user-16=remysagr user-17=disposeat user-18=wwwkmaorg user-19=wwwkapin user-20=woodpeck user-21=gifterman user-22=palco123 user-23=phmetals user-24=kottayamcalldriv user-25=mrsclean user-26=wwwnexidigital user-27=bonifacegroup user-28=wwwevmhonda user-29=straightcurve user-30=wwwletsstalkfood feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  8 02:21:54 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  8 02:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  8 02:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ZpvfCLsZoBa8hWQ1.~
Jan  8 02:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ZpvfCLsZoBa8hWQ1.~'
Jan  8 02:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ZpvfCLsZoBa8hWQ1.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  8 02:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  8 02:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  8 02:21:55 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 02:21:55 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 02:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  8 02:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  8 02:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  8 02:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  8 02:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  8 02:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  8 02:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  8 02:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  8 02:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  8 02:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  8 02:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  8 02:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  8 02:22:03 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  8 02:22:05 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  8 02:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  8 02:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  8 02:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  8 02:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:22:08 host sshd[10254]: User root from 172.81.131.139 not allowed because not listed in AllowUsers
Jan  8 02:22:08 host sshd[10254]: input_userauth_request: invalid user root [preauth]
Jan  8 02:22:08 host unix_chkpwd[10459]: password check failed for user (root)
Jan  8 02:22:08 host sshd[10254]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.81.131.139  user=root
Jan  8 02:22:08 host sshd[10254]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:22:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  8 02:22:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 02:22:10 host sshd[10254]: Failed password for invalid user root from 172.81.131.139 port 43214 ssh2
Jan  8 02:22:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 02:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  8 02:22:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 02:22:13 host unix_chkpwd[10492]: password check failed for user (root)
Jan  8 02:22:13 host sshd[10254]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:22:15 host sshd[10254]: Failed password for invalid user root from 172.81.131.139 port 43214 ssh2
Jan  8 02:22:15 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 02:22:15 host unix_chkpwd[10499]: password check failed for user (root)
Jan  8 02:22:15 host sshd[10254]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:22:18 host sshd[10254]: Failed password for invalid user root from 172.81.131.139 port 43214 ssh2
Jan  8 02:22:19 host unix_chkpwd[10504]: password check failed for user (root)
Jan  8 02:22:19 host sshd[10254]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:22:21 host sshd[10254]: Failed password for invalid user root from 172.81.131.139 port 43214 ssh2
Jan  8 02:22:22 host unix_chkpwd[10513]: password check failed for user (root)
Jan  8 02:22:22 host sshd[10254]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:22:24 host sshd[10254]: Failed password for invalid user root from 172.81.131.139 port 43214 ssh2
Jan  8 02:23:07 host sshd[10622]: User root from 185.100.87.129 not allowed because not listed in AllowUsers
Jan  8 02:23:07 host sshd[10622]: input_userauth_request: invalid user root [preauth]
Jan  8 02:23:07 host unix_chkpwd[10628]: password check failed for user (root)
Jan  8 02:23:07 host sshd[10622]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.100.87.129  user=root
Jan  8 02:23:07 host sshd[10622]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:23:09 host sshd[10622]: Failed password for invalid user root from 185.100.87.129 port 64299 ssh2
Jan  8 02:23:11 host unix_chkpwd[10633]: password check failed for user (root)
Jan  8 02:23:11 host sshd[10622]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:23:13 host sshd[10622]: Failed password for invalid user root from 185.100.87.129 port 64299 ssh2
Jan  8 02:23:15 host unix_chkpwd[10646]: password check failed for user (root)
Jan  8 02:23:15 host sshd[10622]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:23:17 host sshd[10622]: Failed password for invalid user root from 185.100.87.129 port 64299 ssh2
Jan  8 02:23:19 host unix_chkpwd[10652]: password check failed for user (root)
Jan  8 02:23:19 host sshd[10622]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:23:20 host sshd[10622]: Failed password for invalid user root from 185.100.87.129 port 64299 ssh2
Jan  8 02:23:21 host unix_chkpwd[10657]: password check failed for user (root)
Jan  8 02:23:21 host sshd[10622]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:23:23 host sshd[10622]: Failed password for invalid user root from 185.100.87.129 port 64299 ssh2
Jan  8 02:24:03 host sshd[10759]: User root from 185.129.61.129 not allowed because not listed in AllowUsers
Jan  8 02:24:03 host sshd[10759]: input_userauth_request: invalid user root [preauth]
Jan  8 02:24:03 host unix_chkpwd[10789]: password check failed for user (root)
Jan  8 02:24:03 host sshd[10759]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.129.61.129  user=root
Jan  8 02:24:03 host sshd[10759]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:24:05 host sshd[10759]: Failed password for invalid user root from 185.129.61.129 port 41262 ssh2
Jan  8 02:24:06 host unix_chkpwd[10792]: password check failed for user (root)
Jan  8 02:24:06 host sshd[10759]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:24:07 host sshd[10759]: Failed password for invalid user root from 185.129.61.129 port 41262 ssh2
Jan  8 02:24:08 host unix_chkpwd[10795]: password check failed for user (root)
Jan  8 02:24:08 host sshd[10759]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:24:09 host sshd[10759]: Failed password for invalid user root from 185.129.61.129 port 41262 ssh2
Jan  8 02:24:10 host unix_chkpwd[10798]: password check failed for user (root)
Jan  8 02:24:10 host sshd[10759]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:24:12 host sshd[10759]: Failed password for invalid user root from 185.129.61.129 port 41262 ssh2
Jan  8 02:24:13 host unix_chkpwd[10813]: password check failed for user (root)
Jan  8 02:24:13 host sshd[10759]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:24:15 host sshd[10759]: Failed password for invalid user root from 185.129.61.129 port 41262 ssh2
Jan  8 02:24:50 host sshd[10895]: User root from 23.129.64.146 not allowed because not listed in AllowUsers
Jan  8 02:24:50 host sshd[10895]: input_userauth_request: invalid user root [preauth]
Jan  8 02:24:50 host unix_chkpwd[10907]: password check failed for user (root)
Jan  8 02:24:50 host sshd[10895]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.129.64.146  user=root
Jan  8 02:24:50 host sshd[10895]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:24:51 host sshd[10895]: Failed password for invalid user root from 23.129.64.146 port 24076 ssh2
Jan  8 02:24:52 host unix_chkpwd[10916]: password check failed for user (root)
Jan  8 02:24:52 host sshd[10895]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:24:54 host sshd[10895]: Failed password for invalid user root from 23.129.64.146 port 24076 ssh2
Jan  8 02:24:55 host unix_chkpwd[10919]: password check failed for user (root)
Jan  8 02:24:55 host sshd[10895]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:24:57 host sshd[10895]: Failed password for invalid user root from 23.129.64.146 port 24076 ssh2
Jan  8 02:24:58 host unix_chkpwd[10926]: password check failed for user (root)
Jan  8 02:24:58 host sshd[10895]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:25:00 host sshd[10895]: Failed password for invalid user root from 23.129.64.146 port 24076 ssh2
Jan  8 02:25:03 host unix_chkpwd[10973]: password check failed for user (root)
Jan  8 02:25:03 host sshd[10895]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:25:04 host sshd[10895]: Failed password for invalid user root from 23.129.64.146 port 24076 ssh2
Jan  8 02:25:50 host sshd[11073]: User root from 107.189.30.69 not allowed because not listed in AllowUsers
Jan  8 02:25:50 host sshd[11073]: input_userauth_request: invalid user root [preauth]
Jan  8 02:25:50 host unix_chkpwd[11084]: password check failed for user (root)
Jan  8 02:25:50 host sshd[11073]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.69  user=root
Jan  8 02:25:50 host sshd[11073]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:25:51 host sshd[11073]: Failed password for invalid user root from 107.189.30.69 port 34528 ssh2
Jan  8 02:25:52 host unix_chkpwd[11086]: password check failed for user (root)
Jan  8 02:25:52 host sshd[11073]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:25:53 host sshd[11073]: Failed password for invalid user root from 107.189.30.69 port 34528 ssh2
Jan  8 02:25:59 host unix_chkpwd[11093]: password check failed for user (root)
Jan  8 02:25:59 host sshd[11073]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:26:01 host sshd[11073]: Failed password for invalid user root from 107.189.30.69 port 34528 ssh2
Jan  8 02:26:51 host sshd[11307]: User root from 162.247.74.202 not allowed because not listed in AllowUsers
Jan  8 02:26:51 host sshd[11307]: input_userauth_request: invalid user root [preauth]
Jan  8 02:26:51 host unix_chkpwd[11316]: password check failed for user (root)
Jan  8 02:26:51 host sshd[11307]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.247.74.202  user=root
Jan  8 02:26:51 host sshd[11307]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:26:52 host sshd[11307]: Failed password for invalid user root from 162.247.74.202 port 36164 ssh2
Jan  8 02:26:54 host unix_chkpwd[11326]: password check failed for user (root)
Jan  8 02:26:54 host sshd[11307]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:26:56 host sshd[11307]: Failed password for invalid user root from 162.247.74.202 port 36164 ssh2
Jan  8 02:26:56 host unix_chkpwd[11331]: password check failed for user (root)
Jan  8 02:26:56 host sshd[11307]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:26:58 host sshd[11307]: Failed password for invalid user root from 162.247.74.202 port 36164 ssh2
Jan  8 02:26:59 host unix_chkpwd[11336]: password check failed for user (root)
Jan  8 02:26:59 host sshd[11307]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:27:01 host sshd[11307]: Failed password for invalid user root from 162.247.74.202 port 36164 ssh2
Jan  8 02:27:39 host sshd[11466]: User root from 5.2.70.140 not allowed because not listed in AllowUsers
Jan  8 02:27:39 host sshd[11466]: input_userauth_request: invalid user root [preauth]
Jan  8 02:27:39 host unix_chkpwd[11473]: password check failed for user (root)
Jan  8 02:27:39 host sshd[11466]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.2.70.140  user=root
Jan  8 02:27:39 host sshd[11466]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:27:41 host sshd[11466]: Failed password for invalid user root from 5.2.70.140 port 56113 ssh2
Jan  8 02:27:41 host unix_chkpwd[11479]: password check failed for user (root)
Jan  8 02:27:41 host sshd[11466]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:27:43 host sshd[11466]: Failed password for invalid user root from 5.2.70.140 port 56113 ssh2
Jan  8 02:27:44 host unix_chkpwd[11487]: password check failed for user (root)
Jan  8 02:27:44 host sshd[11466]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:27:47 host sshd[11466]: Failed password for invalid user root from 5.2.70.140 port 56113 ssh2
Jan  8 02:27:47 host unix_chkpwd[11516]: password check failed for user (root)
Jan  8 02:27:47 host sshd[11466]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:27:49 host sshd[11466]: Failed password for invalid user root from 5.2.70.140 port 56113 ssh2
Jan  8 02:28:36 host sshd[11632]: User root from 162.247.74.200 not allowed because not listed in AllowUsers
Jan  8 02:28:36 host sshd[11632]: input_userauth_request: invalid user root [preauth]
Jan  8 02:28:36 host unix_chkpwd[11679]: password check failed for user (root)
Jan  8 02:28:36 host sshd[11632]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.247.74.200  user=root
Jan  8 02:28:36 host sshd[11632]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:28:39 host sshd[11632]: Failed password for invalid user root from 162.247.74.200 port 60414 ssh2
Jan  8 02:28:40 host unix_chkpwd[11690]: password check failed for user (root)
Jan  8 02:28:40 host sshd[11632]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:28:42 host sshd[11632]: Failed password for invalid user root from 162.247.74.200 port 60414 ssh2
Jan  8 02:28:43 host unix_chkpwd[11703]: password check failed for user (root)
Jan  8 02:28:43 host sshd[11632]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:28:46 host sshd[11632]: Failed password for invalid user root from 162.247.74.200 port 60414 ssh2
Jan  8 02:28:47 host unix_chkpwd[11710]: password check failed for user (root)
Jan  8 02:28:47 host sshd[11632]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:28:49 host sshd[11632]: Failed password for invalid user root from 162.247.74.200 port 60414 ssh2
Jan  8 02:29:23 host sshd[11837]: User root from 23.129.64.220 not allowed because not listed in AllowUsers
Jan  8 02:29:23 host sshd[11837]: input_userauth_request: invalid user root [preauth]
Jan  8 02:29:23 host unix_chkpwd[11851]: password check failed for user (root)
Jan  8 02:29:23 host sshd[11837]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.129.64.220  user=root
Jan  8 02:29:23 host sshd[11837]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:29:25 host sshd[11837]: Failed password for invalid user root from 23.129.64.220 port 51740 ssh2
Jan  8 02:29:26 host unix_chkpwd[11882]: password check failed for user (root)
Jan  8 02:29:26 host sshd[11837]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:29:28 host sshd[11837]: Failed password for invalid user root from 23.129.64.220 port 51740 ssh2
Jan  8 02:29:29 host unix_chkpwd[11889]: password check failed for user (root)
Jan  8 02:29:29 host sshd[11837]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:29:31 host sshd[11837]: Failed password for invalid user root from 23.129.64.220 port 51740 ssh2
Jan  8 02:29:32 host unix_chkpwd[11903]: password check failed for user (root)
Jan  8 02:29:32 host sshd[11837]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:29:34 host sshd[11837]: Failed password for invalid user root from 23.129.64.220 port 51740 ssh2
Jan  8 02:29:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  8 02:29:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:29:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:29:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  8 02:29:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:29:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:29:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  8 02:29:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:29:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:29:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  8 02:29:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:29:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:29:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  8 02:29:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:29:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:29:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=vfmassets user-2=wwwtestugo user-3=shalinijames user-4=pmcresources user-5=wwwkmaorg user-6=disposeat user-7=remysagr user-8=woodpeck user-9=wwwkapin user-10=gifterman user-11=palco123 user-12=kottayamcalldriv user-13=phmetals user-14=wwwnexidigital user-15=mrsclean user-16=bonifacegroup user-17=wwwevmhonda user-18=straightcurve user-19=wwwletsstalkfood user-20=dartsimp user-21=a2zgroup user-22=laundryboniface user-23=wwwkaretakers user-24=cochintaxi user-25=travelboniface user-26=wwwrmswll user-27=wwwresourcehunte user-28=keralaholi user-29=ugotscom user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  8 02:29:53 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  8 02:29:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:29:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:29:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwevmhonda --output=json
Jan  8 02:29:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:29:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:29:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color instance info --format=json --check-updates=true
Jan  8 02:29:53 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  8 02:30:15 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  8 02:30:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false
Jan  8 02:30:15 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  8 02:30:17 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  8 02:30:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false
Jan  8 02:30:17 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  8 02:30:19 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  8 02:30:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  8 02:30:19 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  8 02:30:20 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  8 02:30:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwevmhonda LangPHP php_get_vhost_versions --output=json
Jan  8 02:30:20 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:30:20 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:30:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 package_manager_get_package_info package-0=ea-php72 --output=json
Jan  8 02:30:20 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:30:20 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:30:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color instance login-url --skip-plugins=false --format=json
Jan  8 02:30:21 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  8 02:30:21 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  8 02:30:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwletsstalkfood --output=json
Jan  8 02:30:21 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:30:21 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:30:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color instance info --format=json --check-updates=true
Jan  8 02:30:22 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  8 02:30:43 host sshd[12284]: User root from 179.43.159.199 not allowed because not listed in AllowUsers
Jan  8 02:30:43 host sshd[12284]: input_userauth_request: invalid user root [preauth]
Jan  8 02:30:43 host unix_chkpwd[12295]: password check failed for user (root)
Jan  8 02:30:43 host sshd[12284]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.43.159.199  user=root
Jan  8 02:30:43 host sshd[12284]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:30:45 host sshd[12284]: Failed password for invalid user root from 179.43.159.199 port 6230 ssh2
Jan  8 02:30:46 host unix_chkpwd[12302]: password check failed for user (root)
Jan  8 02:30:46 host sshd[12284]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:30:47 host sshd[12284]: Failed password for invalid user root from 179.43.159.199 port 6230 ssh2
Jan  8 02:30:49 host unix_chkpwd[12310]: password check failed for user (root)
Jan  8 02:30:49 host sshd[12284]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:30:51 host sshd[12284]: Failed password for invalid user root from 179.43.159.199 port 6230 ssh2
Jan  8 02:30:52 host unix_chkpwd[12319]: password check failed for user (root)
Jan  8 02:30:52 host sshd[12284]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:30:53 host sshd[12284]: Failed password for invalid user root from 179.43.159.199 port 6230 ssh2
Jan  8 02:31:00 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  8 02:31:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false
Jan  8 02:31:00 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  8 02:31:01 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  8 02:31:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false
Jan  8 02:31:01 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  8 02:31:16 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  8 02:31:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  8 02:31:16 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  8 02:31:16 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  8 02:31:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood LangPHP php_get_vhost_versions --output=json
Jan  8 02:31:16 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:31:16 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:31:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color instance login-url --skip-plugins=false --format=json
Jan  8 02:31:16 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  8 02:31:17 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  8 02:31:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood DomainInfo single_domain_data domain=letsstalkfood.com return_https_redirect_status=1 --output=json
Jan  8 02:31:17 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:31:17 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:31:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 fetch_vhost_ssl_components --output=json
Jan  8 02:31:17 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:31:17 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:31:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 fetch_ssl_vhosts --output=json
Jan  8 02:31:17 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:31:17 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:31:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood Mime list_redirects --output=json
Jan  8 02:31:17 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:31:17 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:31:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  8 02:31:17 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  8 02:31:19 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  8 02:31:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false
Jan  8 02:31:19 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  8 02:31:20 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  8 02:31:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  8 02:31:20 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  8 02:31:34 host sshd[12535]: User root from 23.129.64.221 not allowed because not listed in AllowUsers
Jan  8 02:31:34 host sshd[12535]: input_userauth_request: invalid user root [preauth]
Jan  8 02:31:34 host unix_chkpwd[12580]: password check failed for user (root)
Jan  8 02:31:34 host sshd[12535]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.129.64.221  user=root
Jan  8 02:31:34 host sshd[12535]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:31:36 host sshd[12535]: Failed password for invalid user root from 23.129.64.221 port 6920 ssh2
Jan  8 02:31:37 host unix_chkpwd[12619]: password check failed for user (root)
Jan  8 02:31:37 host sshd[12535]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:31:40 host sshd[12535]: Failed password for invalid user root from 23.129.64.221 port 6920 ssh2
Jan  8 02:31:41 host unix_chkpwd[12627]: password check failed for user (root)
Jan  8 02:31:41 host sshd[12535]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:31:43 host sshd[12535]: Failed password for invalid user root from 23.129.64.221 port 6920 ssh2
Jan  8 02:31:45 host unix_chkpwd[12638]: password check failed for user (root)
Jan  8 02:31:45 host sshd[12535]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:31:47 host sshd[12535]: Failed password for invalid user root from 23.129.64.221 port 6920 ssh2
Jan  8 02:32:04 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  8 02:32:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false
Jan  8 02:32:04 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  8 02:32:19 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  8 02:32:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/public_html/wp-config.php
Jan  8 02:32:19 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  8 02:32:19 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  8 02:32:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  8 02:32:19 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  8 02:32:19 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  8 02:32:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/public_html/.maintenance
Jan  8 02:32:19 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  8 02:32:19 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  8 02:32:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color db-prefix get
Jan  8 02:32:20 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  8 02:32:20 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  8 02:32:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood DirectoryPrivacy is_directory_protected dir=/home/wwwletsstalkfood/public_html --output=json
Jan  8 02:32:20 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:32:20 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:32:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  8 02:32:20 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  8 02:32:21 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  8 02:32:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color wpt-cron event reschedule wp_version_check '+2 day'
Jan  8 02:32:21 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  8 02:32:21 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  8 02:32:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day'
Jan  8 02:32:21 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  8 02:32:22 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  8 02:32:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  8 02:32:22 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  8 02:32:23 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  8 02:32:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  8 02:32:23 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  8 02:32:24 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  8 02:32:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color admin-username is-secure
Jan  8 02:32:24 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  8 02:32:24 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  8 02:32:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  8 02:32:24 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  8 02:32:25 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  8 02:32:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/public_html/wp-config.php
Jan  8 02:32:25 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  8 02:32:25 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  8 02:32:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/stat -c %a /home/wwwletsstalkfood/public_html/wp-config.php
Jan  8 02:32:25 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  8 02:32:25 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  8 02:32:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color pingbacks is_disabled
Jan  8 02:32:25 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  8 02:32:25 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  8 02:32:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  8 02:32:25 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  8 02:32:26 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  8 02:32:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color security-keys are_keys_correct
Jan  8 02:32:26 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  8 02:32:26 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  8 02:32:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=mrsclean --output=json
Jan  8 02:32:26 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:32:26 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:32:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/backup && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/mrsclean/public_html/backup --no-color instance info --format=json --check-updates=true
Jan  8 02:32:26 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  8 02:32:26 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  8 02:32:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean DomainInfo single_domain_data domain=mrsclean.co.in return_https_redirect_status=1 --output=json
Jan  8 02:32:27 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:32:27 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:32:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean Mime list_redirects --output=json
Jan  8 02:32:27 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:32:27 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:32:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/public_html/backup/wp-includes/version.php
Jan  8 02:32:27 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  8 02:32:27 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  8 02:32:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/cat /home/mrsclean/public_html/backup/wp-includes/version.php
Jan  8 02:32:27 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  8 02:32:27 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  8 02:32:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  8 02:32:27 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  8 02:32:27 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  8 02:32:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean LangPHP php_get_vhost_versions --output=json
Jan  8 02:32:27 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:32:27 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:32:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  8 02:32:27 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 02:32:27 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 02:32:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/blog && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/mrsclean/public_html/blog --no-color instance info --format=json --check-updates=true
Jan  8 02:32:27 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  8 02:32:27 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  8 02:32:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/public_html/blog/wp-includes/version.php
Jan  8 02:32:27 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  8 02:32:27 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  8 02:32:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/cat /home/mrsclean/public_html/blog/wp-includes/version.php
Jan  8 02:32:27 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  8 02:32:27 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  8 02:32:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  8 02:32:28 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  8 02:32:28 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  8 02:32:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=shalinijames --output=json
Jan  8 02:32:28 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:32:28 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:32:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color instance info --format=json --check-updates=true
Jan  8 02:32:28 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  8 02:32:36 host sshd[13105]: User root from 185.220.103.5 not allowed because not listed in AllowUsers
Jan  8 02:32:36 host sshd[13105]: input_userauth_request: invalid user root [preauth]
Jan  8 02:32:36 host unix_chkpwd[13129]: password check failed for user (root)
Jan  8 02:32:36 host sshd[13105]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.103.5  user=root
Jan  8 02:32:36 host sshd[13105]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:32:38 host sshd[13105]: Failed password for invalid user root from 185.220.103.5 port 44464 ssh2
Jan  8 02:32:38 host unix_chkpwd[13135]: password check failed for user (root)
Jan  8 02:32:38 host sshd[13105]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:32:41 host sshd[13105]: Failed password for invalid user root from 185.220.103.5 port 44464 ssh2
Jan  8 02:32:41 host unix_chkpwd[13140]: password check failed for user (root)
Jan  8 02:32:41 host sshd[13105]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:32:43 host sshd[13105]: Failed password for invalid user root from 185.220.103.5 port 44464 ssh2
Jan  8 02:32:44 host unix_chkpwd[13147]: password check failed for user (root)
Jan  8 02:32:44 host sshd[13105]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:32:46 host sshd[13105]: Failed password for invalid user root from 185.220.103.5 port 44464 ssh2
Jan  8 02:32:47 host unix_chkpwd[13153]: password check failed for user (root)
Jan  8 02:32:47 host sshd[13105]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:32:49 host sshd[13105]: Failed password for invalid user root from 185.220.103.5 port 44464 ssh2
Jan  8 02:33:07 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  8 02:33:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option get auto_update_plugins --format=json
Jan  8 02:33:07 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  8 02:33:08 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  8 02:33:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option get auto_update_themes --format=json
Jan  8 02:33:08 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  8 02:33:08 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  8 02:33:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  8 02:33:08 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  8 02:33:08 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  8 02:33:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames LangPHP php_get_vhost_versions --output=json
Jan  8 02:33:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:33:09 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:33:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color instance login-url --skip-plugins=false --format=json
Jan  8 02:33:09 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  8 02:33:09 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  8 02:33:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames DomainInfo single_domain_data domain=shalinijames.com return_https_redirect_status=1 --output=json
Jan  8 02:33:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:33:09 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:33:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames Mime list_redirects --output=json
Jan  8 02:33:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:33:09 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:33:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  8 02:33:09 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  8 02:33:11 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  8 02:33:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option get auto_update_plugins --format=json
Jan  8 02:33:11 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  8 02:33:12 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  8 02:33:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  8 02:33:12 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  8 02:33:24 host sshd[13342]: User root from 162.247.74.213 not allowed because not listed in AllowUsers
Jan  8 02:33:24 host sshd[13342]: input_userauth_request: invalid user root [preauth]
Jan  8 02:33:24 host unix_chkpwd[13358]: password check failed for user (root)
Jan  8 02:33:24 host sshd[13342]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.247.74.213  user=root
Jan  8 02:33:24 host sshd[13342]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:33:27 host sshd[13342]: Failed password for invalid user root from 162.247.74.213 port 39358 ssh2
Jan  8 02:33:28 host unix_chkpwd[13385]: password check failed for user (root)
Jan  8 02:33:28 host sshd[13342]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:33:30 host sshd[13342]: Failed password for invalid user root from 162.247.74.213 port 39358 ssh2
Jan  8 02:33:31 host unix_chkpwd[13392]: password check failed for user (root)
Jan  8 02:33:31 host sshd[13342]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:33:33 host sshd[13342]: Failed password for invalid user root from 162.247.74.213 port 39358 ssh2
Jan  8 02:33:34 host unix_chkpwd[13404]: password check failed for user (root)
Jan  8 02:33:34 host sshd[13342]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:33:36 host sshd[13342]: Failed password for invalid user root from 162.247.74.213 port 39358 ssh2
Jan  8 02:33:36 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  8 02:33:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option get auto_update_themes --format=json
Jan  8 02:33:36 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  8 02:33:37 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  8 02:33:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/public_html/wp-config.php
Jan  8 02:33:37 host unix_chkpwd[13423]: password check failed for user (root)
Jan  8 02:33:37 host sshd[13342]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:33:37 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  8 02:33:37 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  8 02:33:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  8 02:33:37 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  8 02:33:37 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  8 02:33:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/public_html/.maintenance
Jan  8 02:33:37 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  8 02:33:37 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  8 02:33:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color db-prefix get
Jan  8 02:33:37 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  8 02:33:38 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  8 02:33:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames DirectoryPrivacy is_directory_protected dir=/home/shalinijames/public_html --output=json
Jan  8 02:33:38 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:33:38 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:33:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  8 02:33:38 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  8 02:33:38 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  8 02:33:39 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color wpt-cron event reschedule wp_version_check '+2 day'
Jan  8 02:33:39 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  8 02:33:39 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  8 02:33:39 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day'
Jan  8 02:33:39 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  8 02:33:39 host sshd[13342]: Failed password for invalid user root from 162.247.74.213 port 39358 ssh2
Jan  8 02:33:39 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  8 02:33:39 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  8 02:33:39 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  8 02:33:46 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  8 02:33:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  8 02:33:46 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  8 02:33:46 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  8 02:33:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color admin-username is-secure
Jan  8 02:33:46 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  8 02:33:47 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  8 02:33:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  8 02:33:47 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  8 02:33:47 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  8 02:33:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/public_html/wp-config.php
Jan  8 02:33:47 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  8 02:33:47 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  8 02:33:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/stat -c %a /home/shalinijames/public_html/wp-config.php
Jan  8 02:33:47 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  8 02:33:47 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  8 02:33:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color pingbacks is_disabled
Jan  8 02:33:47 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  8 02:33:48 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  8 02:33:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  8 02:33:48 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  8 02:33:48 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  8 02:33:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color security-keys are_keys_correct
Jan  8 02:33:48 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  8 02:33:49 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  8 02:33:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwtestugo --output=json
Jan  8 02:33:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:33:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:33:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color instance info --format=json --check-updates=true
Jan  8 02:33:49 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:34:18 host sshd[13684]: User root from 162.247.72.199 not allowed because not listed in AllowUsers
Jan  8 02:34:18 host sshd[13684]: input_userauth_request: invalid user root [preauth]
Jan  8 02:34:18 host unix_chkpwd[13696]: password check failed for user (root)
Jan  8 02:34:18 host sshd[13684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.247.72.199  user=root
Jan  8 02:34:18 host sshd[13684]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:34:20 host sshd[13684]: Failed password for invalid user root from 162.247.72.199 port 58416 ssh2
Jan  8 02:34:21 host unix_chkpwd[13704]: password check failed for user (root)
Jan  8 02:34:21 host sshd[13684]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root"
Jan  8 02:34:23 host sshd[13684]: Failed password for invalid user root from 162.247.72.199 port 58416 ssh2
Jan  8 02:34:23 host sshd[13684]: Connection closed by 162.247.72.199 port 58416 [preauth]
Jan  8 02:34:23 host sshd[13684]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.247.72.199  user=root
Jan  8 02:34:46 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:34:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option get auto_update_plugins --format=json
Jan  8 02:34:46 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:34:47 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:34:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option get auto_update_themes --format=json
Jan  8 02:34:47 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:34:47 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:34:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  8 02:34:47 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:34:47 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:34:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo LangPHP php_get_vhost_versions --output=json
Jan  8 02:34:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:34:47 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:34:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color instance login-url --skip-plugins=false --format=json
Jan  8 02:34:47 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:34:49 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:34:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DomainInfo single_domain_data domain=testugo.in return_https_redirect_status=1 --output=json
Jan  8 02:34:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:34:49 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:34:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo Mime list_redirects --output=json
Jan  8 02:34:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:34:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:34:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  8 02:34:50 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:34:50 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:34:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option get auto_update_plugins --format=json
Jan  8 02:34:50 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:34:51 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:34:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  8 02:34:51 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:35:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:35:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option get auto_update_themes --format=json
Jan  8 02:35:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:35:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:35:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt1/wp-config.php
Jan  8 02:35:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:35:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:35:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  8 02:35:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:35:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:35:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt1/.maintenance
Jan  8 02:35:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:35:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:35:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color db-prefix get
Jan  8 02:35:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:35:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:35:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/tt1 --output=json
Jan  8 02:35:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:35:06 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:35:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  8 02:35:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:35:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:35:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color wpt-cron event reschedule wp_version_check '+2 day'
Jan  8 02:35:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:35:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:35:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day'
Jan  8 02:35:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:35:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:35:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  8 02:35:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:35:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:35:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  8 02:35:09 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:35:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:35:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color admin-username is-secure
Jan  8 02:35:09 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:35:10 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:35:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  8 02:35:10 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:35:10 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:35:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt1/wp-config.php
Jan  8 02:35:10 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:35:10 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:35:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/stat -c %a /home/wwwtestugo/public_html/tt1/wp-config.php
Jan  8 02:35:10 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:35:10 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:35:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color pingbacks is_disabled
Jan  8 02:35:10 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:35:11 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:35:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  8 02:35:11 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:35:11 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:35:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color security-keys are_keys_correct
Jan  8 02:35:11 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:35:11 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:35:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color instance info --format=json --check-updates=true
Jan  8 02:35:11 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:35:52 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:35:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option get auto_update_plugins --format=json
Jan  8 02:35:52 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:35:53 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:35:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option get auto_update_themes --format=json
Jan  8 02:35:53 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:35:53 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:35:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  8 02:35:53 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:35:53 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:35:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color instance login-url --skip-plugins=false --format=json
Jan  8 02:35:53 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:35:54 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:35:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  8 02:35:54 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:35:55 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:35:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option get auto_update_plugins --format=json
Jan  8 02:35:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:35:55 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:35:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  8 02:35:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:35:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:35:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option get auto_update_themes --format=json
Jan  8 02:35:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:35:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:35:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt/wp-config.php
Jan  8 02:35:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:35:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:35:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  8 02:35:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:36:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:36:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt/.maintenance
Jan  8 02:36:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:36:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:36:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color db-prefix get
Jan  8 02:36:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:36:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:36:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/tt --output=json
Jan  8 02:36:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:36:00 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:36:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  8 02:36:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:36:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:36:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color wpt-cron event reschedule wp_version_check '+2 day'
Jan  8 02:36:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:36:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:36:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day'
Jan  8 02:36:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:36:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:36:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  8 02:36:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:36:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:36:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  8 02:36:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:36:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:36:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color admin-username is-secure
Jan  8 02:36:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:36:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:36:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  8 02:36:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:36:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:36:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt/wp-config.php
Jan  8 02:36:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:36:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:36:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/stat -c %a /home/wwwtestugo/public_html/tt/wp-config.php
Jan  8 02:36:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:36:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:36:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color pingbacks is_disabled
Jan  8 02:36:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:36:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:36:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  8 02:36:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:36:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:36:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color security-keys are_keys_correct
Jan  8 02:36:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:36:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:36:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color instance info --format=json --check-updates=true
Jan  8 02:36:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:36:10 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:36:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option get auto_update_plugins --format=json
Jan  8 02:36:10 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:36:11 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:36:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option get auto_update_themes --format=json
Jan  8 02:36:11 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:36:11 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:36:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  8 02:36:11 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:36:11 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:36:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color instance login-url --skip-plugins=false --format=json
Jan  8 02:36:11 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:36:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:36:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  8 02:36:12 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:36:13 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:36:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option get auto_update_plugins --format=json
Jan  8 02:36:13 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:36:13 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:36:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  8 02:36:13 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:36:17 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:36:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option get auto_update_themes --format=json
Jan  8 02:36:17 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:36:17 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:36:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/HYPE/wp-config.php
Jan  8 02:36:17 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:36:17 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:36:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  8 02:36:17 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:36:18 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:36:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/HYPE/.maintenance
Jan  8 02:36:18 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:36:18 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:36:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color db-prefix get
Jan  8 02:36:18 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:36:18 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:36:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/HYPE --output=json
Jan  8 02:36:18 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:36:18 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:36:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  8 02:36:18 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:36:19 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:36:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color wpt-cron event reschedule wp_version_check '+2 day'
Jan  8 02:36:19 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:36:19 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:36:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day'
Jan  8 02:36:19 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:36:20 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:36:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  8 02:36:20 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:36:20 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:36:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  8 02:36:20 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:36:21 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:36:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color admin-username is-secure
Jan  8 02:36:21 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:36:21 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:36:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  8 02:36:21 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:36:22 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:36:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/HYPE/wp-config.php
Jan  8 02:36:22 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:36:22 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:36:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/stat -c %a /home/wwwtestugo/public_html/HYPE/wp-config.php
Jan  8 02:36:22 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:36:22 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:36:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color pingbacks is_disabled
Jan  8 02:36:22 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:36:22 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:36:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  8 02:36:22 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:36:22 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:36:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color security-keys are_keys_correct
Jan  8 02:36:22 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:36:23 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:36:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=ugotscom --output=json
Jan  8 02:36:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:36:23 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:36:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/boniface/blog && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/boniface/blog --no-color instance info --format=json --check-updates=true
Jan  8 02:36:23 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 02:36:23 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 02:36:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DomainInfo single_domain_data domain=ugotechnologies.com return_https_redirect_status=1 --output=json
Jan  8 02:36:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:36:23 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:36:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom Mime list_redirects --output=json
Jan  8 02:36:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:36:24 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:36:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/boniface/blog/wp-includes/version.php
Jan  8 02:36:24 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 02:36:24 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 02:36:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/public_html/boniface/blog/wp-includes/version.php
Jan  8 02:36:24 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 02:36:24 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 02:36:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  8 02:36:24 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 02:36:24 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 02:36:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom LangPHP php_get_vhost_versions --output=json
Jan  8 02:36:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:36:24 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:36:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color instance info --format=json --check-updates=true
Jan  8 02:36:24 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 02:36:31 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 02:36:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option get auto_update_plugins --format=json
Jan  8 02:36:31 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 02:36:31 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 02:36:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option get auto_update_themes --format=json
Jan  8 02:36:31 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 02:36:32 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 02:36:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  8 02:36:32 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 02:36:32 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 02:36:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color instance login-url --skip-plugins=false --format=json
Jan  8 02:36:32 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 02:36:32 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 02:36:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  8 02:36:32 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 02:36:34 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 02:36:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option get auto_update_plugins --format=json
Jan  8 02:36:34 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 02:36:34 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 02:36:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  8 02:36:34 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 02:36:39 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 02:36:39 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option get auto_update_themes --format=json
Jan  8 02:36:39 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 02:36:39 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 02:36:39 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/UGOCRM/ugo_blg/wp-config.php
Jan  8 02:36:39 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 02:36:39 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 02:36:39 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  8 02:36:39 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 02:36:39 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 02:36:39 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/UGOCRM/ugo_blg/.maintenance
Jan  8 02:36:39 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 02:36:39 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 02:36:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color db-prefix get
Jan  8 02:36:40 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 02:36:40 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 02:36:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DirectoryPrivacy is_directory_protected dir=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --output=json
Jan  8 02:36:40 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:36:40 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:36:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  8 02:36:40 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 02:36:40 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 02:36:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color wpt-cron event reschedule wp_version_check '+2 day'
Jan  8 02:36:41 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 02:36:41 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 02:36:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day'
Jan  8 02:36:41 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 02:36:41 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 02:36:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  8 02:36:41 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 02:36:42 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 02:36:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  8 02:36:42 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 02:36:42 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 02:36:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color admin-username is-secure
Jan  8 02:36:42 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 02:36:42 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 02:36:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  8 02:36:42 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 02:36:43 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 02:36:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/UGOCRM/ugo_blg/wp-config.php
Jan  8 02:36:43 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 02:36:43 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 02:36:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/stat -c %a /home/ugotscom/public_html/old/UGOCRM/ugo_blg/wp-config.php
Jan  8 02:36:43 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 02:36:43 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 02:36:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color pingbacks is_disabled
Jan  8 02:36:43 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 02:36:43 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 02:36:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  8 02:36:43 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 02:36:44 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 02:36:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color security-keys are_keys_correct
Jan  8 02:36:44 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 02:36:44 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 02:36:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color instance info --format=json --check-updates=true
Jan  8 02:36:44 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 02:36:48 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 02:36:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option get auto_update_plugins --format=json
Jan  8 02:36:48 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 02:36:48 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 02:36:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option get auto_update_themes --format=json
Jan  8 02:36:48 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 02:36:48 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 02:36:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  8 02:36:48 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 02:36:48 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 02:36:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color instance login-url --skip-plugins=false --format=json
Jan  8 02:36:48 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 02:36:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 02:36:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  8 02:36:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 02:36:50 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 02:36:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option get auto_update_plugins --format=json
Jan  8 02:36:50 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 02:36:51 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 02:36:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  8 02:36:51 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 02:36:52 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 02:36:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option get auto_update_themes --format=json
Jan  8 02:36:52 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 02:36:52 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 02:36:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/site/wp-config.php
Jan  8 02:36:52 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 02:36:52 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 02:36:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  8 02:36:52 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 02:36:53 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 02:36:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/site/.maintenance
Jan  8 02:36:53 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 02:36:53 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 02:36:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color db-prefix get
Jan  8 02:36:53 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 02:36:53 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 02:36:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DirectoryPrivacy is_directory_protected dir=/home/ugotscom/public_html/old/site --output=json
Jan  8 02:36:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:36:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:36:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  8 02:36:53 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 02:36:54 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 02:36:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color wpt-cron event reschedule wp_version_check '+2 day'
Jan  8 02:36:54 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 02:36:54 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 02:36:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day'
Jan  8 02:36:54 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 02:36:55 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 02:36:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  8 02:36:55 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 02:36:55 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 02:36:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  8 02:36:55 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 02:36:55 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 02:36:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color admin-username is-secure
Jan  8 02:36:55 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 02:36:56 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 02:36:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  8 02:36:56 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 02:36:56 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 02:36:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/site/wp-config.php
Jan  8 02:36:56 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 02:36:56 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 02:36:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/stat -c %a /home/ugotscom/public_html/old/site/wp-config.php
Jan  8 02:36:56 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 02:36:56 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 02:36:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color pingbacks is_disabled
Jan  8 02:36:56 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 02:36:56 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 02:36:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  8 02:36:56 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 02:36:57 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 02:36:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color security-keys are_keys_correct
Jan  8 02:36:57 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 02:36:57 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 02:36:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=woodpeck --output=json
Jan  8 02:36:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:36:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:36:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html/wp && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/woodpeck/public_html/wp --no-color instance info --format=json --check-updates=true
Jan  8 02:36:57 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0)
Jan  8 02:36:57 host sudo: pam_unix(sudo:session): session closed for user woodpeck
Jan  8 02:36:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck DomainInfo single_domain_data domain=woodpeckerindia.com return_https_redirect_status=1 --output=json
Jan  8 02:36:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:36:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:36:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck Mime list_redirects --output=json
Jan  8 02:36:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:36:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:36:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/test -e /home/woodpeck/public_html/wp/wp-includes/version.php
Jan  8 02:36:58 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0)
Jan  8 02:36:58 host sudo: pam_unix(sudo:session): session closed for user woodpeck
Jan  8 02:36:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  8 02:36:58 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0)
Jan  8 02:36:58 host sudo: pam_unix(sudo:session): session closed for user woodpeck
Jan  8 02:36:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck LangPHP php_get_vhost_versions --output=json
Jan  8 02:36:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:36:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:36:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=palco123 --output=json
Jan  8 02:36:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:36:58 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:36:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color instance info --format=json --check-updates=true
Jan  8 02:36:58 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  8 02:37:05 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  8 02:37:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false
Jan  8 02:37:05 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  8 02:37:06 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  8 02:37:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false
Jan  8 02:37:06 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  8 02:37:12 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  8 02:37:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  8 02:37:12 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  8 02:37:12 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  8 02:37:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 LangPHP php_get_vhost_versions --output=json
Jan  8 02:37:12 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:37:12 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:37:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color instance login-url --skip-plugins=false --format=json
Jan  8 02:37:12 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  8 02:37:13 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  8 02:37:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 DomainInfo single_domain_data domain=panlys.com return_https_redirect_status=1 --output=json
Jan  8 02:37:13 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:37:13 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:37:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 Mime list_redirects --output=json
Jan  8 02:37:13 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:37:13 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:37:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  8 02:37:13 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  8 02:37:14 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  8 02:37:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false
Jan  8 02:37:14 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  8 02:37:14 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  8 02:37:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  8 02:37:15 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  8 02:37:20 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  8 02:37:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false
Jan  8 02:37:20 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  8 02:37:25 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  8 02:37:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/public_html/wp-config.php
Jan  8 02:37:26 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  8 02:37:26 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  8 02:37:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  8 02:37:26 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  8 02:37:26 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  8 02:37:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/public_html/.maintenance
Jan  8 02:37:26 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  8 02:37:26 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  8 02:37:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color db-prefix get
Jan  8 02:37:26 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  8 02:37:27 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  8 02:37:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 DirectoryPrivacy is_directory_protected dir=/home/palco123/public_html --output=json
Jan  8 02:37:27 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:37:27 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:37:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  8 02:37:27 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  8 02:37:27 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  8 02:37:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color option get auto_update_core_major
Jan  8 02:37:27 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  8 02:37:28 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  8 02:37:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color wpt-cron event reschedule wp_version_check '+2 day'
Jan  8 02:37:28 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  8 02:37:29 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  8 02:37:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day'
Jan  8 02:37:29 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  8 02:37:29 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  8 02:37:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color admin-username is-secure
Jan  8 02:37:29 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  8 02:37:30 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  8 02:37:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  8 02:37:30 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  8 02:37:30 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  8 02:37:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/public_html/wp-config.php
Jan  8 02:37:30 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  8 02:37:30 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  8 02:37:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/stat -c %a /home/palco123/public_html/wp-config.php
Jan  8 02:37:30 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  8 02:37:30 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  8 02:37:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color pingbacks is_disabled
Jan  8 02:37:30 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  8 02:37:31 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  8 02:37:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  8 02:37:31 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  8 02:37:31 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  8 02:37:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color security-keys are_keys_correct
Jan  8 02:37:31 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  8 02:37:32 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  8 02:37:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwresourcehunte --output=json
Jan  8 02:37:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:37:32 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:37:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color instance info --format=json --check-updates=true
Jan  8 02:37:32 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  8 02:37:38 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  8 02:37:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option get auto_update_plugins --format=json
Jan  8 02:37:38 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  8 02:37:38 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  8 02:37:39 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option get auto_update_themes --format=json
Jan  8 02:37:39 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  8 02:37:39 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  8 02:37:39 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;'
Jan  8 02:37:39 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  8 02:37:39 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  8 02:37:39 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte LangPHP php_get_vhost_versions --output=json
Jan  8 02:37:39 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:37:39 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:37:39 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color instance login-url --skip-plugins=false --format=json
Jan  8 02:37:39 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  8 02:37:39 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  8 02:37:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte DomainInfo single_domain_data domain=resourcehunters.com return_https_redirect_status=1 --output=json
Jan  8 02:37:40 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:37:40 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:37:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte Mime list_redirects --output=json
Jan  8 02:37:40 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:37:40 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:37:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  8 02:37:40 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  8 02:37:40 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  8 02:37:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option get auto_update_plugins --format=json
Jan  8 02:37:40 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  8 02:37:41 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  8 02:37:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false
Jan  8 02:37:41 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  8 02:37:45 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  8 02:37:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option get auto_update_themes --format=json
Jan  8 02:37:45 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  8 02:37:46 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  8 02:37:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/test -e /home/wwwresourcehunte/public_html/wp-config.php
Jan  8 02:37:46 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  8 02:37:46 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  8 02:37:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  8 02:37:46 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  8 02:37:46 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  8 02:37:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/test -e /home/wwwresourcehunte/public_html/.maintenance
Jan  8 02:37:46 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  8 02:37:46 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  8 02:37:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color db-prefix get
Jan  8 02:37:46 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  8 02:37:46 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  8 02:37:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte DirectoryPrivacy is_directory_protected dir=/home/wwwresourcehunte/public_html --output=json
Jan  8 02:37:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:37:46 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:37:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  8 02:37:47 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  8 02:37:47 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  8 02:37:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color wpt-cron event reschedule wp_version_check '+2 day'
Jan  8 02:37:47 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  8 02:37:48 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  8 02:37:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day'
Jan  8 02:37:48 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  8 02:37:48 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  8 02:37:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  8 02:37:48 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  8 02:37:48 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  8 02:37:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  8 02:37:48 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  8 02:37:49 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  8 02:37:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color admin-username is-secure
Jan  8 02:37:49 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  8 02:37:49 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  8 02:37:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  8 02:37:49 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  8 02:37:49 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  8 02:37:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/test -e /home/wwwresourcehunte/public_html/wp-config.php
Jan  8 02:37:49 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  8 02:37:49 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  8 02:37:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/stat -c %a /home/wwwresourcehunte/public_html/wp-config.php
Jan  8 02:37:49 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  8 02:37:49 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  8 02:37:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color pingbacks is_disabled
Jan  8 02:37:49 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  8 02:37:50 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  8 02:37:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json
Jan  8 02:37:50 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  8 02:37:50 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  8 02:37:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color security-keys are_keys_correct
Jan  8 02:37:50 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  8 02:37:50 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  8 02:37:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=vfmassets WpToolkitNotification send_admin_auto_updates_notification 'available_updates_text=<br/><br/>Updates are available for the following items:<br/><br/>' 'available_updates_list=1. Website "Resource Hunters" (http://resourcehunters.com). Installed version: 4.2.34. Available version: 6.1.1.<br/><br/>' installed_updates_text= installed_updates_list= 'failure_updates_text=Updates were not installed for the following items:<br/><br/>' 'failure_updates_list=1. Website "EVM Honda Cochin" (http://www.evmhonda.com): Failed to reset cache for the instance #1: Fatal error: Uncaught Error: Call to undefined function cardealer_is_wpml_active() in /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-options.php:1041#012Stack trace:#012#0
Jan  8 02:37:50 host sudo: wp-toolkit : (command continued) /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-init.php(22): require_once()#012#1 /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/cardealer-helper-library.php(183): require_once('"'"'/home/wwwevmhon...'"'"')#012#2 /home/wwwevmhonda/public_html/wp-includes/class-wp-hook.php(287): cdhl_include_admin_files('"'"''"'"')#012#3 /home/wwwevmhonda/public_html/wp-includes/class-wp-hook.php(311): WP_Hook->apply_filters(NULL, Array)#012#4 /home/wwwevmhonda/public_html/wp-includes/plugin.php(478): WP_Hook->do_action(Array)#012#5 /home/wwwevmhonda/public_html/wp-settings.php(546): do_action('"'"'init'"'"')#012#6 /usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/vendor/wp-cli/wp-cli/php/WP_CLI/Runner.php(1356): require('"'"'/home/wwwevmhon...'"'"')#012#7 /usr/local/cpanel/3rdparty/wp-toolkit/plib/ve in
Jan  8 02:37:50 host sudo: wp-toolkit : (command continued) /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-options.php on line 1041#012Error: There has been a critical error on your website.Learn more about debugging in WordPress. There has been a critical error on your website.#012<br/><br/>2. Website "/home/mrsclean/public_html/backup" (http://mrsclean.co.in/backup): Failed to reset cache for the instance #5: Error: Error establishing a database connection. This either means that the username and password information in your `wp-config.php` file is incorrect or we can’t contact the database server at `localhost`. This could mean your host’s database server is down.#012<br/><br/>3. Website "/home/mrsclean/public_html/blog" (http://mrsclean.co.in/blog): Failed to reset cache for the instance #6: Error: Error establishing a database connection. This either means that the username and password information in your `wp-config.php`
Jan  8 02:37:50 host sudo: wp-toolkit : (command continued) file is incorrect or we can’t contact the database server at `localhost`. This could mean your host’s database server is down.#012<br/><br/>4. Website "/home/ugotscom/public_html/boniface/blog" (http://ugotechnologies.com/boniface/blog): Failed to reset cache for the instance #13: Error: Error establishing a database connection.#012<br/><br/>5. Website "/home/woodpeck/public_html/wp" (http://woodpeckerindia.com/wp): Failed to reset cache for the instance #16: /bin/sh: line 0: cd: /home/woodpeck/public_html/wp: No such file or directory#012<br/><br/>' --output=json
Jan  8 02:37:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:37:50 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:37:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color cli cache clear
Jan  8 02:37:50 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  8 02:37:51 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  8 02:37:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color cli cache clear
Jan  8 02:37:51 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  8 02:37:51 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  8 02:37:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/backup && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/mrsclean/public_html/backup --no-color cli cache clear
Jan  8 02:37:51 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  8 02:37:51 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  8 02:37:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/blog && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/mrsclean/public_html/blog --no-color cli cache clear
Jan  8 02:37:51 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0)
Jan  8 02:37:51 host sudo: pam_unix(sudo:session): session closed for user mrsclean
Jan  8 02:37:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color cli cache clear
Jan  8 02:37:51 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  8 02:37:51 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  8 02:37:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color cli cache clear
Jan  8 02:37:52 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:37:52 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:37:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color cli cache clear
Jan  8 02:37:52 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:37:52 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:37:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color cli cache clear
Jan  8 02:37:52 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:37:52 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:37:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/boniface/blog && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/boniface/blog --no-color cli cache clear
Jan  8 02:37:52 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 02:37:52 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 02:37:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color cli cache clear
Jan  8 02:37:52 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 02:37:52 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 02:37:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color cli cache clear
Jan  8 02:37:53 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 02:37:53 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 02:37:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html/wp && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/woodpeck/public_html/wp --no-color cli cache clear
Jan  8 02:37:53 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0)
Jan  8 02:37:53 host sudo: pam_unix(sudo:session): session closed for user woodpeck
Jan  8 02:37:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color cli cache clear
Jan  8 02:37:53 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  8 02:37:53 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  8 02:37:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color cli cache clear
Jan  8 02:37:53 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  8 02:37:53 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  8 02:37:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet
Jan  8 02:37:53 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  8 02:37:53 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  8 02:37:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet
Jan  8 02:37:54 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  8 02:37:54 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  8 02:37:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet
Jan  8 02:37:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  8 02:37:55 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  8 02:37:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet
Jan  8 02:37:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:37:55 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:37:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet
Jan  8 02:37:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:37:56 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:37:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet
Jan  8 02:37:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 02:37:56 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 02:37:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet
Jan  8 02:37:56 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 02:37:56 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 02:37:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet
Jan  8 02:37:56 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 02:37:57 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 02:37:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet
Jan  8 02:37:57 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0)
Jan  8 02:37:57 host sudo: pam_unix(sudo:session): session closed for user palco123
Jan  8 02:37:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet
Jan  8 02:37:57 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  8 02:37:59 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  8 02:37:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c httpd -v
Jan  8 02:37:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:37:59 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:37:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwevmhonda/evmhonda.com/wp-toolkit.conf
Jan  8 02:37:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:37:59 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:37:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwevmhonda/evmhonda.com/wp-toolkit.conf
Jan  8 02:37:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:37:59 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:37:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwevmhonda/evmhonda.com/wp-toolkit.conf
Jan  8 02:37:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:37:59 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:37:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwevmhonda/evmhonda.com/wp-toolkit.conf
Jan  8 02:37:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:37:59 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:37:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf
Jan  8 02:37:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:37:59 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:37:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf
Jan  8 02:37:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:37:59 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:37:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf
Jan  8 02:37:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:37:59 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:37:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf
Jan  8 02:37:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:37:59 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:37:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/shalinijames/shalinijames.com/wp-toolkit.conf
Jan  8 02:37:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:37:59 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:37:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/shalinijames/shalinijames.com/wp-toolkit.conf
Jan  8 02:37:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:37:59 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:37:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/shalinijames/shalinijames.com/wp-toolkit.conf
Jan  8 02:37:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:37:59 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:37:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/shalinijames/shalinijames.com/wp-toolkit.conf
Jan  8 02:37:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:37:59 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:37:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  8 02:37:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:37:59 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:37:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  8 02:37:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:37:59 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:37:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  8 02:37:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:37:59 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:37:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  8 02:37:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:37:59 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:37:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  8 02:37:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:37:59 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:37:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  8 02:37:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:37:59 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:37:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  8 02:37:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:37:59 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:37:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  8 02:37:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:37:59 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:37:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  8 02:37:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:37:59 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:38:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  8 02:38:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:38:00 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:38:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  8 02:38:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:38:00 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:38:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf
Jan  8 02:38:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:38:00 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:38:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf
Jan  8 02:38:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:38:00 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:38:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf
Jan  8 02:38:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:38:00 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:38:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf
Jan  8 02:38:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:38:00 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:38:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf
Jan  8 02:38:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:38:00 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:38:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf
Jan  8 02:38:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:38:00 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:38:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf
Jan  8 02:38:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:38:00 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:38:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf
Jan  8 02:38:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:38:00 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:38:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf
Jan  8 02:38:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:38:00 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:38:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/palco123/panlys.com/wp-toolkit.conf
Jan  8 02:38:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:38:00 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:38:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/palco123/panlys.com/wp-toolkit.conf
Jan  8 02:38:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:38:00 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:38:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/palco123/panlys.com/wp-toolkit.conf
Jan  8 02:38:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:38:00 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:38:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/palco123/panlys.com/wp-toolkit.conf
Jan  8 02:38:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:38:00 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:38:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf
Jan  8 02:38:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:38:00 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:38:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf
Jan  8 02:38:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:38:00 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:38:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf
Jan  8 02:38:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:38:00 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:38:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf
Jan  8 02:38:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:38:00 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:40:32 host sshd[16637]: Did not receive identification string from 149.129.220.222 port 61000
Jan  8 02:43:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  8 02:43:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:43:02 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:43:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  8 02:43:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:43:02 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:43:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  8 02:43:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:43:02 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:43:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  8 02:43:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:43:02 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:43:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  8 02:43:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:43:02 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:43:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  8 02:43:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:43:02 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 02:43:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  8 02:43:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 02:43:02 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 03:11:28 host sshd[21198]: Invalid user dior from 220.118.147.55 port 64619
Jan  8 03:11:28 host sshd[21198]: input_userauth_request: invalid user dior [preauth]
Jan  8 03:11:28 host sshd[21198]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 03:11:28 host sshd[21198]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.118.147.55
Jan  8 03:11:30 host sshd[21198]: Failed password for invalid user dior from 220.118.147.55 port 64619 ssh2
Jan  8 03:11:30 host sshd[21198]: Received disconnect from 220.118.147.55 port 64619:11: Bye Bye [preauth]
Jan  8 03:11:30 host sshd[21198]: Disconnected from 220.118.147.55 port 64619 [preauth]
Jan  8 03:11:55 host sshd[21228]: Invalid user ssw from 94.132.238.122 port 40300
Jan  8 03:11:55 host sshd[21228]: input_userauth_request: invalid user ssw [preauth]
Jan  8 03:11:55 host sshd[21228]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 03:11:55 host sshd[21228]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.132.238.122
Jan  8 03:11:57 host sshd[21228]: Failed password for invalid user ssw from 94.132.238.122 port 40300 ssh2
Jan  8 03:11:57 host sshd[21228]: Received disconnect from 94.132.238.122 port 40300:11: Bye Bye [preauth]
Jan  8 03:11:57 host sshd[21228]: Disconnected from 94.132.238.122 port 40300 [preauth]
Jan  8 03:13:04 host sshd[21360]: Invalid user lost from 8.213.197.220 port 51012
Jan  8 03:13:04 host sshd[21360]: input_userauth_request: invalid user lost [preauth]
Jan  8 03:13:04 host sshd[21360]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 03:13:04 host sshd[21360]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=8.213.197.220
Jan  8 03:13:06 host sshd[21360]: Failed password for invalid user lost from 8.213.197.220 port 51012 ssh2
Jan  8 03:13:06 host sshd[21360]: Received disconnect from 8.213.197.220 port 51012:11: Bye Bye [preauth]
Jan  8 03:13:06 host sshd[21360]: Disconnected from 8.213.197.220 port 51012 [preauth]
Jan  8 03:16:35 host sshd[21881]: Invalid user gq from 8.213.197.220 port 47864
Jan  8 03:16:35 host sshd[21881]: input_userauth_request: invalid user gq [preauth]
Jan  8 03:16:35 host sshd[21881]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 03:16:35 host sshd[21881]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=8.213.197.220
Jan  8 03:16:37 host sshd[21881]: Failed password for invalid user gq from 8.213.197.220 port 47864 ssh2
Jan  8 03:16:37 host sshd[21881]: Received disconnect from 8.213.197.220 port 47864:11: Bye Bye [preauth]
Jan  8 03:16:37 host sshd[21881]: Disconnected from 8.213.197.220 port 47864 [preauth]
Jan  8 03:16:42 host sshd[21894]: Invalid user show from 220.118.147.55 port 1467
Jan  8 03:16:42 host sshd[21894]: input_userauth_request: invalid user show [preauth]
Jan  8 03:16:42 host sshd[21894]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 03:16:42 host sshd[21894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.118.147.55
Jan  8 03:16:44 host sshd[21894]: Failed password for invalid user show from 220.118.147.55 port 1467 ssh2
Jan  8 03:16:44 host sshd[21894]: Received disconnect from 220.118.147.55 port 1467:11: Bye Bye [preauth]
Jan  8 03:16:44 host sshd[21894]: Disconnected from 220.118.147.55 port 1467 [preauth]
Jan  8 03:17:54 host sshd[22054]: Invalid user neusoft from 220.118.147.55 port 9533
Jan  8 03:17:54 host sshd[22054]: input_userauth_request: invalid user neusoft [preauth]
Jan  8 03:17:54 host sshd[22054]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 03:17:54 host sshd[22054]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.118.147.55
Jan  8 03:17:56 host sshd[22054]: Failed password for invalid user neusoft from 220.118.147.55 port 9533 ssh2
Jan  8 03:18:01 host sshd[22097]: Invalid user zhoulijie from 8.213.197.220 port 34510
Jan  8 03:18:01 host sshd[22097]: input_userauth_request: invalid user zhoulijie [preauth]
Jan  8 03:18:01 host sshd[22097]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 03:18:01 host sshd[22097]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=8.213.197.220
Jan  8 03:18:03 host sshd[22097]: Failed password for invalid user zhoulijie from 8.213.197.220 port 34510 ssh2
Jan  8 03:18:03 host sshd[22097]: Received disconnect from 8.213.197.220 port 34510:11: Bye Bye [preauth]
Jan  8 03:18:03 host sshd[22097]: Disconnected from 8.213.197.220 port 34510 [preauth]
Jan  8 03:18:14 host sshd[22163]: Invalid user toy from 94.132.238.122 port 54092
Jan  8 03:18:14 host sshd[22163]: input_userauth_request: invalid user toy [preauth]
Jan  8 03:18:14 host sshd[22163]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 03:18:14 host sshd[22163]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.132.238.122
Jan  8 03:18:16 host sshd[22163]: Failed password for invalid user toy from 94.132.238.122 port 54092 ssh2
Jan  8 03:18:16 host sshd[22163]: Received disconnect from 94.132.238.122 port 54092:11: Bye Bye [preauth]
Jan  8 03:18:16 host sshd[22163]: Disconnected from 94.132.238.122 port 54092 [preauth]
Jan  8 03:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  8 03:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 03:21:52 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 03:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  8 03:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 03:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 03:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  8 03:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 03:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 03:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version
Jan  8 03:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 03:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 03:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release
Jan  8 03:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 03:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 03:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release
Jan  8 03:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 03:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 03:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa
Jan  8 03:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 03:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 03:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa
Jan  8 03:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 03:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 03:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa
Jan  8 03:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 03:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 03:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel
Jan  8 03:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 03:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 03:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version
Jan  8 03:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 03:21:53 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 03:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  8 03:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 03:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 03:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json
Jan  8 03:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 03:21:54 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 03:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=gifterman user-2=palco123 user-3=kottayamcalldriv user-4=phmetals user-5=mrsclean user-6=wwwnexidigital user-7=bonifacegroup user-8=wwwevmhonda user-9=wwwletsstalkfood user-10=straightcurve user-11=vfmassets user-12=wwwtestugo user-13=shalinijames user-14=pmcresources user-15=remysagr user-16=disposeat user-17=wwwkmaorg user-18=woodpeck user-19=wwwkapin user-20=travelboniface user-21=wwwrmswll user-22=keralaholi user-23=wwwresourcehunte user-24=ugotscom user-25=wwwpmcresource user-26=dartsimp user-27=a2zgroup user-28=laundryboniface user-29=cochintaxi user-30=wwwkaretakers feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit
Jan  8 03:21:54 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json
Jan  8 03:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 03:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 03:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  8 03:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 03:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 03:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-C9hx8TyDVc1PvCkv.~
Jan  8 03:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 03:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 03:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-C9hx8TyDVc1PvCkv.~'
Jan  8 03:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 03:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 03:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-C9hx8TyDVc1PvCkv.~ /etc/logrotate.d/wp-toolkit-action-logs.~
Jan  8 03:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 03:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 03:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs
Jan  8 03:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 03:21:55 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 03:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier
Jan  8 03:21:55 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 03:21:55 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 03:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd
Jan  8 03:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 03:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 03:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd
Jan  8 03:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 03:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 03:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier
Jan  8 03:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 03:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 03:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json
Jan  8 03:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 03:21:56 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 03:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json
Jan  8 03:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan  8 03:21:57 host sudo: pam_unix(sudo:session): session closed for user root
Jan  8 03:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json
Jan  8 03:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0)
Jan  8 03:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda
Jan  8 03:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json
Jan  8 03:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0)
Jan  8 03:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood
Jan  8 03:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json
Jan  8 03:22:00 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0)
Jan  8 03:22:02 host sudo: pam_unix(sudo:session): session closed for user shalinijames
Jan  8 03:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json
Jan  8 03:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 03:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 03:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json
Jan  8 03:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 03:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 03:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json
Jan  8 03:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0)
Jan  8 03:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo
Jan  8 03:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json
Jan  8 03:22:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 03:22:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 03:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json
Jan  8 03:22:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0)
Jan  8 03:22:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom
Jan  8 03:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json
Jan  8 03:22:10 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0)
Jan  8 03:22:11 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte
Jan  8 03:23:52 host sshd[23370]: User sync from 94.132.238.122 not allowed because not listed in AllowUsers
Jan  8 03:23:52 host sshd[23370]: input_userauth_request: invalid user sync [preauth]
Jan  8 03:23:52 host unix_chkpwd[23375]: password check failed for user (sync)
Jan  8 03:23:52 host sshd[23370]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.132.238.122  user=sync
Jan  8 03:23:52 host sshd[23370]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "sync"
Jan  8 03:23:54 host sshd[23370]: Failed password for invalid user sync from 94.132.238.122 port 44530 ssh2
Jan  8 03:23:54 host sshd[23370]: Received disconnect from 94.132.238.122 port 44530:11: Bye Bye [preauth]
Jan  8 03:23:54 host sshd[23370]: Disconnected from 94.132.238.122 port 44530 [preauth]
Jan  8 03:34:30 host sshd[25081]: Invalid user b from 194.110.203.109 port 34412
Jan  8 03:34:30 host sshd[25081]: input_userauth_request: invalid user b [preauth]
Jan  8 03:34:30 host sshd[25081]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 03:34:30 host sshd[25081]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109
Jan  8 03:34:32 host sshd[25081]: Failed password for invalid user b from 194.110.203.109 port 34412 ssh2
Jan  8 03:34:35 host sshd[25081]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 03:34:37 host sshd[25081]: Failed password for invalid user b from 194.110.203.109 port 34412 ssh2
Jan  8 03:34:41 host sshd[25081]: pam_unix(sshd:auth): check pass; user unknown
Jan  8 03:34:42 host sshd[25081]: Failed password for invalid user b from 194.110.203.109 port 34412 ssh2
Jan  8 03:34:45 host sshd[25081]: Connection closed by 194.110.203.109 port 34412 [preauth]
Jan  8 03:34:45 host sshd[25081]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109

Zerion Mini Shell 1.0